Cryptography Primer Session 5 Attacks, Vulnerabilities, & Practical Considerations

218
Следующее
27.06.16 – 75058:29
Self-Service Cloud Computing
Популярные
Опубликовано 27 июня 2016, 19:56
This will be the fifth of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we'll explore a variety of attacks including padding attacks, length-extension attacks, fault-injection attacks, timing attacks, and cache attacks. In doing so, we'll explore some of the practical considerations which create the vulnerabilities that enable these attacks. The final session (on May 30) is expected to focus on applications including zero-knowledge, secret sharing, homomorphic encryption, and election protocols.
автотехномузыкадетское