Главная
Study mode:
on
1
Intro
2
Motivation
3
Mode
4
Round Function
5
Key Schedule
6
Questions
7
Mind the Middle Layer
8
Question
9
Password hashing
10
Compactness of hashing modes
11
Leakage resilience
12
PvP
13
Conclusion
14
Question Answer
15
The Mother of All Leakages
16
Leakage
17
Leakage Models
18
Dense Leakage
19
Simulation Paradigm
20
Recap
Description:
Explore the intricacies of symmetric designs and leakage-resilience in cryptography through this 56-minute conference talk. Delve into topics such as round functions, key scheduling, and the importance of middle layers in cryptographic designs. Examine password hashing techniques and the compactness of hashing modes. Investigate leakage resilience, including various leakage models and dense leakage scenarios. Learn about the simulation paradigm and its role in cryptographic security. Gain insights into the "Mother of All Leakages" concept and its implications for cryptographic systems. Engage with question and answer sessions throughout the talk to deepen your understanding of these critical aspects of modern cryptography.

Symmetric Designs and Leakage-Resilience in Cryptography - Session 194

TheIACR
Add to list