IACR

Videos from IACR

Page 5 of 16 β€’ 372 total videos

21:18

Innovative Property-Preserving Hash Functions for Efficient Hamming Distance Computation πŸ”

IACR
353 views
22:19

Efficient Garbled Circuits with Sublinear Evaluation | Eurocrypt 2022 πŸ›‘οΈ

IACR
742 views
49:48

Mastering Symmetric Cryptography: Secure Your Data πŸ”

IACR
398 views
1:17:41

Session 8: Cryptographic Attacks on Privacy

IACR
918 views
52:00

Mastering Symmetric Cryptography: Essential Concepts and Techniques πŸ”

IACR
494 views
53:07

Session 28: Breaking Down Authenticated Encryption Schemes πŸ”

IACR
234 views
25:28

Impact of Linear Layer on Algebraic Degree in SP-Networks

IACR
174 views
20:54

Enhanced Security Bounds for Ascon Against Differential & Linear Attacks πŸ”’

IACR
292 views
20:32

Ensuring COFB Security Against Chosen Ciphertext Attacks πŸ”

IACR
102 views
18:20

Perfect Trees: Achieving Energy-Efficient Symmetric Encryption πŸ”’

IACR
77 views
23:48

Unlocking Cryptography: New Statistical Model for Correlation Difference & Related-Key Linear Cryptanalysis πŸ”

IACR
101 views
16:15

Breaking the SoDark Cipher: Cryptanalysis Insights for HF Radio Link Security πŸ”

IACR
233 views
1:11:02

Session 14: Mastering Cryptographic Protocols & Essential Tools πŸ”

IACR
259 views
52:00

Cryptanalysis Session 10: Unlocking the Secrets of Cryptography πŸ”

IACR
188 views
39:44

Multitarget decryption failure attacks and their application to Saber and Kyber

IACR
251 views
56:38

Cryptanalysis of Short Exponent CRT-RSA & Secure Key Exchange Methods πŸ”

IACR
291 views
56:46

Post-Quantum Cryptography Session: Innovations in LWR-Based Hybrid Encryption πŸ”

IACR
883 views
10:46

Enhancing Security in Blind Signature Schemes πŸ”

IACR
254 views
23:21

Secure Symmetric Key Exchange with Forward Security & Reliable Synchronization πŸ”

IACR
315 views
15:14

In-Depth Cryptographic Analysis of Bluetooth Secure Connection Protocol πŸ”’

IACR
180 views
23:57

Optimizing Lattice-Based Group Signatures with 'Almost Free' Encryption

IACR
221 views
27:06

Breaking an Oblivious PRF Based on Supersingular Isogenies πŸ”

IACR
121 views
28:06

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions

IACR
174 views
19:12

Innovative Transciphering Framework Enhances Approximate Homomorphic Encryption πŸ”

IACR
414 views