IACR
Videos from IACR
Page 12 of 16 • 370 total videos

21:18
Fast Correlation Attack Revisted
IACR
1.4K views

21:25
Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC
IACR
363 views

23:18
Cryptanalysis via Algebraic Spans
IACR
367 views

1:03:19
From Idea to Impact, the Crypto Story: What's Next?
IACR
6.7K views

4:53
Conditional Linear Cryptanalysis
IACR
203 views

3:59
The ZUC-256 Stream Cipher
IACR
961 views

25:31
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
IACR
409 views

24:55
The Discrete-Logarithm Problem with Preprocessing
IACR
569 views

24:51
Two-Round Multiparty Secure Computation from Minimal Assumptions
IACR
385 views

22:53
Grover Meets Simon: Quantum Attacks on FX Construction
IACR
306 views

24:42
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
IACR
504 views

23:44
An Existential Unforgeable Signature Scheme Utilizing Multivariate Quadratic Equations
IACR
131 views

51:51
The ship has sailed: the NIST Post-Quantum Cryptography "competition"
IACR
868 views

19:28
Linear Cryptanalysis of DES with Asymmetries
IACR
669 views

2:50
Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption
IACR
343 views

5:19
Separable Statistics, New Extension to Linear Cryptanalysis
IACR
97 views

3:14
Security and Composition of Rational Cryptographic Protocols
IACR
207 views

21:14
Hedging Public Key Encryption in the Real World
IACR
126 views

25:51
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
IACR
831 views

22:49
ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
IACR
235 views

1:02:27
Invited talk: Advances in computer aided cryptography
IACR
379 views

22:43
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model
IACR
290 views

21:21
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
IACR
489 views

23:17
Cryptography with Updates
IACR
180 views