Overview of Code-Based Crypto Assumptions

Overview of Code-Based Crypto Assumptions

Simons Institute via YouTube Direct link

Intro

1 of 16

1 of 16

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Overview of Code-Based Crypto Assumptions

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Hamming code Parity check matrix (n=7,k= 4)
  3. 3 Coding theory
  4. 4 Code-based encryption
  5. 5 Consequence of security analysis
  6. 6 Decoding problem
  7. 7 Different views on decoding
  8. 8 The Niederreiter cryptosystem 11
  9. 9 Note on codes
  10. 10 Security notions and codes
  11. 11 Generic attack: Brute force Given K and s=ke, find e with wt(e) = t.
  12. 12 Generic attack: Information-set decoding, 1962 Prange
  13. 13 Lee-Brickell attack
  14. 14 Stern's attack
  15. 15 Binary Goppa code
  16. 16 How to hide nice code?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.