Top News

PHoS Recommendation: Attacking Secret Sharing ~ Vapra

VEvent: 19th Sep 2020, 05:30 PM
Given a secret, is there any way to split it into N pieces in such a manner that any K out of N pieces can be used to recover the original secret.
▪ Why do we need secret sharing?
▪ Desired properties in secret sharing schemes
▪ Design of the secret sharing scheme
▪ Attacking the secret sharing
▪ Design of a cryptographic backdoor
▪ Recovering the secrets

Pre-Requisites: Polynomials.
Level: Proficient
Duration:60-90 minutes

Speaker: Adhokshaj mishra, Also Known as DemiGod of Malware.

Registration Link:

Vapra Shiksha
An initiative for Cybersecurity Talks
Request you all to follow us on the following platforms for regular updates. (Central Node for all Info)

Previous ArticleNext Article
Send this to a friend