Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
News
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts124/v4/a7/02/0a/a7020acf-74d8-34e9-7f49-9571abbd6778/mza_13734800070374195878.jpg/600x600bb.jpg
Cryptography FM
Symbolic Software
24 episodes
7 months ago
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
Show more...
Mathematics
Technology,
News,
Tech News,
Science
RSS
All content for Cryptography FM is the property of Symbolic Software and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
Show more...
Mathematics
Technology,
News,
Tech News,
Science
https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2
Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!
Cryptography FM
41 minutes 26 seconds
4 years ago
Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!

Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.

But what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!

That’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.

Links and papers discussed in the show:

  • Galois Fromager
  • Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions

Music composed by Toby Fox and performed by Sean Schafianski.

Special Guest: David Archer.

Sponsored By:

  • Symbolic Software: This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.
Cryptography FM
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.