Главная
Study mode:
on
1
Introduction
2
Symmetric Cryptography
3
Example
4
Sharing keys
5
Asymmetric cryptography
6
Key exchange
7
Security goal
8
DiffieHellman key exchange
9
DiffieHellman problem
10
Public encryption
11
Elgamal encryption
12
Gamble encryption
13
Quantum computers
14
Googles quantum computer
15
IBM didnt like it
16
Quantum Supremacy
17
Quantum Computer Protocol
18
Hbased digital signatures
19
Based crypto system
20
Efficiency
21
Sidechannel attacks
22
Digital signature schemes
23
Onetime signature scheme
24
Verifying signature
25
Long signature
26
Binary tree
27
Verification keys
28
Complexity
29
Goal
30
Mercury
31
Vector Commitment
32
Vector commitments
33
polynomial commitments
34
emerging proofs
35
what are the problems
36
what to do
37
novel scheme
38
signature
39
schema
40
questions
41
algorithms
42
QA
43
Hash
44
Scientific paper
45
Thank you
46
Quantum cryptography
47
Quantum key exchange
Description:
Explore a comprehensive presentation from DefCamp 2022 on post-quantum signature models using Verkle Trees. Delve into the intricacies of symmetric and asymmetric cryptography, key exchange protocols, and the impact of quantum computing on cybersecurity. Learn about Diffie-Hellman key exchange, ElGamal encryption, and the concept of quantum supremacy. Examine hash-based digital signatures, side-channel attacks, and one-time signature schemes. Investigate vector commitments, polynomial commitments, and emerging proofs in the context of post-quantum cryptography. Gain insights into novel signature schemes and algorithms designed to withstand quantum threats. This 35-minute talk, delivered by Maksim Iavich, President of Scientific Cyber Security Association and Director of Cyber Security Center at Caucasus University, offers a deep dive into cutting-edge cryptographic techniques for the post-quantum era.

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022

DefCamp
Add to list
0:00 / 0:00