AI Engineer - Learn how to integrate AI into software applications
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a conference talk from DefCamp 2018 focusing on lattice-based Merkle trees for post-quantum cryptography. Delve into private and public-key encryption, quantum computing threats, and various signature schemes including Lamport-Diffie and Winternitz. Learn about key generation, document signing, signature verification, and PRNG integration. Understand efficiency problems and potential vulnerabilities in PRNGs. Gain insights into cutting-edge cryptographic techniques designed to withstand quantum computing attacks, presented by experts at one of Central and Eastern Europe's premier information security conferences.
Syllabus
Intro
Private Key Encryption
Public-key encryption
Quantum computers
LAMPORT-DIFFIE ONE-TIME SIGNATURE SCHEME (KEY GENERATION)
DOCUMENT SIGNATURE
WINTERNITZ ONE TIME SIGNATURE SCHEME. KEY GENERATION
SIGNATURE GENERATION
SIGNATURE VERIFICATION
PRNG INTEGRATION
Breaking PRNG
Efficiency problems
THANK YOU! QUESTIONS?
Taught by
DefCamp