Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Attacks and Security Proofs of EAX-Prime

TheIACR via YouTube

Overview

Explore a comprehensive analysis of EAX-Prime's security vulnerabilities and proofs in this 23-minute conference talk presented at FSE 2013. Delve into the research conducted by Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata as they examine potential attacks on the EAX-Prime encryption mode and provide in-depth security proofs. Gain valuable insights into the cryptographic strengths and weaknesses of this algorithm, enhancing your understanding of modern encryption techniques and their practical implications in the field of information security.

Syllabus

Attacks and Security Proofs of EAX-Prime

Taught by

TheIACR

Reviews

Start your review of Attacks and Security Proofs of EAX-Prime

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.