IACR

Videos from IACR

Page 10 of 16 • 370 total videos

Constraining and Watermarking PRFs from Milder Assumptions
21:40

Constraining and Watermarking PRFs from Milder Assumptions

IACR
135 views
s-206 Fine-Grained Cryptography: A New Frontier?
1:04:25

s-206 Fine-Grained Cryptography: A New Frontier?

IACR
2.8K views
S-182: Obfuscation, Functional Encryption, and Attribute-Based Encryption
54:02

S-182: Obfuscation, Functional Encryption, and Attribute-Based Encryption

IACR
641 views
s-188 Quantum Cryptanalysis
37:30

s-188 Quantum Cryptanalysis

IACR
441 views
Implementing Grover oracles for quantum key search on AES and LowMC
15:31

Implementing Grover oracles for quantum key search on AES and LowMC

IACR
672 views
Private Information Retrieval with Sublinear Online Time
21:18

Private Information Retrieval with Sublinear Online Time

IACR
2.0K views
The Retracing Boomerang Attack
26:26

The Retracing Boomerang Attack

IACR
1.0K views
The Price of Active Security in Cryptographic Protocols
21:02

The Price of Active Security in Cryptographic Protocols

IACR
346 views
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
25:08

An Algebraic Attack on Rank Metric Code-Based Cryptosystems

IACR
762 views
Statistical Zaps and New Oblivious Transfer Protocols
24:15

Statistical Zaps and New Oblivious Transfer Protocols

IACR
307 views
Mathematics and Cryptography: A Marriage of Convenience?
43:50

Mathematics and Cryptography: A Marriage of Convenience?

IACR
1.9K views
Slide Attacks on Nearly Self-Similar Ciphers
38:00

Slide Attacks on Nearly Self-Similar Ciphers

IACR
572 views
Quantum Security Analysis of CSIDH
23:15

Quantum Security Analysis of CSIDH

IACR
1.0K views
Cache-Timing Attacks on RSA Key Generation
20:34

Cache-Timing Attacks on RSA Key Generation

IACR
595 views
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography
15:38

Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography

IACR
287 views
Error Amplification in Code-based Cryptography
15:46

Error Amplification in Code-based Cryptography

IACR
150 views
Automating the Development of Chosen Ciphertext Attacks
43:18

Automating the Development of Chosen Ciphertext Attacks

IACR
572 views
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
24:32

Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs

IACR
193 views
Understanding Fixed vs. Random Generators in Group-Based Assumptions
23:35

Understanding Fixed vs. Random Generators in Group-Based Assumptions

IACR
182 views
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En...
22:12

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En...

IACR
354 views
Watermarking Public-Key Cryptographic Primitives
22:32

Watermarking Public-Key Cryptographic Primitives

IACR
764 views
Strong Asymmetric PAKE Based on Trapdoor CKEM
22:24

Strong Asymmetric PAKE Based on Trapdoor CKEM

IACR
189 views
BEST YOUNG RESEARCHERS AWARD: Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE
21:38

BEST YOUNG RESEARCHERS AWARD: Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE

IACR
310 views
BEST PAPER AWARD: Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
22:50

BEST PAPER AWARD: Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

IACR
833 views