IACR

Videos from IACR

Page 12 of 16 • 370 total videos

Fast Correlation Attack Revisted
21:18

Fast Correlation Attack Revisted

IACR
1.4K views
Encrypt or Decrypt  To Make a Single Key Beyond Birthday Secure Nonce Based MAC
21:25

Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC

IACR
363 views
Cryptanalysis via Algebraic Spans
23:18

Cryptanalysis via Algebraic Spans

IACR
367 views
From Idea to Impact, the Crypto Story:  What's Next?
1:03:19

From Idea to Impact, the Crypto Story: What's Next?

IACR
6.7K views
Conditional Linear Cryptanalysis
4:53

Conditional Linear Cryptanalysis

IACR
203 views
The ZUC-256 Stream Cipher
3:59

The ZUC-256 Stream Cipher

IACR
961 views
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
25:31

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

IACR
409 views
The Discrete-Logarithm Problem with Preprocessing
24:55

The Discrete-Logarithm Problem with Preprocessing

IACR
569 views
Two-Round Multiparty Secure Computation from Minimal Assumptions
24:51

Two-Round Multiparty Secure Computation from Minimal Assumptions

IACR
385 views
Grover Meets Simon: Quantum Attacks on FX Construction
22:53

Grover Meets Simon: Quantum Attacks on FX Construction

IACR
306 views
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
24:42

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms

IACR
504 views
An Existential Unforgeable Signature Scheme Utilizing Multivariate Quadratic Equations
23:44

An Existential Unforgeable Signature Scheme Utilizing Multivariate Quadratic Equations

IACR
131 views
The ship has sailed: the NIST Post-Quantum Cryptography "competition"
51:51

The ship has sailed: the NIST Post-Quantum Cryptography "competition"

IACR
868 views
Linear Cryptanalysis of DES with Asymmetries
19:28

Linear Cryptanalysis of DES with Asymmetries

IACR
669 views
Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption
2:50

Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption

IACR
343 views
Separable Statistics, New Extension to Linear Cryptanalysis
5:19

Separable Statistics, New Extension to Linear Cryptanalysis

IACR
97 views
Security and Composition of Rational Cryptographic Protocols
3:14

Security and Composition of Rational Cryptographic Protocols

IACR
207 views
Hedging Public Key Encryption in the Real World
21:14

Hedging Public Key Encryption in the Real World

IACR
126 views
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
25:51

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions

IACR
831 views
ZMAC  A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
22:49

ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

IACR
235 views
Invited talk: Advances in computer aided cryptography
1:02:27

Invited talk: Advances in computer aided cryptography

IACR
379 views
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
22:43

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

IACR
290 views
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
21:21

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions

IACR
489 views
Cryptography with Updates
23:17

Cryptography with Updates

IACR
180 views