{"id":190812,"date":"2014-04-23T00:00:00","date_gmt":"2014-04-23T17:25:57","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/cryptography-primer-session-3-integral-asymmetric-functions\/"},"modified":"2016-07-15T15:16:40","modified_gmt":"2016-07-15T22:16:40","slug":"cryptography-primer-session-3-integral-asymmetric-functions","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/cryptography-primer-session-3-integral-asymmetric-functions\/","title":{"rendered":"Cryptography Primer Session 3 \u2013 Integral Asymmetric Functions"},"content":{"rendered":"
\n

This will be the third of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we\u2019ll explore integral asymmetric functions including Diffie-Hellman and RSA with an emphasis on how and why they work and the properties they enjoy.<\/p>\n

Subsequent sessions (on alternating Fridays) are expected to include the following topics. Depending on the interests of the participants, other topics may be included or substituted. Non-integer asymmetric functions including elliptic curves and lattice-based systems Cryptosystem properties, attacks, and vulnerabilities Applications including zero-knowledge, secret sharing, homomorphic encryption, and election protocols<\/p>\n<\/div>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

This will be the third of six cryptography primer sessions exploring the basics of modern cryptography. In this session, we\u2019ll explore integral asymmetric functions including Diffie-Hellman and RSA with an emphasis on how and why they work and the properties they enjoy. Subsequent sessions (on alternating Fridays) are expected to include the following topics. Depending […]<\/p>\n","protected":false},"featured_media":198319,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[],"msr-video-type":[206954],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-190812","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-video-type-microsoft-research-talks","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/n_jhsaSiny8","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/190812"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/190812\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/198319"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=190812"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=190812"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=190812"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=190812"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=190812"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=190812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}