IACR

Videos from IACR

Page 9 of 16 • 370 total videos

Physical Security Analysis of Unrolled Cryptography on Silicon
20:37

Physical Security Analysis of Unrolled Cryptography on Silicon

IACR
326 views
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
21:43

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

IACR
921 views
Improving the Performance of the Picnic Signature Scheme
22:50

Improving the Performance of the Picnic Signature Scheme

IACR
497 views
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
23:11

Investigating Profiled Side-Channel Attacks Against the DES Key Schedule

IACR
357 views
s-26: Cryptanalysis 2
52:08

s-26: Cryptanalysis 2

IACR
358 views
s-130: Test of Time Award Ceremony + Cryptanalysis 1
1:17:40

s-130: Test of Time Award Ceremony + Cryptanalysis 1

IACR
448 views
s-6: Public-key, Functional, & Witness Encryption
1:03:19

s-6: Public-key, Functional, & Witness Encryption

IACR
706 views
ACAS Third Session (Advanced Cryptography Applications and Standards 2020)
1:10:35

ACAS Third Session (Advanced Cryptography Applications and Standards 2020)

IACR
278 views
ACAS Second Session (Advanced Cryptography Applications and Standards Workshop 2020)
1:22:52

ACAS Second Session (Advanced Cryptography Applications and Standards Workshop 2020)

IACR
307 views
ACAS first session (Workshop on Advanced Cryptography Applications and Standards)
1:40:53

ACAS first session (Workshop on Advanced Cryptography Applications and Standards)

IACR
455 views
Anonymous Tokens with Private Metadata Bit
20:13

Anonymous Tokens with Private Metadata Bit

IACR
772 views
Cryptanalysis of LEDAcrypt
22:50

Cryptanalysis of LEDAcrypt

IACR
340 views
Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr...
34:22

Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr...

IACR
352 views
Collusion Resistant Watermarkable PRFs from Standard Assumptions
19:50

Collusion Resistant Watermarkable PRFs from Standard Assumptions

IACR
271 views
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu...
17:30

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu...

IACR
316 views
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
21:26

Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme

IACR
758 views
Cryptanalytic Extraction of Neural Network Models
24:56

Cryptanalytic Extraction of Neural Network Models

IACR
1.5K views
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
25:08

Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment

IACR
634 views
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields
22:03

Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields

IACR
345 views
s-185 Cryptographic Primitives
1:02:59

s-185 Cryptographic Primitives

IACR
303 views
s-170 Post Quantum Cryptography
48:37

s-170 Post Quantum Cryptography

IACR
405 views
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Small...
21:01

Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Small...

IACR
173 views
Improved Classical Cryptanalysis of SIKE in Practice
29:40

Improved Classical Cryptanalysis of SIKE in Practice

IACR
531 views
Enhanced Security in Lattices with Polynomial Moduli: PRF, IBE, All-but-many LTF, and More
21:40

Enhanced Security in Lattices with Polynomial Moduli: PRF, IBE, All-but-many LTF, and More

IACR
138 views