IACR

Videos from IACR

Page 7 of 16 • 370 total videos

s-12: Lattice Cryptanalysis
47:15

s-12: Lattice Cryptanalysis

IACR
269 views
s-10: Lattice Cryptography
43:26

s-10: Lattice Cryptography

IACR
370 views
s-6: Quantum Cryptography 1
38:07

s-6: Quantum Cryptography 1

IACR
356 views
Large Message Homomorphic Secret Sharing from DCR and Applications
24:58

Large Message Homomorphic Secret Sharing from DCR and Applications

IACR
339 views
Time- and Space-Efficient Arguments from Groups of Unknown Order
28:40

Time- and Space-Efficient Arguments from Groups of Unknown Order

IACR
353 views
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applica...
25:09

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applica...

IACR
303 views
Differential-Linear Cryptanalysis from an Algebraic Perspective
20:27

Differential-Linear Cryptanalysis from an Algebraic Perspective

IACR
852 views
Hidden Cosets and Applications to Unclonable Cryptography
24:27

Hidden Cosets and Applications to Unclonable Cryptography

IACR
233 views
You Only Speak Once: Secure Multi-Party Computation with Stateless Ephemeral Roles
20:59

You Only Speak Once: Secure Multi-Party Computation with Stateless Ephemeral Roles

IACR
562 views
Traceable Secret Sharing and Its Applications
22:05

Traceable Secret Sharing and Its Applications

IACR
627 views
Multi-Input Quadratic Functional Encryption from Pairings
20:48

Multi-Input Quadratic Functional Encryption from Pairings

IACR
308 views
Linear Cryptanalysis of FF3-1 and FEA
27:01

Linear Cryptanalysis of FF3-1 and FEA

IACR
806 views
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
23:16

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques

IACR
266 views
s-20: Cryptographic Protocols and Secure Computation II
1:09:14

s-20: Cryptographic Protocols and Secure Computation II

IACR
361 views
s-16: Invited Talk II (Eike Kiltz)
1:06:25

s-16: Invited Talk II (Eike Kiltz)

IACR
796 views
s-12: Functional Encryption and Attributed-based Encryption
39:10

s-12: Functional Encryption and Attributed-based Encryption

IACR
520 views
s-10: Cryptographic Protocols and Secure Computation I
1:07:09

s-10: Cryptographic Protocols and Secure Computation I

IACR
522 views
s-7: Cryptographic Primitives I
58:37

s-7: Cryptographic Primitives I

IACR
530 views
s-1: Opening Remarks + Post-Quantum Cryptography
1:08:18

s-1: Opening Remarks + Post-Quantum Cryptography

IACR
1.0K views
Analysis of Multivariate Encryption Schemes: Application to Dob
21:19

Analysis of Multivariate Encryption Schemes: Application to Dob

IACR
305 views
Multivariate Public Key Cryptosystem Utilizing Sidon Spaces
21:03

Multivariate Public Key Cryptosystem Utilizing Sidon Spaces

IACR
347 views
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments
31:40

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments

IACR
113 views
Bootstrapping fully homomorphic encryption over the integers in less  than one second
23:38

Bootstrapping fully homomorphic encryption over the integers in less than one second

IACR
1.3K views
s-28: Crypto for the Cloud
46:46

s-28: Crypto for the Cloud

IACR
1.0K views