IACR

Videos from IACR

Page 6 of 16 β€’ 372 total videos

29:31

Unlocking Cryptography: Geometric Techniques in Linear Cryptanalysis πŸ”

IACR
817 views
23:57

Enhanced Boolean Search on Encrypted Data with Minimized Data Leakage πŸ”’

IACR
206 views
14:44

Advancing Secure Authenticated Encryption Using Pseudorandom Permutations

IACR
111 views
22:57

Breaking Rasta and Dasta: Algebraic Attacks with Low-Degree Equations πŸ”“

IACR
108 views
26:41

Gladius: LWR based efficient hybrid public key encryption with distributed decryption

IACR
214 views
27:30

Unclonable Encryption Explained: Insights from TCC 2021 πŸ›‘οΈ

IACR
203 views
38:54

Enhancing Quantum Security with Classical Communication Techniques πŸ”’

IACR
146 views
59:28

Post-Quantum Cryptography: Preparing for the Future of Secure Communication πŸ”

IACR
368 views
56:16

Unlocking Symmetric Designs for Enhanced Leakage-Resilience πŸ”

IACR
139 views
1:01:52

Eurocrypt 2021 Rump Session Part 2: Key Highlights & Insights πŸ”

IACR
839 views
56:02

Mastering Symmetric Cryptanalysis: Techniques & Insights πŸ”

IACR
256 views
57:47

Unlocking Security: Public Key Cryptography & Isogenies Explained πŸ”

IACR
403 views
1:22:38

Eurocrypt 2021: Opening Remarks and Best Paper Awards

IACR
1.9K views
20:42

Unlocking Privacy: The Power of Paillier for Homomorphic Secret Sharing & Silent OT πŸ”’

IACR
1.2K views
28:02

Enhanced Cryptanalysis of UOV and Rainbow Algorithms πŸ›‘οΈ

IACR
881 views
28:43

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems

IACR
253 views
24:59

Breaking Down GPRS Encryption: GEA-1 & GEA-2 Cryptanalysis πŸ”“

IACR
350 views
24:22

Unlocking Cryptography: How Machine Learning Powers Modern Cryptanalysis πŸ”

IACR
1.4K views
18:12

Unlocking Cryptography: New Differential-Linear Techniques for Practical Cryptanalysis πŸ”

IACR
212 views
48:04

Post-Quantum Crypto Explained: The Future of Secure Communications πŸ”

IACR
406 views
20:08

Introducing SPEEDY: A Ultra Low-Latency Block Cipher Designed at Gate Level πŸ”

IACR
306 views
20:27

Enhanced FPGA Security with Obfuscated Cryptography πŸ”’

IACR
271 views
22:54

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

IACR
600 views
26:00

Concrete Quantum Attacks on Binary Elliptic Curve Cryptography πŸ”

IACR
270 views