IACR

Videos from IACR

Page 16 of 16 β€’ 380 total videos

24:52

Low-Communication Multiparty Computation πŸ›‘οΈ

IACR
2.9K views
24:08

Unlocking Security: Incremental Deterministic Public-Key Encryption Explained πŸ”

IACR
367 views
28:32

Enhancing Fully Homomorphic Encryption: Public Key Compression & Modulus Switching | Eurocrypt 2012 πŸ“œ

IACR
967 views
23:04

Lattice Signatures Without Trapdoors – Insights from Eurocrypt 2012 πŸ”

IACR
1.4K views
17:35

Enhancing Symmetric Encryption Security Against Ciph ... | Eurocrypt 2012 πŸ“œ

IACR
291 views
57:55

Master Homomorphic Encryption: In-Depth Tutorial (Part 2) by Shai Halevi at Crypto 2011 πŸ”

IACR
2.9K views
20:45

Efficient Public-Key Encryption Based on Computational Diffie-Hellman in the Standard Model

IACR
1.2K views
21:05

Speeding Up Discrete Logarithm Computations with Equivalence Classes πŸ”

IACR
286 views
23:43

Efficient Fully Homomorphic Encryption with Compact Keys and Ciphertexts πŸ”

IACR
1.4K views
21:30

Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem πŸ”

IACR
426 views
24:26

Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions

IACR
465 views
26:19

Enhancing Security with RSA-Based Identity and Multi-Signature Schemes πŸ”

IACR
704 views
18:27

Secure and Misuse-Resistant Encryption for Key-Dependent Data πŸ”

IACR
487 views
18:37

Exploring Merkle Puzzles in Quantum Cryptography

IACR
602 views
19:25

Classical Cryptographic Protocols in a Quantum Era πŸ”

IACR
532 views
20:26

Order-Preserving Encryption Revisited: Enhanced Security Analysis and Alternative Approaches

IACR
1.8K views
19:12

Public-Key Identification Schemes Utilizing Multivariate Quadratic Polynomials

IACR
1.1K views
6:22

Breaking Full AES with Biclique Cryptanalysis πŸ”“

IACR
2.6K views
17:52

Explore the PHOTON Family: Efficient Lightweight Hash Functions for Secure Cryptography πŸ”

IACR
1.9K views
17:39

Breaking PrintCIPHER: A Cryptanalysis Breakthrough πŸ”“

IACR
838 views