Cryptography Primer Session 5 Attacks, Vulnerabilities, & Practical Considerations

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=EJ7F7pvr0dg



Duration: 1:08:18
206 views
0


This will be the fifth of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we'll explore a variety of attacks including padding attacks, length-extension attacks, fault-injection attacks, timing attacks, and cache attacks. In doing so, we'll explore some of the practical considerations which create the vulnerabilities that enable these attacks. The final session (on May 30) is expected to focus on applications including zero-knowledge, secret sharing, homomorphic encryption, and election protocols.







Tags:
microsoft research
security and privacy