IACR
Videos from IACR
Page 11 of 16 • 370 total videos

22:41
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full $$\mathsf {MO...
IACR
228 views

22:54
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
IACR
1.4K views

28:17
Separable Statistics and Multidimensional Linear Cryptanalysis
IACR
122 views

15:59
Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity
IACR
1.2K views

18:59
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduc...
IACR
305 views

26:40
Analysis of Partitions in the S-Box of Streebog and Kuznyechik
IACR
503 views

20:06
Cryptanalysis of AES-PRF and Its Dual
IACR
167 views

19:23
CRYSTALS-Dilithium: A Lattice Based Digital Signature Scheme
IACR
10.0K views

20:50
Homomorphic Secret Sharing from Lattices Without FHE
IACR
714 views

16:37
Minicrypt Primitives with Algebraic Structure and Their Applications
IACR
427 views

25:02
Computationally Volume-Hiding Structured Encryption
IACR
775 views

28:05
SeaSign: Compact Isogeny Signatures from Class Group Actions
IACR
789 views

19:17
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
IACR
285 views

20:10
Saber on ARM: CCA secure module lattice based key encapsulation on ARM
IACR
327 views

16:13
Side Channel Attacks on Post-Quantum Signature Schemes Utilizing Multivariate Quadratic Equations
IACR
288 views

20:13
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
IACR
784 views

3:33
nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python
IACR
865 views

3:38
Prime and Prejudice Primality Testing Under Adversarial Conditions
IACR
333 views

10:55
Tight Tradeoffs in Searchable Symmetric Encryption
IACR
368 views

14:55
Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency
IACR
920 views

19:24
A New Public Key Cryptosystem via Mersenne Numbers
IACR
408 views

19:45
The Algebraic Group Model: Insights and Applications
IACR
1.6K views

19:49
Provable Security Analysis of Tweakable Block Ciphers Using Substitution Permutation Networks
IACR
531 views

19:46
The Curse of Small Domains New Attacks on Format Preserving Encryption
IACR
370 views