Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a cutting-edge talk from Asiacrypt 2016 on public-key cryptosystems that can withstand continuous tampering and leakage of arbitrary functions. Delve into the research presented by Eiichiro Fujisaki and Keita Xagawa as they discuss innovative techniques for enhancing the resilience of cryptographic systems. Gain insights into the latest advancements in cryptography and learn how these developments contribute to improving the security of public-key infrastructures against sophisticated attacks. Understand the implications of this research for the future of secure communication and data protection in an increasingly complex digital landscape.

Syllabus

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

Taught by

TheIACR

Reviews

Start your review of Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.