Practical Non-Malleable Codes from I-More Extractable Hash Functions
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Experiment
MessageS Prime
Application
Security
Error Correction
Split State Model
Application of the Primitive
Construction of the Primitive
Comparison Table
Logic
Affine
Extractable Hush
Extractable Heart
Zero More Extractable Hash
Knowledge of Exponential Assumption
Question
Construction
Code
Authenticity
Semantic Security
Extractable Hash
Collision Resistance
public key Encryption
Taught by
ACM CCS