Completed
Encryption vs. Authenticated Encryption
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Outline
- 3 Encryption vs. Authenticated Encryption
- 4 CAESAR Competition: Submissions
- 5 Linear Mixing Function
- 6 Message Padding Rule
- 7 Processing Associated Data
- 8 Security Claims
- 9 Recovering Internal State L
- 10 Universal Forgery
- 11 Exploiting the Structure of ELmD
- 12 Querying Decryption Oracle of AES
- 13 Key Recovery Attack on ElmD(6.6)
- 14 Comparison with the Previous Results
- 15 Conclusion