Sign in to confirm you’re not a bot
This helps protect our community. Learn more
These chapters are auto-generated

Intro

0:00

Algorithm Substitution Attacks

0:37

Goal of the attacker

1:30

Black box cryptography

3:16

Implementation of BPR's Sub.Enc

6:25

Implementation of BJK's Sub.Enc

8:10

Undetectability of BJK's ASA

8:36

Chen, Huang and Yung, 2020

13:05

How should we address state?

13:40

Relationships between detectability notions

15:25

Applying state reset to previous works

16:28

What does this mean?

17:27

Motivation

18:09

Asymmetric ASAS

19:21

Two types of asymmetric requirements

19:54

Augmented state reset detectability game

21:02

Idea for type 1 asymmetric ASA

21:43

Undetectability of type 1 ASA

23:42

Idea for type 2 asymmetric ASA

24:09

Undetectability of type 2 ASA

25:20

Security of type 2 ASA

25:57

Flexible ASAs and asymmetric modifications

27:03
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications
N/ALikes
75Views
2022Mar 17
Paper by Philip Hodges, Douglas Stebila presented at Fast Software Encryption 2022 See https://iacr.org/cryptodb/data/paper..... The conference program is at https://fse.iacr.org/2022/program.php

Follow along using the transcript.

IACR

9.88K subscribers