Completed
Chain Takeover Attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Correcting Subverted Random Oracles
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Hash Functions are Useful
- 3 Hash Implementation Can Be Optimized
- 4 Common Deployment
- 5 Subversion Attack
- 6 A Crafty Subversion
- 7 Chain Takeover Attack
- 8 The Crooked Hash
- 9 Goal: Repair Subverted Hash
- 10 Correcting Subverted ROs 1: Modeling
- 11 Rationale Behind
- 12 Correcting Subverted ROs III: Analysis
- 13 Two Challenges Remain
- 14 A New Machinery: Rejection Resampling Lemma
- 15 The Final Construction and Analysis
- 16 Preventing Chain Takeover
- 17 Reflections
- 18 Open Problems