The Most Addictive Python and SQL Courses
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a cryptographic analysis presented at Eurocrypt 2020 focusing on Birthday Bound Attacks on EWCDMD and SoKAC21. Delve into Mridul Nandi's paper, which examines attack pods, composition of identity operations, and constructions of permutations. Investigate the distribution attack methodology and its application to SoK AC21, considering dependent oracle scenarios. Gain insights into open problems in the field and draw conclusions from this cutting-edge research in cryptography.
Syllabus
Introduction
Attack Pod
Composition of Identity
Operations of Two Functions
Constructions
Permutations
Distribution Attack
SoK AC21
Dependent Oracle
Open Problems
Conclusion
Taught by
TheIACR