IACR

Videos from IACR

Page 10 of 16 β€’ 372 total videos

21:40

Enhanced Security in Lattices with Polynomial Moduli: PRF, IBE, All-but-many LTF, and More

IACR
138 views
21:40

Constraining and Watermarking PRFs from Milder Assumptions

IACR
135 views
1:04:25

Exploring Fine-Grained Cryptography: The Next Big Breakthrough? πŸ”

IACR
2.8K views
54:02

S-182: Obfuscation, Functional Encryption, and Attribute-Based Encryption

IACR
641 views
37:30

s-188 Quantum Cryptanalysis

IACR
441 views
15:31

Quantum Key Search: Implementing Grover Oracles for AES & LowMC πŸ”‘

IACR
672 views
21:18

Private Information Retrieval with Sublinear Online Time

IACR
2.0K views
26:26

Unveiling the Retracing Boomerang Attack: Insights from Eurocrypt 2020 πŸ”

IACR
1.0K views
21:02

The Price of Active Security in Cryptographic Protocols

IACR
346 views
25:08

Breaking Rank Metric Code-Based Cryptosystems: An Algebraic Attack 🚨

IACR
762 views
24:15

Statistical Zaps and New Oblivious Transfer Protocols

IACR
307 views
43:50

Mathematics Meets Cryptography: Exploring Their Powerful Partnership πŸ”

IACR
1.9K views
38:00

Slide Attacks on Nearly Self-Similar Ciphers

IACR
572 views
23:15

Quantum Security Insights for CSIDH: A Eurocrypt 2020 Analysis πŸ”

IACR
1.0K views
20:34

Unveiling RSA Vulnerabilities: Cache-Timing Attacks Explained πŸ”

IACR
595 views
15:38

New Side-Channel Attack Techniques on Quasi-Cyclic Code-Based Cryptography πŸ”’

IACR
287 views
15:46

Understanding Error Amplification in Code-Based Cryptography πŸ”

IACR
150 views
44:45

Nonce Bias & Lattice Attacks on Weak ECDSA πŸ”

IACR
9.0K views
43:18

Automating Chosen Ciphertext Attacks: Insights from Matthew Green's WAC2 Presentation πŸ”

IACR
572 views
24:32

Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs

IACR
193 views
23:35

Understanding Fixed vs. Random Generators in Group-Based Assumptions

IACR
182 views
22:12

Achieving Chosen Ciphertext Security in Attribute-Based Encryption & Predicate Encryption πŸ”

IACR
354 views
22:32

Enhancing Security: Watermarking Techniques for Public-Key Cryptography πŸ”

IACR
764 views
22:24

Innovative Asymmetric PAKE Protocol Leveraging Trapdoor CKEM πŸ”

IACR
189 views