IACR
Videos from IACR
Page 6 of 16 β’ 372 total videos
29:31
Unlocking Cryptography: Geometric Techniques in Linear Cryptanalysis π
IACR
817 views
23:57
Enhanced Boolean Search on Encrypted Data with Minimized Data Leakage π
IACR
206 views
14:44
Advancing Secure Authenticated Encryption Using Pseudorandom Permutations
IACR
111 views
22:57
Breaking Rasta and Dasta: Algebraic Attacks with Low-Degree Equations π
IACR
108 views
26:41
Gladius: LWR based efficient hybrid public key encryption with distributed decryption
IACR
214 views
27:30
Unclonable Encryption Explained: Insights from TCC 2021 π‘οΈ
IACR
203 views
38:54
Enhancing Quantum Security with Classical Communication Techniques π
IACR
146 views
59:28
Post-Quantum Cryptography: Preparing for the Future of Secure Communication π
IACR
368 views
56:16
Unlocking Symmetric Designs for Enhanced Leakage-Resilience π
IACR
139 views
1:01:52
Eurocrypt 2021 Rump Session Part 2: Key Highlights & Insights π
IACR
839 views
56:02
Mastering Symmetric Cryptanalysis: Techniques & Insights π
IACR
256 views
57:47
Unlocking Security: Public Key Cryptography & Isogenies Explained π
IACR
403 views
1:22:38
Eurocrypt 2021: Opening Remarks and Best Paper Awards
IACR
1.9K views
20:42
Unlocking Privacy: The Power of Paillier for Homomorphic Secret Sharing & Silent OT π
IACR
1.2K views
28:02
Enhanced Cryptanalysis of UOV and Rainbow Algorithms π‘οΈ
IACR
881 views
28:43
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems
IACR
253 views
24:59
Breaking Down GPRS Encryption: GEA-1 & GEA-2 Cryptanalysis π
IACR
350 views
24:22
Unlocking Cryptography: How Machine Learning Powers Modern Cryptanalysis π
IACR
1.4K views
18:12
Unlocking Cryptography: New Differential-Linear Techniques for Practical Cryptanalysis π
IACR
212 views
48:04
Post-Quantum Crypto Explained: The Future of Secure Communications π
IACR
406 views
20:08
Introducing SPEEDY: A Ultra Low-Latency Block Cipher Designed at Gate Level π
IACR
306 views
20:27
Enhanced FPGA Security with Obfuscated Cryptography π
IACR
271 views
22:54
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
IACR
600 views
26:00
Concrete Quantum Attacks on Binary Elliptic Curve Cryptography π
IACR
270 views