COSIC - Computer Security and Industrial Cryptography

Videos from COSIC - Computer Security and Industrial Cryptography

Page 1 of 2 β€’ 26 total videos

1:18:46

Join Monika Trimoska at PQCSA Summer School 2025: Dive into Multivariate Cryptography & Algebraic Cryptanalysis πŸ”

COSIC - Computer Security and Industrial Cryptography
51 views
1:20:32

Unlocking Code-Based Cryptography: Simona Etinski at PQCSA Summer School 2025 πŸ”

COSIC - Computer Security and Industrial Cryptography
22 views
52:13

Discover Lattice-Based Cryptography: Signatures & KEM Schemes at PQCSA Summer School 2025 πŸ‡§πŸ‡¬

COSIC - Computer Security and Industrial Cryptography
40 views
1:15:03

Andreas HΓΌsling - "Hash-Based Signatures" (PQCSA summer school 2025)

COSIC - Computer Security and Industrial Cryptography
46 views
22:03

Unlocking Security: Cryptanalysis of Full SCARF Tweakable Block Cipher πŸ”

COSIC - Computer Security and Industrial Cryptography
72 views
22:13

COSIC Seminar: Practical Privacy-Preserving Data Processing with Transciphering & Fully Homomorphic Encryption πŸ”’

COSIC - Computer Security and Industrial Cryptography
52 views
17:51

Unlocking Speed in Fully Homomorphic Encryption: Batched and Reconfigurable LUT Evaluation πŸš€

COSIC - Computer Security and Industrial Cryptography
79 views
1:35:50

COSIC Course 2024: Master Symmetric Cryptography with Vincent Rijmen πŸ›‘οΈ

COSIC - Computer Security and Industrial Cryptography
461 views
1:20:56

COSIC Course 2024: Advanced Cryptographic Protocols for Authentication & Key Management πŸ”

COSIC - Computer Security and Industrial Cryptography
239 views
55:45

CiTiP-DistriNet-COSIC Seminar: Quantum-Safe Cryptography by Michele Mosca

COSIC - Computer Security and Industrial Cryptography
391 views
50:20

Unlocking Faster Encryption: Optimizing Symmetric Cryptography on GPUs πŸš€

COSIC - Computer Security and Industrial Cryptography
182 views
18:44

Unlocking Efficient Homomorphic Encryption with Polynomial Functions Modulo p^e πŸ”

COSIC - Computer Security and Industrial Cryptography
258 views
59:51

COSIC Seminar: DME - A Multivariate Post-Quantum KEM and Signature Scheme

COSIC - Computer Security and Industrial Cryptography
153 views
53:50

Unlocking Cryptography: Formal Methods in Protocol Design πŸ”

COSIC - Computer Security and Industrial Cryptography
177 views
21:17

Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols

COSIC - Computer Security and Industrial Cryptography
139 views
12:30

Efficient Homomorphic String Search with Constant Depth πŸ”

COSIC - Computer Security and Industrial Cryptography
222 views
34:41

COSIC Seminar: Privacy-Preserving Neural Network Classification by Orhan Ermis

COSIC - Computer Security and Industrial Cryptography
177 views
20:20

New Insights into the Security of Multivariate Ring Learning with Errors (RLWE) πŸ”

COSIC - Computer Security and Industrial Cryptography
350 views
21:03

Unlocking Cryptography: Interpolation Attacks on Unbalanced Feistel Networks πŸ”

COSIC - Computer Security and Industrial Cryptography
247 views
2:00:19

COSIC seminar "Introduction to Hash Based Signatures" (John Kelsey, KU Leuven & NIST)

COSIC - Computer Security and Industrial Cryptography
5.4K views
32:46

Unlocking Secrets: Automatic Symmetric-Key Cryptanalysis πŸ”‘ by Siwei Sun

COSIC - Computer Security and Industrial Cryptography
214 views
1:44

Discover How Julius Caesar and WWII Enigma Ciphered Secrets πŸ•΅οΈβ€β™‚οΈ

COSIC - Computer Security and Industrial Cryptography
382 views
1:43:52

ACNS 2018: In-Depth Symmetric Key Cryptanalysis πŸ”

COSIC - Computer Security and Industrial Cryptography
46 views
1:11:07

ACNS 2018: Key Insights from Session 1 on Cryptographic Protocols πŸ”

COSIC - Computer Security and Industrial Cryptography
205 views