JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Attacking Secret Sharing
Given a secret, is there any way to split it into N pieces in such a manner that any K out of N pieces can be used to recover the original secret.
▪ Why do we need secret sharing?
▪ Desired properties in secret sharing schemes
▪ Design of The secret sharing scheme
▪ Attacking the secret sharing
▪ Design of a cryptographic backdoor
▪ Recovering the secrets
Event: 19th Sep 2020, 05:30 PM
Pre-Requisites: Polynomials.
Level: Proficient
Duration:60-90 minutes
Speaker: Adhokshaj mishra, Also Known as DemiGod of Malware.
Joining Link:
https://zoom.us/j/95769382487?pwd=aTk1emdzL25ZQVVsLy9BcmN4WDVwQT09
Vapra Shiksha
An initiative for Cybersecurity Talks
Request you all to follow us on the following platforms for regular updates.
https://t.me/VapraShiksha
(Central Node for all Info)
https://vapra.shiksha
http://facebook.com/VapraShiksha
https://discord.com/invite/vPmeYPM
http://twitter.com/VapraShiksha
https://www.linkedin.com/company/vaprashiksha
https://www.youtube.com/channel/UCSf6L2g-OL7jh0PMdUQjzbg
* Indicates required question
Email
*
Your email
Name
*
Your answer
Mobile No:
*
Your answer
You Represent Organization/Institute/Community Name
*
Your answer
Occupation
*
Professional
Student
security researcher
Businessmen
Technical Speaker
Others
How did you hear about this event?
*
Website
Friend
Newsletter
Advertisement
Facebook
Twitter
LinkedIn
WhatsApp
Telegram
Want to become member of Vapra Community?
*
Yes
No
Maybe
Comments and/or questions
Your answer
A copy of your responses will be emailed to the address you provided.
Submit
Page 1 of 1
Clear form
Never submit passwords through Google Forms.
reCAPTCHA
Privacy
Terms
This content is neither created nor endorsed by Google.
Report Abuse
-
Terms of Service
-
Privacy Policy
Forms