Post-Quantum Cryptography - Chris Peikert - 3/6/2022

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

Thank you for the presentation!! Very much appreciated.

MisterDan
Автор

For page 22, an attacker could get the information of (A, u, v, k). I think it should be the 'c' the attacker get. If the attacker could have 'c', and assume there's lots of bit 0 in the transmission, then he could know what the value of 'k'. If he subtracts every 'c' from 'k', we could decipher the message. This is strange.

DemonCris
Автор

Nice presentation. I do wish the questions had been repeated to the audience for the benefit of the recording.

bbowling
Автор

2:15:15 why in key exchange Alice took r^t.A instead of r. A

MAJIDK-zsbq
Автор

The video is virtually useless. The questions are not audible and dilute the content.

martnmuc
Автор

Why are they wearing masks? I was gonna watch this until I realize the speaker and all the attendees are mentally ill.

PierreGerraddio