Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Symmetric Designs and Leakage-Resilience in Cryptography - Session 194

TheIACR via YouTube

Overview

Explore the intricacies of symmetric designs and leakage-resilience in cryptography through this 56-minute conference talk. Delve into topics such as round functions, key scheduling, and the importance of middle layers in cryptographic designs. Examine password hashing techniques and the compactness of hashing modes. Investigate leakage resilience, including various leakage models and dense leakage scenarios. Learn about the simulation paradigm and its role in cryptographic security. Gain insights into the "Mother of All Leakages" concept and its implications for cryptographic systems. Engage with question and answer sessions throughout the talk to deepen your understanding of these critical aspects of modern cryptography.

Syllabus

Intro
Motivation
Mode
Round Function
Key Schedule
Questions
Mind the Middle Layer
Question
Password hashing
Compactness of hashing modes
Leakage resilience
PvP
Conclusion
Question Answer
The Mother of All Leakages
Leakage
Leakage Models
Dense Leakage
Simulation Paradigm
Recap

Taught by

TheIACR

Reviews

Start your review of Symmetric Designs and Leakage-Resilience in Cryptography - Session 194

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.