IACR

Videos from IACR

Page 14 of 16 • 370 total videos

On the Power of Hierarchical Identity-Based Encryption
25:31

On the Power of Hierarchical Identity-Based Encryption

IACR
958 views
The Exact Round Complexity of Secure Computation
23:30

The Exact Round Complexity of Secure Computation

IACR
211 views
Securing Cryptography Implementations in Embedded Systems, part I
57:20

Securing Cryptography Implementations in Embedded Systems, part I

IACR
466 views
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning
22:49

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning

IACR
1.1K views
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
23:33

Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model

IACR
427 views
Cryptanalysis of the Co ACD Assumption
20:35

Cryptanalysis of the Co ACD Assumption

IACR
39 views
Predicate Encryption for Circuits from LWE
21:55

Predicate Encryption for Circuits from LWE

IACR
380 views
Integral Cryptanalysis on Full MISTY1
22:38

Integral Cryptanalysis on Full MISTY1

IACR
922 views
The State of Cryptographic Multilinear Maps
48:51

The State of Cryptographic Multilinear Maps

IACR
1.4K views
Observations on the SIMON Block Cipher Family
17:15

Observations on the SIMON Block Cipher Family

IACR
3.0K views
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
20:23

Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis

IACR
583 views
Phil Rogaway - IACR Distinguished Lecture 2015
1:13:39

Phil Rogaway - IACR Distinguished Lecture 2015

IACR
5.8K views
Invited Talk: Failures of secret key cryptography
1:00:57

Invited Talk: Failures of secret key cryptography

IACR
4.1K views
Impossible plaintext cryptanalysis and probable plaintext collision attacks of 64 bit block ci
26:38

Impossible plaintext cryptanalysis and probable plaintext collision attacks of 64 bit block ci

IACR
178 views
On Symmetric Encryption with Distinguishable Decryption Failures
20:44

On Symmetric Encryption with Distinguishable Decryption Failures

IACR
146 views
Complementing Feistel Ciphers
24:02

Complementing Feistel Ciphers

IACR
751 views
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2
20:08

On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2

IACR
267 views
Cryptography with Streaming Algorithms
16:56

Cryptography with Streaming Algorithms

IACR
489 views
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
19:02

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

IACR
9.4K views
Enhanced Key-Homomorphic Pseudorandom Functions
18:19

Enhanced Key-Homomorphic Pseudorandom Functions

IACR
612 views
Homomorphic Signatures with Efficient Verification for Polynomial Functions
19:58

Homomorphic Signatures with Efficient Verification for Polynomial Functions

IACR
828 views
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
15:06

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

IACR
287 views
Automated Analysis of Cryptographic Assumptions in Generic Group Models
17:51

Automated Analysis of Cryptographic Assumptions in Generic Group Models

IACR
336 views
Secure Signatures and Chosen Ciphertext Security in a Qu ...
16:24

Secure Signatures and Chosen Ciphertext Security in a Qu ...

IACR
477 views