TheIACR/ACS 2019/A perspective on standardization of advanced cryptography at NIST.en.transcribed.srt |
75 KB |
TheIACR/ACS 2019/A perspective on standardization of advanced cryptography at NIST.mp4 |
75.1 MB |
TheIACR/ACS 2019/Advanced Cryptography on the Way to Practice.en.transcribed.srt |
66 KB |
TheIACR/ACS 2019/Advanced Cryptography on the Way to Practice.mp4 |
179.2 MB |
TheIACR/ACS 2019/BLS signatures, hashing to curves, and more dispatches from the IETF.en.transcribed.srt |
59 KB |
TheIACR/ACS 2019/BLS signatures, hashing to curves, and more dispatches from the IETF.mp4 |
34.3 MB |
TheIACR/ACS 2019/Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.en.transcribed.srt |
68 KB |
TheIACR/ACS 2019/Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.mp4 |
42.4 MB |
TheIACR/ACS 2019/HomomorphicEncryption.org - a community effort.en.transcribed.srt |
67 KB |
TheIACR/ACS 2019/HomomorphicEncryption.org - a community effort.mp4 |
157.4 MB |
TheIACR/ACS 2019/Lessons about Standardization.en.transcribed.srt |
51 KB |
TheIACR/ACS 2019/Lessons about Standardization.mp4 |
108.7 MB |
TheIACR/ACS 2019/Panel & Further Discussion.en.transcribed.srt |
130 KB |
TheIACR/ACS 2019/Panel & Further Discussion.mp4 |
87.7 MB |
TheIACR/ACS 2019/Towards Standardizing Zero Knowledge.en.transcribed.srt |
70 KB |
TheIACR/ACS 2019/Towards Standardizing Zero Knowledge.mp4 |
174.5 MB |
TheIACR/Asiacrypt 2016/A General Polynomial Selection Method and New Asymptotic Complexities for ....mp4 |
51 MB |
TheIACR/Asiacrypt 2016/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.mp4 |
64.4 MB |
TheIACR/Asiacrypt 2016/A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4 |
85.3 MB |
TheIACR/Asiacrypt 2016/A Shuffle Argument Secure in the Generic Model.mp4 |
54.3 MB |
TheIACR/Asiacrypt 2016/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4 |
59.1 MB |
TheIACR/Asiacrypt 2016/Adaptive Oblivious Transfer and Generalization.mp4 |
16.1 MB |
TheIACR/Asiacrypt 2016/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ....mp4 |
95.3 MB |
TheIACR/Asiacrypt 2016/Asiacrypt 2016 Rump Session.mp4 |
263.7 MB |
TheIACR/Asiacrypt 2016/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4 |
203.3 MB |
TheIACR/Asiacrypt 2016/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4 |
44.2 MB |
TheIACR/Asiacrypt 2016/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4 |
78.7 MB |
TheIACR/Asiacrypt 2016/Authenticated Encryption with Variable Stretch.mp4 |
26.3 MB |
TheIACR/Asiacrypt 2016/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4 |
175.7 MB |
TheIACR/Asiacrypt 2016/Characterisation and Estimation of the Key Rank Distribution in the context of side channel ....mp4 |
68.2 MB |
TheIACR/Asiacrypt 2016/Cliptography Clipping the Power of Kleptographic Attacks.mp4 |
108.1 MB |
TheIACR/Asiacrypt 2016/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4 |
61.4 MB |
TheIACR/Asiacrypt 2016/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4 |
81.5 MB |
TheIACR/Asiacrypt 2016/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ....mp4 |
122.5 MB |
TheIACR/Asiacrypt 2016/Cryptography in Vietnam in the French and American Wars.mp4 |
118.5 MB |
TheIACR/Asiacrypt 2016/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4 |
110.9 MB |
TheIACR/Asiacrypt 2016/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting_.mp4 |
30.1 MB |
TheIACR/Asiacrypt 2016/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4 |
17.8 MB |
TheIACR/Asiacrypt 2016/Efficient Public Key Distance Bounding Protocol.mp4 |
124.7 MB |
TheIACR/Asiacrypt 2016/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4 |
57.3 MB |
TheIACR/Asiacrypt 2016/Efficient and Provable White Box Primitives.mp4 |
35 MB |
TheIACR/Asiacrypt 2016/Faster Fully Homomorphic Encryption Bootstrapping in less than 0.1 Seconds.mp4 |
118.2 MB |
TheIACR/Asiacrypt 2016/From 5 pass MQ based identification to MQ based signatures.mp4 |
29.3 MB |
TheIACR/Asiacrypt 2016/From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4 |
40.5 MB |
TheIACR/Asiacrypt 2016/General IACR Business Meeting.mp4 |
126 MB |
TheIACR/Asiacrypt 2016/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4 |
89.6 MB |
TheIACR/Asiacrypt 2016/How to Generate and use Universal Samplers.mp4 |
35.1 MB |
TheIACR/Asiacrypt 2016/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4 |
31 MB |
TheIACR/Asiacrypt 2016/Indistinguishable Proofs of Work or Knowledge.mp4 |
91.9 MB |
TheIACR/Asiacrypt 2016/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4 |
105.2 MB |
TheIACR/Asiacrypt 2016/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4 |
131.5 MB |
