IACR

Videos from IACR

Page 11 of 16 • 370 total videos

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full $$\mathsf {MO...
22:41

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full $$\mathsf {MO...

IACR
228 views
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
22:54

Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning

IACR
1.4K views
Separable Statistics and Multidimensional Linear Cryptanalysis
28:17

Separable Statistics and Multidimensional Linear Cryptanalysis

IACR
122 views
Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity
15:59

Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity

IACR
1.2K views
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduc...
18:59

Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduc...

IACR
305 views
Analysis of Partitions in the S-Box of Streebog and Kuznyechik
26:40

Analysis of Partitions in the S-Box of Streebog and Kuznyechik

IACR
503 views
Cryptanalysis of AES-PRF and Its Dual
20:06

Cryptanalysis of AES-PRF and Its Dual

IACR
167 views
CRYSTALS-Dilithium: A Lattice Based Digital Signature Scheme
19:23

CRYSTALS-Dilithium: A Lattice Based Digital Signature Scheme

IACR
10.0K views
Homomorphic Secret Sharing from Lattices Without FHE
20:50

Homomorphic Secret Sharing from Lattices Without FHE

IACR
714 views
Minicrypt Primitives with Algebraic Structure and Their Applications
16:37

Minicrypt Primitives with Algebraic Structure and Their Applications

IACR
427 views
Computationally Volume-Hiding Structured Encryption
25:02

Computationally Volume-Hiding Structured Encryption

IACR
775 views
SeaSign: Compact Isogeny Signatures from Class Group Actions
28:05

SeaSign: Compact Isogeny Signatures from Class Group Actions

IACR
789 views
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
19:17

Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

IACR
285 views
Saber on ARM: CCA secure module lattice based key encapsulation on ARM
20:10

Saber on ARM: CCA secure module lattice based key encapsulation on ARM

IACR
327 views
Side Channel Attacks on Post-Quantum Signature Schemes Utilizing Multivariate Quadratic Equations
16:13

Side Channel Attacks on Post-Quantum Signature Schemes Utilizing Multivariate Quadratic Equations

IACR
288 views
SIFA:  Exploiting Ineffective Fault Inductions on Symmetric Cryptography
20:13

SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography

IACR
784 views
nuFHE  reaching 0 13ms gate for fully homomorphic encryption with Python
3:33

nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python

IACR
865 views
Prime and Prejudice  Primality Testing Under Adversarial Conditions
3:38

Prime and Prejudice Primality Testing Under Adversarial Conditions

IACR
333 views
Tight Tradeoffs in Searchable Symmetric Encryption
10:55

Tight Tradeoffs in Searchable Symmetric Encryption

IACR
368 views
Searchable Encryption with Optimal Locality  Achieving Sublogarithmic Read Efficiency
14:55

Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency

IACR
920 views
A New Public Key Cryptosystem via Mersenne Numbers
19:24

A New Public Key Cryptosystem via Mersenne Numbers

IACR
408 views
The Algebraic Group Model: Insights and Applications
19:45

The Algebraic Group Model: Insights and Applications

IACR
1.6K views
Provable Security Analysis of Tweakable Block Ciphers Using Substitution Permutation Networks
19:49

Provable Security Analysis of Tweakable Block Ciphers Using Substitution Permutation Networks

IACR
531 views
The Curse of Small Domains  New Attacks on Format Preserving Encryption
19:46

The Curse of Small Domains New Attacks on Format Preserving Encryption

IACR
370 views