IACR
Videos from IACR
Page 5 of 16 • 370 total videos

22:19
Garbled Circuits With Sublinear Evaluator
IACR
742 views

49:48
session-5 Symmetric Cryptography
IACR
398 views

1:17:41
Session 8: Cryptographic Attacks on Privacy
IACR
918 views

52:00
session-5: Symmetric Cryptography
IACR
494 views

53:07
session-28: Cryptanalysis of authenticated encryption schemes
IACR
234 views

25:28
Impact of Linear Layer on Algebraic Degree in SP-Networks
IACR
174 views

20:54
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
IACR
292 views

20:32
Security of COFB against Chosen Ciphertext Attacks
IACR
102 views

18:20
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives
IACR
77 views

23:48
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis
IACR
101 views

16:15
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
IACR
233 views

1:11:02
session-14: Cryptographic Protocols + Tools
IACR
259 views

52:00
session-10: Cryptanalysis
IACR
188 views

39:44
Multitarget decryption failure attacks and their application to Saber and Kyber
IACR
251 views

56:38
session-16: Public-Key Cryptanalysis & Authenticated Key Exchange
IACR
291 views

56:46
session-5: Post-Quantum Cryptography
IACR
883 views

10:46
Boosting the Security of Blind Signature Schemes
IACR
254 views

23:21
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
IACR
315 views

15:14
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
IACR
180 views

23:57
Optimizing Lattice-Based Group Signatures with 'Almost Free' Encryption
IACR
221 views

27:06
Cryptanalysis of an oblivious PRF from supersingular isogenies
IACR
121 views

28:06
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
IACR
174 views

19:12
Transciphering Framework for Approximate Homomorphic Encryption
IACR
414 views

29:31
A Geometric Approach to Linear Cryptanalysis
IACR
817 views