IACR
Videos from IACR
Page 5 of 16 β’ 372 total videos
21:18
Innovative Property-Preserving Hash Functions for Efficient Hamming Distance Computation π
IACR
353 views
22:19
Efficient Garbled Circuits with Sublinear Evaluation | Eurocrypt 2022 π‘οΈ
IACR
742 views
49:48
Mastering Symmetric Cryptography: Secure Your Data π
IACR
398 views
1:17:41
Session 8: Cryptographic Attacks on Privacy
IACR
918 views
52:00
Mastering Symmetric Cryptography: Essential Concepts and Techniques π
IACR
494 views
53:07
Session 28: Breaking Down Authenticated Encryption Schemes π
IACR
234 views
25:28
Impact of Linear Layer on Algebraic Degree in SP-Networks
IACR
174 views
20:54
Enhanced Security Bounds for Ascon Against Differential & Linear Attacks π
IACR
292 views
20:32
Ensuring COFB Security Against Chosen Ciphertext Attacks π
IACR
102 views
18:20
Perfect Trees: Achieving Energy-Efficient Symmetric Encryption π
IACR
77 views
23:48
Unlocking Cryptography: New Statistical Model for Correlation Difference & Related-Key Linear Cryptanalysis π
IACR
101 views
16:15
Breaking the SoDark Cipher: Cryptanalysis Insights for HF Radio Link Security π
IACR
233 views
1:11:02
Session 14: Mastering Cryptographic Protocols & Essential Tools π
IACR
259 views
52:00
Cryptanalysis Session 10: Unlocking the Secrets of Cryptography π
IACR
188 views
39:44
Multitarget decryption failure attacks and their application to Saber and Kyber
IACR
251 views
56:38
Cryptanalysis of Short Exponent CRT-RSA & Secure Key Exchange Methods π
IACR
291 views
56:46
Post-Quantum Cryptography Session: Innovations in LWR-Based Hybrid Encryption π
IACR
883 views
10:46
Enhancing Security in Blind Signature Schemes π
IACR
254 views
23:21
Secure Symmetric Key Exchange with Forward Security & Reliable Synchronization π
IACR
315 views
15:14
In-Depth Cryptographic Analysis of Bluetooth Secure Connection Protocol π
IACR
180 views
23:57
Optimizing Lattice-Based Group Signatures with 'Almost Free' Encryption
IACR
221 views
27:06
Breaking an Oblivious PRF Based on Supersingular Isogenies π
IACR
121 views
28:06
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
IACR
174 views
19:12
Innovative Transciphering Framework Enhances Approximate Homomorphic Encryption π
IACR
414 views