The Multi-User Security of GCM, Revisited - Tight Bounds for Nonce Randomization

The Multi-User Security of GCM, Revisited - Tight Bounds for Nonce Randomization

Association for Computing Machinery (ACM) via YouTube Direct link

rekeying

5 of 8

5 of 8

rekeying

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Multi-User Security of GCM, Revisited - Tight Bounds for Nonce Randomization

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Multiuser Security
  3. 3 Nonce Counters
  4. 4 Tight Bounds
  5. 5 rekeying
  6. 6 proving bounds
  7. 7 comparing bounds
  8. 8 conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.