IACR

Videos from IACR

Page 13 of 16 β€’ 380 total videos

22:49

ZMAC: A Fast & Secure Tweakable Block Cipher Mode for Robust Message Authentication πŸ”

IACR
235 views
1:02:27

Unlocking the Future of Security: Advances in Computer-Aided Cryptography πŸ”

IACR
379 views
22:43

Exploring Parallel Masking Schemes & the Bounded Moment Leakage Model πŸ”’

IACR
290 views
21:21

Unlocking Secure Data with Functional Encryption: From Deterministic to Randomized Functions πŸ”

IACR
489 views
23:17

Latest Advances in Cryptography: Insights from Eurocrypt 2017 πŸ”

IACR
180 views
21:34

Quantum-Resistant Symmetric Key Cryptography Using Hidden Shifts πŸ”

IACR
257 views
23:38

Breaking the Sub-Exponential Barrier in Obfustopia πŸ”“

IACR
163 views
21:43

Breaking Down Candidate Branching Program Obfuscators πŸ”

IACR
275 views
35:44

Revolutionizing Fully Homomorphic Encryption: Bootstrapping in Under 0.1 Seconds πŸš€

IACR
1.8K views
25:30

MiMC: Fast & Secure Encryption & Hashing with Low Multiplicative Complexity πŸ”

IACR
582 views
19:30

DΓ©jΓ  Q Revisited: Enhanced Reductions for q-Type Assumptions in Cryptography πŸ”

IACR
243 views
29:59

Breakthrough Nonlinear Invariant Attack on Full SCREAM, iSCREAM & Midori64 πŸ”“

IACR
385 views
54:24

Asiacrypt 2016 Rump Session Highlights πŸ”

IACR
80 views
26:55

Enhancing Public-Key Cryptography: Bounded Leakage & Tamper Resistance πŸ”

IACR
163 views
27:07

Constant Round Asynchronous Multi Party Computation Based on One Way Functions

IACR
177 views
21:33

Indifferentiability of 8-Round Feistel Networks

IACR
564 views
22:10

Discover the SKINNY Family: Lightweight & Tweakable Block Ciphers for Modern Security πŸ”

IACR
965 views
21:55

Secure Multiplication Protocols: Ensuring Unconditional Security in Communication πŸ”’

IACR
399 views
25:25

Ensuring Reliable Cryptographic Protocols: Probabilistic Termination & Composability πŸ”

IACR
227 views
24:37

Universal Obfuscation and Witness Encryption Research

IACR
648 views
23:12

Encryption Switching Protocols

IACR
418 views
17:14

In-Depth Cryptanalysis of the FLIP Stream Cipher Family πŸ”

IACR
259 views
25:16

In-Depth Cryptanalysis of GGH15 Multilinear Maps πŸ”

IACR
468 views
26:32

Overcoming Circuit Size Limits for Secure Computation with DDH πŸ”

IACR
865 views