Learn Python with Generative AI - Self Paced Online
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 13-minute conference talk from USENIX Security '24 exploring an innovative approach to post-quantum cryptography through efficient lattice-based Non-Interactive Key Exchange (NIKE). Learn how researchers from multiple institutions challenge existing beliefs about NIKE's practicality by presenting a new construction based on the module learning with errors problem. Discover the technical details of their two-step approach, combining a passively-secure construction with strong correctness guarantees and a generic compiler for active security. Examine the real-world performance metrics of their Rust and Jasmin implementation, which achieves public keys of approximately 220 KBs and shared key computation in under 12 million cycles on Intel Skylake CPU, while maintaining post-quantum security levels above 120 bits.
Syllabus
USENIX Security '24 - SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange
Taught by
USENIX