Post-Quantum Cryptography - Chris Peikert - 3/6/2022

Поділитися
Вставка
  • Опубліковано 27 сер 2024

КОМЕНТАРІ • 13

  • @MisterDan
    @MisterDan Рік тому +1

    Thank you for the presentation!! Very much appreciated.

  • @DemonCris
    @DemonCris 5 місяців тому

    For page 22, an attacker could get the information of (A, u, v, k). I think it should be the 'c' the attacker get. If the attacker could have 'c', and assume there's lots of bit 0 in the transmission, then he could know what the value of 'k'. If he subtracts every 'c' from 'k', we could decipher the message. This is strange.

  • @bbowling4979
    @bbowling4979 Рік тому +2

    Nice presentation. I do wish the questions had been repeated to the audience for the benefit of the recording.

    • @bxskitsa
      @bxskitsa 5 місяців тому

      Most of the Questions have been repeated by the speaker. Please don't mislead the people.

  • @MAJIDK-zs7bq
    @MAJIDK-zs7bq 10 місяців тому

    2:15:15 why in key exchange Alice took r^t.A instead of r. A

  • @sotetoldal5081
    @sotetoldal5081 Рік тому

    any ideas for signature aggregation?

  • @joexu9258
    @joexu9258 2 роки тому +2

    19:00

    • @joexu9258
      @joexu9258 2 роки тому

      39:00 lattice-based crypto

    • @joexu9258
      @joexu9258 2 роки тому

      51:00 intuition

  • @inert.8440
    @inert.8440 2 роки тому

    Very interesting

  • @mart1nmuc
    @mart1nmuc Рік тому +1

    The video is virtually useless. The questions are not audible and dilute the content.

  • @PierreGerraddio
    @PierreGerraddio 11 місяців тому

    Why are they wearing masks? I was gonna watch this until I realize the speaker and all the attendees are mentally ill.