IACR
Videos from IACR
Page 13 of 16 β’ 380 total videos
22:49
ZMAC: A Fast & Secure Tweakable Block Cipher Mode for Robust Message Authentication π
IACR
235 views
1:02:27
Unlocking the Future of Security: Advances in Computer-Aided Cryptography π
IACR
379 views
22:43
Exploring Parallel Masking Schemes & the Bounded Moment Leakage Model π
IACR
290 views
21:21
Unlocking Secure Data with Functional Encryption: From Deterministic to Randomized Functions π
IACR
489 views
23:17
Latest Advances in Cryptography: Insights from Eurocrypt 2017 π
IACR
180 views
21:34
Quantum-Resistant Symmetric Key Cryptography Using Hidden Shifts π
IACR
257 views
23:38
Breaking the Sub-Exponential Barrier in Obfustopia π
IACR
163 views
21:43
Breaking Down Candidate Branching Program Obfuscators π
IACR
275 views
35:44
Revolutionizing Fully Homomorphic Encryption: Bootstrapping in Under 0.1 Seconds π
IACR
1.8K views
25:30
MiMC: Fast & Secure Encryption & Hashing with Low Multiplicative Complexity π
IACR
582 views
19:30
DΓ©jΓ Q Revisited: Enhanced Reductions for q-Type Assumptions in Cryptography π
IACR
243 views
29:59
Breakthrough Nonlinear Invariant Attack on Full SCREAM, iSCREAM & Midori64 π
IACR
385 views
54:24
Asiacrypt 2016 Rump Session Highlights π
IACR
80 views
26:55
Enhancing Public-Key Cryptography: Bounded Leakage & Tamper Resistance π
IACR
163 views
27:07
Constant Round Asynchronous Multi Party Computation Based on One Way Functions
IACR
177 views
21:33
Indifferentiability of 8-Round Feistel Networks
IACR
564 views
22:10
Discover the SKINNY Family: Lightweight & Tweakable Block Ciphers for Modern Security π
IACR
965 views
21:55
Secure Multiplication Protocols: Ensuring Unconditional Security in Communication π
IACR
399 views
25:25
Ensuring Reliable Cryptographic Protocols: Probabilistic Termination & Composability π
IACR
227 views
24:37
Universal Obfuscation and Witness Encryption Research
IACR
648 views
23:12
Encryption Switching Protocols
IACR
418 views
17:14
In-Depth Cryptanalysis of the FLIP Stream Cipher Family π
IACR
259 views
25:16
In-Depth Cryptanalysis of GGH15 Multilinear Maps π
IACR
468 views
26:32
Overcoming Circuit Size Limits for Secure Computation with DDH π
IACR
865 views