Attacking Secret Sharing
Given a secret, is there any way to split it into N pieces in such a manner that any K out of N pieces can be used to recover the original secret.
▪ Why do we need secret sharing?
▪ Desired properties in secret sharing schemes
▪ Design of The secret sharing scheme
▪ Attacking the secret sharing
▪ Design of a cryptographic backdoor
▪ Recovering the secrets

Event: 19th Sep 2020, 05:30 PM

Pre-Requisites: Polynomials.
Level: Proficient
Duration:60-90 minutes

Speaker: Adhokshaj mishra, Also Known as DemiGod of Malware.

Joining Link:  https://zoom.us/j/95769382487?pwd=aTk1emdzL25ZQVVsLy9BcmN4WDVwQT09

Vapra Shiksha

An initiative for Cybersecurity Talks
Request you all to follow us on the following platforms for regular updates.

https://t.me/VapraShiksha (Central Node for all Info)

https://vapra.shiksha 
http://facebook.com/VapraShiksha
https://discord.com/invite/vPmeYPM
http://twitter.com/VapraShiksha
https://www.linkedin.com/company/vaprashiksha
https://www.youtube.com/channel/UCSf6L2g-OL7jh0PMdUQjzbg
Email *
Name *
Mobile No: *
You Represent Organization/Institute/Community Name *
Occupation *
How did you hear about this event? *
Want to become member of Vapra Community? *
Comments and/or questions
A copy of your responses will be emailed to the address you provided.
Submit
Clear form
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy