Lecture

Cryptographic Hash Functions and Block Chains

Related lectures (66)
Authentication Means and Best Practices
Explores authentication means, secure password practices, biometric verification, and bi-directional authentication to enhance cybersecurity.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
Partitioning Oracle Attacks
Explores partitioning oracle attacks, multi-key collision resistance, AES-GCM authentication, and simulation results.
Symmetric Encryption: Formalism and Security
Explores the formalism and security aspects of symmetric encryption systems, including block ciphers, variable length encryption, and security definitions.
Mobile Telephony Security
Explores 2G mobile telephony security, covering authentication, encryption, privacy concerns, and vulnerabilities in encryption algorithms.
Zerologon Vulnerability in Netlogon Protocol
Explores the Zerologon vulnerability in the Netlogon Protocol, enabling unauthorized authentication and potential domain control.
Randomness Extraction: Significance and Applications
Explores randomness extraction in cryptography, total variation distance, k-sources, and the Chernoff Bound theorem.
Password Security
Emphasizes the importance of creating secure passwords and safeguarding credentials.
Hash Tables: Running Time Analysis
Explores the analysis of running time in hash tables, covering successful searches, key distribution, and table size impact.
Network Security: ARP Spoofing
Delves into routing in LAN, ARP spoofing attacks, and defense strategies against them, emphasizing the risks of network vulnerabilities.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.