IACR

Videos from IACR

Page 6 of 16 • 370 total videos

Efficient Boolean Search over Encrypted Data with Reduced Leakage
23:57

Efficient Boolean Search over Encrypted Data with Reduced Leakage

IACR
206 views
Advancing Secure Authenticated Encryption Using Pseudorandom Permutations
14:44

Advancing Secure Authenticated Encryption Using Pseudorandom Permutations

IACR
111 views
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations
22:57

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations

IACR
108 views
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
26:41

Gladius: LWR based efficient hybrid public key encryption with distributed decryption

IACR
214 views
Unclonable Encryption, Revisited
27:30

Unclonable Encryption, Revisited

IACR
203 views
Secure Quantum Computation with Classical Communication
38:54

Secure Quantum Computation with Classical Communication

IACR
146 views
session-196: Post-Quantum Cryptography
59:28

session-196: Post-Quantum Cryptography

IACR
368 views
session-194: Symmetric Designs and Leakage-Resilience
56:16

session-194: Symmetric Designs and Leakage-Resilience

IACR
139 views
Eurocrypt 2021 rump session part deux
1:01:52

Eurocrypt 2021 rump session part deux

IACR
839 views
session-6: Symmetric Cryptanalysis
56:02

session-6: Symmetric Cryptanalysis

IACR
256 views
session-4: Public Key Cryptography and Isogenies
57:47

session-4: Public Key Cryptography and Isogenies

IACR
403 views
Eurocrypt 2021: Opening Remarks and Best Paper Awards
1:22:38

Eurocrypt 2021: Opening Remarks and Best Paper Awards

IACR
1.9K views
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
20:42

The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT

IACR
1.2K views
Improved cryptanalysis of UOV and Rainbow
28:02

Improved cryptanalysis of UOV and Rainbow

IACR
881 views
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems
28:43

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems

IACR
253 views
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
24:59

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2

IACR
350 views
A Deeper Look at Machine Learning-Based Cryptanalysis
24:22

A Deeper Look at Machine Learning-Based Cryptanalysis

IACR
1.4K views
Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ...
18:12

Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ...

IACR
212 views
s-2: Post-quantum crypto (part I)
48:04

s-2: Post-quantum crypto (part I)

IACR
406 views
The SPEEDY Family of Block Ciphers: Engineering an Ultra Low-Latency Cipher from Gate Level for...
20:08

The SPEEDY Family of Block Ciphers: Engineering an Ultra Low-Latency Cipher from Gate Level for...

IACR
306 views
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
20:27

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

IACR
271 views
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
22:54

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

IACR
600 views
Concrete quantum cryptanalysis of binary elliptic curves
26:00

Concrete quantum cryptanalysis of binary elliptic curves

IACR
270 views
s-164: Low-Complexity Cryptography
31:16

s-164: Low-Complexity Cryptography

IACR
260 views