IACR

Videos from IACR

Page 5 of 16 • 370 total videos

Garbled Circuits With Sublinear Evaluator
22:19

Garbled Circuits With Sublinear Evaluator

IACR
742 views
session-5 Symmetric Cryptography
49:48

session-5 Symmetric Cryptography

IACR
398 views
Session 8: Cryptographic Attacks on Privacy
1:17:41

Session 8: Cryptographic Attacks on Privacy

IACR
918 views
session-5: Symmetric Cryptography
52:00

session-5: Symmetric Cryptography

IACR
494 views
session-28: Cryptanalysis of authenticated encryption schemes
53:07

session-28: Cryptanalysis of authenticated encryption schemes

IACR
234 views
Impact of Linear Layer on Algebraic Degree in SP-Networks
25:28

Impact of Linear Layer on Algebraic Degree in SP-Networks

IACR
174 views
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
20:54

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

IACR
292 views
Security of COFB against Chosen Ciphertext Attacks
20:32

Security of COFB against Chosen Ciphertext Attacks

IACR
102 views
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives
18:20

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives

IACR
77 views
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis
23:48

Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis

IACR
101 views
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
16:15

Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment

IACR
233 views
session-14: Cryptographic Protocols + Tools
1:11:02

session-14: Cryptographic Protocols + Tools

IACR
259 views
session-10: Cryptanalysis
52:00

session-10: Cryptanalysis

IACR
188 views
Multitarget decryption failure attacks and their application to Saber and Kyber
39:44

Multitarget decryption failure attacks and their application to Saber and Kyber

IACR
251 views
session-16: Public-Key Cryptanalysis & Authenticated Key Exchange
56:38

session-16: Public-Key Cryptanalysis & Authenticated Key Exchange

IACR
291 views
session-5: Post-Quantum Cryptography
56:46

session-5: Post-Quantum Cryptography

IACR
883 views
Boosting the Security of Blind Signature Schemes
10:46

Boosting the Security of Blind Signature Schemes

IACR
254 views
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
23:21

Symmetric Key Exchange with Full Forward Security and Robust Synchronization

IACR
315 views
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
15:14

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite

IACR
180 views
Optimizing Lattice-Based Group Signatures with 'Almost Free' Encryption
23:57

Optimizing Lattice-Based Group Signatures with 'Almost Free' Encryption

IACR
221 views
Cryptanalysis of an oblivious PRF from supersingular isogenies
27:06

Cryptanalysis of an oblivious PRF from supersingular isogenies

IACR
121 views
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
28:06

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions

IACR
174 views
Transciphering Framework for Approximate Homomorphic Encryption
19:12

Transciphering Framework for Approximate Homomorphic Encryption

IACR
414 views
A Geometric Approach to Linear Cryptanalysis
29:31

A Geometric Approach to Linear Cryptanalysis

IACR
817 views