Lattice-based cryptography | Post-quantum cryptography | Cryptographic algorithms

Ring learning with errors key exchange

In cryptography, a public key exchange algorithm is a cryptographic algorithm which allows two parties to create and share a secret key, which they can use to encrypt messages between themselves. The ring learning with errors key exchange (RLWE-KEX) is one of a new class of public key exchange algorithms that are designed to be secure against an adversary that possesses a quantum computer. This is important because some public key algorithms in use today will be easily broken by a quantum computer if such computers are implemented. RLWE-KEX is one of a set of post-quantum cryptographic algorithms which are based on the difficulty of solving certain mathematical problems involving lattices. Unlike older lattice based cryptographic algorithms, the RLWE-KEX is provably reducible to a known hard problem in lattices. (Wikipedia).

Video thumbnail

Katherine E. Stange: Ring learning with errors and rounding

CIRM HYBRID EVENT Among the main candidates for post-quantum cryptography are systems based on the Ring Learning with Errors and Ring Learning with Rounding problems. I’ll give an overview of the number theory involved in these problems and try to persuade you to join in cryptanalyzing th

From playlist Number Theory

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Math for Liberal Studies - Lecture 3.6.1 Substitution Ciphers

This is the first video lecture for Math for Liberal Studies Section 3.6: An Introduction to Cryptography. In this video, we discuss the general idea of encrypting and decrypting messages to keep unintended recipients from reading them. We then discuss some simple methods for doing this.

From playlist Math for Liberal Studies Lectures

Video thumbnail

Toy Substitution Cipher 2 Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Communications and Network Security | CISSP Training Videos

🔥 Enroll for FREE CISSP Course & Get your Completion Certificate: https://www.simplilearn.com/learn-cloud-security-basics-skillup?utm_campaign=CCSP&utm_medium=DescriptionFirstFold&utm_source=youtube Communication and Network Security : Domain 4 of the CISSP certification course offered by

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Attacks on Ring-LWE

Kristin Lauter, Microsoft Research Redmond The Mathematics of Modern Cryptography http://simons.berkeley.edu/talks/kristin-lauter-2015-07-07

From playlist My Collaborators

Video thumbnail

A Survey on Ring-LWE Cryptography

The Ring Learning-with-Errors problem, proposed by Lyubashevsky, Peikert and Regev in 2010, is a variant of the traditional Learning-with-Errors problem, and is an active research area in lattice based cryptography. It has drawn increased attention due to the important application to const

From playlist My Collaborators

Video thumbnail

FWIMD 2022 - Keynote Lecture

FWIMD 2022 - Keynote Lecture

From playlist My Math Talks

Video thumbnail

Isaac David Smith - Quantum error correcting codes

In his first talk on the subject of quantum error correcting codes, Isaac introduces the concepts of error channels and and an error correction procedure. He proves the main theorem which characterises when an error correction procedure can exist, which will be used in the sequel to prove

From playlist Quantum computing seminar

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Bitcoin and Open Blockchain Livestream Q&A with Andreas M. Antonopoulos - March 2022

00:00:00 Introductory video and countdown 00:03:10 Welcome and start of stream (with audio issues) 00:05:00 Audio issues fixed! Start of stream again. 00:06:45 I am interested in multisig wallets but communicating instructions to my heirs how to restore that without compromising my securit

From playlist Recent & Upcoming Livestream & Live Premiere Events (Subscribe Now)

Video thumbnail

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De Valence This talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and g

From playlist RustConf 2017

Video thumbnail

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Fast, Safe, Pure-Rust Elliptic Curve Cryptography by Isis Lovecruft & Henry De Valence This talk discusses the design and implementation of curve25519-dalek, a pure-Rust implementation of operations on the elliptic curve known as Curve25519. We will discuss the goals of the library and gi

From playlist RustConf 2017

Video thumbnail

Kirsten Eisentraeger - Classical and quantum algorithms for isogeny problems - IPAM at UCLA

Recorded 26 January 2022. Kirsten Eisentraeger of Pennsylvania State University presents "Classical and quantum algorithms for isogeny problems" at IPAM's Quantum Numerical Linear Algebra Workshop. Abstract: Isogeny-based cryptography is one of a few candidates for post-quantum cryptograph

From playlist Quantum Numerical Linear Algebra - Jan. 24 - 27, 2022

Video thumbnail

Hamming Code - Errors

How to detect and correct an error using the Hamming Code. Hamming codes are a type of linear code, see link for intro to linear code: https://www.youtube.com/watch?v=oYONDEX2sh8 Questions? Feel free to post them in the comments and I'll do my best to answer!

From playlist Cryptography and Coding Theory

Video thumbnail

Math Talk! Mickael Montessinos, Ph.D. student, Elliptic Curve Cryptography

After a break down of Diffe-Hellman key exchange, and post-qunatum cryptography, we explore the journey of becoming a mathematician. Luca De Feo's talk: https://www.youtube.com/watch?v=sSA3OMBBcyQ&ab_channel=TheIACR My Twitter: https://twitter.com/KristapsBalodi3 SIDH (0:00) Getting int

From playlist Math Talk!

Video thumbnail

Paola Gori-Giorgi - Large-coupling strength expansion in DFT and Hartree-Fock adiabatic connections

Recorded 14 April 2022. Paola Gori-Giorgi of Vrije Universiteit Amsterdam presents "Large-coupling strength expansion in DFT and Hartree-Fock adiabatic connections" at IPAM's Model Reduction in Quantum Mechanics Workshop. Abstract: In this talk I will review and put into perspective severa

From playlist 2022 Model Reduction in Quantum Mechanics Workshop

Video thumbnail

Challenge Question - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

What Is Network Topology? | Types of Network Topology | BUS, RING, STAR, TREE, MESH | Simplilearn

In this video on Network Topology, we will understand What is Network topology, the role of using topology while designing a network, Different types of Topologies in a Network. Network topology provides us with a way to configure the most optimum network design according to our requiremen

From playlist Cyber Security Playlist [2023 Updated]🔥

Related pages

Integer factorization | NewHope | Finite field | Key exchange | Lattice-based cryptography | Forward secrecy | Learning with errors | Polynomial ring | Diffie–Hellman key exchange | Cryptography | Post-quantum cryptography | Ring learning with errors signature | Homomorphic encryption | Prime number | Cyclotomic polynomial | Elliptic curve | Digital signature | Ring learning with errors | Public-key cryptography | Quantum computing