COSIC - Computer Security and Industrial Cryptography
Videos from COSIC - Computer Security and Industrial Cryptography
Page 1 of 2 β’ 26 total videos
1:18:46
Join Monika Trimoska at PQCSA Summer School 2025: Dive into Multivariate Cryptography & Algebraic Cryptanalysis π
COSIC - Computer Security and Industrial Cryptography
51 views
1:20:32
Unlocking Code-Based Cryptography: Simona Etinski at PQCSA Summer School 2025 π
COSIC - Computer Security and Industrial Cryptography
22 views
52:13
Discover Lattice-Based Cryptography: Signatures & KEM Schemes at PQCSA Summer School 2025 π§π¬
COSIC - Computer Security and Industrial Cryptography
40 views
1:15:03
Andreas HΓΌsling - "Hash-Based Signatures" (PQCSA summer school 2025)
COSIC - Computer Security and Industrial Cryptography
46 views
22:03
Unlocking Security: Cryptanalysis of Full SCARF Tweakable Block Cipher π
COSIC - Computer Security and Industrial Cryptography
72 views
22:13
COSIC Seminar: Practical Privacy-Preserving Data Processing with Transciphering & Fully Homomorphic Encryption π
COSIC - Computer Security and Industrial Cryptography
52 views
17:51
Unlocking Speed in Fully Homomorphic Encryption: Batched and Reconfigurable LUT Evaluation π
COSIC - Computer Security and Industrial Cryptography
79 views
1:35:50
COSIC Course 2024: Master Symmetric Cryptography with Vincent Rijmen π‘οΈ
COSIC - Computer Security and Industrial Cryptography
461 views
1:20:56
COSIC Course 2024: Advanced Cryptographic Protocols for Authentication & Key Management π
COSIC - Computer Security and Industrial Cryptography
239 views
55:45
CiTiP-DistriNet-COSIC Seminar: Quantum-Safe Cryptography by Michele Mosca
COSIC - Computer Security and Industrial Cryptography
391 views
50:20
Unlocking Faster Encryption: Optimizing Symmetric Cryptography on GPUs π
COSIC - Computer Security and Industrial Cryptography
182 views
18:44
Unlocking Efficient Homomorphic Encryption with Polynomial Functions Modulo p^e π
COSIC - Computer Security and Industrial Cryptography
258 views
59:51
COSIC Seminar: DME - A Multivariate Post-Quantum KEM and Signature Scheme
COSIC - Computer Security and Industrial Cryptography
153 views
53:50
Unlocking Cryptography: Formal Methods in Protocol Design π
COSIC - Computer Security and Industrial Cryptography
177 views
21:17
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
COSIC - Computer Security and Industrial Cryptography
139 views
12:30
Efficient Homomorphic String Search with Constant Depth π
COSIC - Computer Security and Industrial Cryptography
222 views
34:41
COSIC Seminar: Privacy-Preserving Neural Network Classification by Orhan Ermis
COSIC - Computer Security and Industrial Cryptography
177 views
20:20
New Insights into the Security of Multivariate Ring Learning with Errors (RLWE) π
COSIC - Computer Security and Industrial Cryptography
350 views
21:03
Unlocking Cryptography: Interpolation Attacks on Unbalanced Feistel Networks π
COSIC - Computer Security and Industrial Cryptography
247 views
2:00:19
COSIC seminar "Introduction to Hash Based Signatures" (John Kelsey, KU Leuven & NIST)
COSIC - Computer Security and Industrial Cryptography
5.4K views
32:46
Unlocking Secrets: Automatic Symmetric-Key Cryptanalysis π by Siwei Sun
COSIC - Computer Security and Industrial Cryptography
214 views
1:44
Discover How Julius Caesar and WWII Enigma Ciphered Secrets π΅οΈββοΈ
COSIC - Computer Security and Industrial Cryptography
382 views
1:43:52
ACNS 2018: In-Depth Symmetric Key Cryptanalysis π
COSIC - Computer Security and Industrial Cryptography
46 views
1:11:07
ACNS 2018: Key Insights from Session 1 on Cryptographic Protocols π
COSIC - Computer Security and Industrial Cryptography
205 views