Главная
Study mode:
on
1
Intro
2
Hash functions...
3
Outline
4
Example application: Hash-and-sign
5
Quantum random oracle model
6
Domain extension
7
Example: the sponge construction
8
Hash functions in the NIST competition
9
How to attack hash functions?
10
Sigma protocols
11
Flat Shamir transformation
12
Fiat Shamir signature scheme
13
Fujisaki Okamoto transformation
14
Fiat-Shamir transformation in the GROM
15
Zero knowledge
16
The QROM is uninstantiable
17
Fujisaki-Okamoto transformation in the QROM
18
Summary
Description:
Explore the intricacies of attacking hash functions in cryptographic schemes in this 43-minute lecture by Christian Majenz from the University of Amsterdam. Delve into the world of quantum cryptanalysis of post-quantum cryptography, covering topics such as the quantum random oracle model, domain extension, and the sponge construction. Examine hash functions in the NIST competition and learn various attack strategies. Investigate Sigma protocols, the Flat Shamir transformation, Fiat-Shamir signature scheme, and the Fujisaki Okamoto transformation. Gain insights into zero knowledge proofs and the uninstantiability of the QROM. Conclude with a comprehensive summary of the presented concepts and their implications for modern cryptography.

On Attacking Hash Functions in Cryptographic Schemes

Simons Institute
Add to list