Chapters
Intro
Intro
0:00
Intro
0:00
Algorithm Substitution Attacks
Algorithm Substitution Attacks
0:37
Goal of the attacker
Goal of the attacker
1:30
Goal of the attacker
1:30
Black box cryptography
Black box cryptography
3:16
Implementation of BPR's Sub.Enc
Implementation of BPR's Sub.Enc
6:25
Implementation of BJK's Sub.Enc
Implementation of BJK's Sub.Enc
8:10
Undetectability of BJK's ASA
Undetectability of BJK's ASA
8:36
Chen, Huang and Yung, 2020
Chen, Huang and Yung, 2020
13:05
How should we address state?
How should we address state?
13:40
Relationships between detectability notions
Relationships between detectability notions
15:25
Applying state reset to previous works
Applying state reset to previous works
16:28
What does this mean?
What does this mean?
17:27
What does this mean?
17:27
Motivation
Motivation
18:09
Motivation
18:09
Asymmetric ASAS
Asymmetric ASAS
19:21
Asymmetric ASAS
19:21
Two types of asymmetric requirements
Two types of asymmetric requirements
19:54
Augmented state reset detectability game
Augmented state reset detectability game
21:02
Idea for type 1 asymmetric ASA
Idea for type 1 asymmetric ASA
21:43
Undetectability of type 1 ASA
Undetectability of type 1 ASA
23:42
Idea for type 2 asymmetric ASA
Idea for type 2 asymmetric ASA
24:09
Undetectability of type 2 ASA
Undetectability of type 2 ASA
25:20
Security of type 2 ASA
Security of type 2 ASA
25:57
Security of type 2 ASA
25:57
Flexible ASAs and asymmetric modifications
Flexible ASAs and asymmetric modifications
27:03
Sync to video time
Description
N/ALikes
75Views
2022Mar 17
Chapters
View all
View all
Transcript
Follow along using the transcript.
Show transcript
IACR
9.88K subscribers
Transcript
NaN / NaN