Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Cryptography Primer Session 5 Attacks, Vulnerabilities, & Practical Considerations

Speaker  Josh Benaloh

Affiliation  Microsoft

Duration  01:07:57

Date recorded  16 May 2014

This will be the fifth of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we'll explore a variety of attacks including padding attacks, length-extension attacks, fault-injection attacks, timing attacks, and cache attacks. In doing so, we'll explore some of the practical considerations which create the vulnerabilities that enable these attacks. The final session (on May 30) is expected to focus on applications including zero-knowledge, secret sharing, homomorphic encryption, and election protocols.

©2014 Microsoft Corporation. All rights reserved.
By the same speaker
People also watched
> Cryptography Primer Session 5 Attacks, Vulnerabilities, & Practical Considerations