Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Masking Proofs Are Tight and How to Exploit it in Security Evaluations

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of masking proofs and their implications for security evaluations in this conference talk presented at Eurocrypt 2018. Delve into the research conducted by Vincent Grosso and François-Xavier Standaert, examining the tightness of masking proofs and their potential exploitation. Gain insights into topics such as motivation for masking, leakage security, worst-case evaluations, bond bodies, and security graphs. Discover implementation details and practical relevance of the findings, while also considering limitations and potential applications for choosing the right security parameters.

Syllabus

Intro
Motivation
Masking
Leakage Security
What we want to do
Outline
Settings
Worst Case Evaluation
Bond Bodies
Security Graphs
Implementation Details
Practical Relevance
Conclusion
Limitations
Can this help you choose the right D

Taught by

TheIACR

Reviews

Start your review of Masking Proofs Are Tight and How to Exploit it in Security Evaluations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.