
Sign up to save your podcasts
Or
Topics covered in this episode:
* 1:40 The fundamental advantage of an attacker.
* 3:02 The need for threat modelling.
* 5:49 Security games.
* 13:13 What does it mean for games to be secure?
* 15:43 How do you prove that no adversary can break a game?
* 19:24 What kind of cryptographic assumptions are there?
* 28:58 How modelling security can fail in practice?
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.
Topics covered in this episode:
* 1:40 The fundamental advantage of an attacker.
* 3:02 The need for threat modelling.
* 5:49 Security games.
* 13:13 What does it mean for games to be secure?
* 15:43 How do you prove that no adversary can break a game?
* 19:24 What kind of cryptographic assumptions are there?
* 28:58 How modelling security can fail in practice?
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.