Cryptography

Trace zero cryptography

In 1998 Gerhard Frey firstly proposed using trace zero varieties for cryptographic purpose. These varieties are subgroups of the divisor class group on a low genus hyperelliptic curve defined over a finite field. These groups can be used to establish asymmetric cryptography using the discrete logarithm problem as cryptographic primitive. Trace zero varieties feature a better scalar multiplication performance than elliptic curves. This allows fast arithmetic in these groups, which can speed up the calculations with a factor 3 compared with elliptic curves and hence speed up the cryptosystem. Another advantage is that for groups of cryptographically relevant size, the order of the group can simply be calculated using the characteristic polynomial of the Frobenius endomorphism. This is not the case, for example, in elliptic curve cryptography when the group of points of an elliptic curve over a prime field is used for cryptographic purpose. However to represent an element of the trace zero variety more bits are needed compared with elements of elliptic or hyperelliptic curves. Another disadvantage, is the fact, that it is possible to reduce the security of the TZV of 1/6th of the bit length using cover attack. (Wikipedia).

Video thumbnail

Provide Scarcity Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Cryptography (part 3 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Timememory - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Summary - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Primality Test - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Fang Song - Introduction to quantum computing Part 3 of 3 - IPAM at UCLA

Recorded 26 July 2022. Fang Song of Portland State University presents "Introduction to quantum computing III" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will introduce an alternative formalism of quantum information based on density matr

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Double Hash Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 2 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

François Charles : Application des mesures gaussiennes sur les réseaux euclidiens

Professeur à l’université Paris-Saclay, membre du Département Mathématiques et Applications de l’ENS Paris (DMA - CNRS & ENS Paris)

From playlist 40 ans du CIRM

Video thumbnail

29C3: Milking the Digital Cash Cow (EN)

Speaker: Timo Kasper Extracting Secret Keys of Contactless Smartcards Contactless smartcards have become widespread for applications such as ticketing, access control, identification and payments. Side-channel analysis (SCA) is a powerful type of passive implementation attack that enable

From playlist 29C3: Not my department

Video thumbnail

Blockchains Summary | Blockchain and Cryptocurrency: What You Need to Know | 2019

Blockchain and Cryptocurrency: What You Need to Know (originally recorded in 2019) 1. Use a blockchain for the right applications. A blockchain is a good tool when there is a need for: public verifiability of all transactions, and centralized data management is unacceptable (no single par

From playlist Blockchain and Cryptocurrency Course: What You Need to Know

Video thumbnail

IMT4889: Contact tracing options

IMT4889: Mobile Research lecture In this lecture we have explored options for COVID-19 contact tracing.

From playlist Archive - Research in Mobile/Wearable Tech

Video thumbnail

Lilya Budaghyan : On APN and AB power functions

CONFERENCE Recording during the thematic meeting : « ALgebraic and combinatorial methods for COding and CRYPTography» the February 23, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Guillaume Hennenfent Find this video and other talks given b

From playlist Combinatorics

Video thumbnail

Quantum Combs - Isaac David Smith

Isaac David Smith gives an introduction to quantum combs, with the overall aim of "Learning an unknown property of a quantum system by interacting with it". Along the way he discusses links to linear logic, process tensors, other categorical points of view, min entropy and quantum causal m

From playlist metauni festival 2023

Video thumbnail

Convincing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

Finite field | Jacobian variety | Discrete logarithm | Public-key cryptography | Hyperelliptic curve