IACR

Videos from IACR

Page 13 of 16 β€’ 372 total videos

21:21

Unlocking Secure Data with Functional Encryption: From Deterministic to Randomized Functions πŸ”

IACR
489 views
23:17

Latest Advances in Cryptography: Insights from Eurocrypt 2017 πŸ”

IACR
180 views
21:34

Quantum-Resistant Symmetric Key Cryptography Using Hidden Shifts πŸ”

IACR
257 views
23:38

Breaking the Sub-Exponential Barrier in Obfustopia πŸ”“

IACR
163 views
21:43

Breaking Down Candidate Branching Program Obfuscators πŸ”

IACR
275 views
35:44

Revolutionizing Fully Homomorphic Encryption: Bootstrapping in Under 0.1 Seconds πŸš€

IACR
1.8K views
25:30

MiMC: Fast & Secure Encryption & Hashing with Low Multiplicative Complexity πŸ”

IACR
582 views
19:30

DΓ©jΓ  Q Revisited: Enhanced Reductions for q-Type Assumptions in Cryptography πŸ”

IACR
243 views
29:59

Breakthrough Nonlinear Invariant Attack on Full SCREAM, iSCREAM & Midori64 πŸ”“

IACR
385 views
54:24

Asiacrypt 2016 Rump Session Highlights πŸ”

IACR
80 views
26:55

Enhancing Public-Key Cryptography: Bounded Leakage & Tamper Resistance πŸ”

IACR
163 views
21:33

Indifferentiability of 8-Round Feistel Networks

IACR
564 views
22:10

Discover the SKINNY Family: Lightweight & Tweakable Block Ciphers for Modern Security πŸ”

IACR
965 views
21:55

Secure Multiplication Protocols: Ensuring Unconditional Security in Communication πŸ”’

IACR
399 views
25:25

Ensuring Reliable Cryptographic Protocols: Probabilistic Termination & Composability πŸ”

IACR
227 views
24:37

Universal Obfuscation and Witness Encryption Research

IACR
648 views
23:12

Encryption Switching Protocols

IACR
418 views
17:14

In-Depth Cryptanalysis of the FLIP Stream Cipher Family πŸ”

IACR
259 views
25:16

In-Depth Cryptanalysis of GGH15 Multilinear Maps πŸ”

IACR
468 views
26:32

Overcoming Circuit Size Limits for Secure Computation with DDH πŸ”

IACR
865 views
21:08

Quantum Attacks on Symmetric Cryptosystems: Breaking Protocols with Period Finding πŸ”“

IACR
561 views
23:15

Advanced Symmetric Encryption Techniques to Prevent Key Exfiltration πŸ”

IACR
854 views
22:19

Breaking Indistinguishability Obfuscation: Annihilation Attacks on Multilinear Maps πŸ”“

IACR
192 views
22:41

Breaking the Algebraic Eraser: Practical Cryptanalysis Insights πŸ”“

IACR
310 views