Overview
Explore lattice-based cryptography in this 49-minute lecture, covering key topics such as success priority, memory optimization, and almost tight security. Delve into the intricacies of tweaking asymmetry and learn about modular approaches to cryptographic systems. Gain insights into security reduction techniques and participate in a Q&A session to deepen your understanding of this cutting-edge field in cryptography.
Syllabus
Introduction
Success Priority
Memory Optimization
Almost Tight Security
Tweaking the Asymmetry
Questions
Paper
QA
Modular Approach
Security Reduction
Taught by
TheIACR