IACR

Videos from IACR

Page 13 of 16 • 370 total videos

Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts
21:34

Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts

IACR
257 views
Breaking the Sub Exponential Barrier in Obfustopia
23:38

Breaking the Sub Exponential Barrier in Obfustopia

IACR
163 views
Cryptanalyses of Candidate Branching Program Obfuscators
21:43

Cryptanalyses of Candidate Branching Program Obfuscators

IACR
275 views
Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds
35:44

Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds

IACR
1.8K views
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity
25:30

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity

IACR
582 views
Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions
19:30

Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions

IACR
243 views
Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM,and Midori64
29:59

Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM,and Midori64

IACR
385 views
Asiacrypt 2016 Rump Session
54:24

Asiacrypt 2016 Rump Session

IACR
80 views
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
26:55

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience

IACR
163 views
Indifferentiability of 8-Round Feistel Networks
21:33

Indifferentiability of 8-Round Feistel Networks

IACR
564 views
The SKINNY Family of Lightweight Tweakable Block Ciphers
22:10

The SKINNY Family of Lightweight Tweakable Block Ciphers

IACR
965 views
On the Communication required for Unconditionally Secure Multiplication
21:55

On the Communication required for Unconditionally Secure Multiplication

IACR
399 views
Probabilistic Termination and Composability of Cryptographic Protocols
25:25

Probabilistic Termination and Composability of Cryptographic Protocols

IACR
227 views
Universal Obfuscation and Witness Encryption Research
24:37

Universal Obfuscation and Witness Encryption Research

IACR
648 views
Encryption Switching Protocols
23:12

Encryption Switching Protocols

IACR
418 views
Cryptanalysis of the FLIP Family of Stream Ciphers
17:14

Cryptanalysis of the FLIP Family of Stream Ciphers

IACR
259 views
Cryptanalysis of GGH15 Multilinear Maps
25:16

Cryptanalysis of GGH15 Multilinear Maps

IACR
468 views
Breaking the Circuit Size Barrier for Secure Computation Under DDH
26:32

Breaking the Circuit Size Barrier for Secure Computation Under DDH

IACR
865 views
Breaking Symmetric Cryptosystems using Quantum Period Finding
21:08

Breaking Symmetric Cryptosystems using Quantum Period Finding

IACR
561 views
Big Key Symmetric Encryption  Resisting Key Exfiltration
23:15

Big Key Symmetric Encryption Resisting Key Exfiltration

IACR
854 views
Annihilation Attacks for Multilinear Maps  Cryptanalysis of Indistinguishability Obfuscation over GG
22:19

Annihilation Attacks for Multilinear Maps Cryptanalysis of Indistinguishability Obfuscation over GG

IACR
192 views
A Practical Cryptanalysis of the Algebraic Eraser
22:41

A Practical Cryptanalysis of the Algebraic Eraser

IACR
310 views
QcBits  constant time small key code based cryptography
26:50

QcBits constant time small key code based cryptography

IACR
348 views
Obvious in Hindsight  From Side Channel Attacks to the Security Challenges Ahead
55:57

Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead

IACR
2.6K views