Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore implementation issues, masking techniques, and secret sharing concepts in cryptography through this 54-minute conference talk. Delve into whitebox implementations, linear masking, and shuffling methods. Examine tensor cores, sieving, and bucketing methods for cryptographic applications. Learn about masking research goals, contributions, and expansion strategies. Investigate secret sharing, including its background, feasibility, and resilience. Gain key insights into cutting-edge cryptographic techniques and their practical implementations through expert discussions and Q&A sessions.
Syllabus
Intro
Whitebox implementations
DCA
Linear masking
Shuffling
Questions
Next talk
Overview
Tensor Cores
Sieving
Bucketing Methods
Crossover
Recap
New sap records
Key takeaways
Third talk
Context
Masking
Research Goals
Contributions
Paper overview
QA
Expansion Strategy
Summary
Secret Sharing
Research Relations
Background
Feasibility
Resilience
Taught by
TheIACR