TheIACR/Asiacrypt 2016/MiMC Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4 |
72 MB |
TheIACR/Asiacrypt 2016/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4 |
27.6 MB |
TheIACR/Asiacrypt 2016/Multi Input Functional Encryption with Unbounded Message Security.mp4 |
98.5 MB |
TheIACR/Asiacrypt 2016/Multi Key Homomorphic Authenticators.mp4 |
66.6 MB |
TheIACR/Asiacrypt 2016/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4 |
61.6 MB |
TheIACR/Asiacrypt 2016/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4 |
449.5 MB |
TheIACR/Asiacrypt 2016/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4 |
59.3 MB |
TheIACR/Asiacrypt 2016/On the Security of Supersingular Isogeny Cryptosystems.mp4 |
51.8 MB |
TheIACR/Asiacrypt 2016/Optimization of LPN Solving Algorithms.mp4 |
51.2 MB |
TheIACR/Asiacrypt 2016/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4 |
65.7 MB |
TheIACR/Asiacrypt 2016/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4 |
49 MB |
TheIACR/Asiacrypt 2016/Reactive Garbling Foundation, Instantiation, Application.mp4 |
47.5 MB |
TheIACR/Asiacrypt 2016/Reverse Cycle Walking and Its Applications.mp4 |
95 MB |
TheIACR/Asiacrypt 2016/Selective Opening Security from Simulatable Data Encapsulation.mp4 |
40.3 MB |
TheIACR/Asiacrypt 2016/Selective Opening Security in the Presence of Randomness Failures.mp4 |
48.5 MB |
TheIACR/Asiacrypt 2016/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4 |
146.8 MB |
TheIACR/Asiacrypt 2016/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4 |
48.9 MB |
TheIACR/Asiacrypt 2016/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4 |
63.2 MB |
TheIACR/Asiacrypt 2016/Size-Hiding Computation for Multiple Parties.mp4 |
62.8 MB |
TheIACR/Asiacrypt 2016/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4 |
43.9 MB |
TheIACR/Asiacrypt 2016/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4 |
63.7 MB |
TheIACR/Asiacrypt 2016/The Kernel Matrix Diffie Hellman Assumption.mp4 |
93.2 MB |
TheIACR/Asiacrypt 2016/The Reality of Cryptographic Deployments on the Internet.mp4 |
30.2 MB |
TheIACR/Asiacrypt 2016/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4 |
56.2 MB |
TheIACR/Asiacrypt 2016/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4 |
62 MB |
TheIACR/Asiacrypt 2016/Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4 |
42.2 MB |
TheIACR/Asiacrypt 2016/Universal Composition with Responsive Environments.mp4 |
36.2 MB |
TheIACR/Asiacrypt 2016/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4 |
32.5 MB |
TheIACR/Asiacrypt 2016/Unknown-Input Attacks in the Parallel Setting Improving the Security of the ....mp4 |
58.9 MB |
TheIACR/Asiacrypt 2016/Verifiable Functional Encryption.mp4 |
74.5 MB |
TheIACR/Asiacrypt 2016/Welcome to Asiacrypt.mp4 |
41.6 MB |
TheIACR/Asiacrypt 2016/When are Fuzzy Extractors Possible.mp4 |
52.1 MB |
TheIACR/Asiacrypt 2016/Zero Knowledge Accumulators and Set Algebra.mp4 |
22.2 MB |
TheIACR/Asiacrypt 2016/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4 |
55.2 MB |
TheIACR/Asiacrypt 2017/A Subversion-Resistant SNARK.mp4 |
150.6 MB |
TheIACR/Asiacrypt 2017/A simple and compact algorithm for SIDH with arbitrary degree isogenies.mp4 |
121.1 MB |
TheIACR/Asiacrypt 2017/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.mp4 |
3.5 MB |
TheIACR/Asiacrypt 2017/Access Control Encryption for General Policies from Standard Assumptions.mp4 |
32.8 MB |
TheIACR/Asiacrypt 2017/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.mp4 |
29.2 MB |
TheIACR/Asiacrypt 2017/Amortizing Randomness Complexity in Private Circuits.mp4 |
105.1 MB |
TheIACR/Asiacrypt 2017/An Efficient Pairing Based Shuffle Argument.mp4 |
42.1 MB |
TheIACR/Asiacrypt 2017/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.mp4 |
99.5 MB |
TheIACR/Asiacrypt 2017/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.mp4 |
52.2 MB |
TheIACR/Asiacrypt 2017/Analyzing Multi Key Security Degradation.mp4 |
140.8 MB |
TheIACR/Asiacrypt 2017/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.mp4 |
133.8 MB |
TheIACR/Asiacrypt 2017/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.mp4 |
22 MB |
TheIACR/Asiacrypt 2017/Blockcipher based MACs Beyond the Birthday Bound without Message Length.mp4 |
166.7 MB |
TheIACR/Asiacrypt 2017/Coded BKW with Sieving.mp4 |
49.5 MB |
TheIACR/Asiacrypt 2017/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.mp4 |
64.6 MB |
TheIACR/Asiacrypt 2017/Combinatorics in Information theoretic cryptography.mp4 |
141.1 MB |
TheIACR/Asiacrypt 2017/Consolidating Inner product Masking.mp4 |
160.4 MB |
TheIACR/Asiacrypt 2017/Cycle slicer An algorithm for building permutations on special domains.mp4 |
178.5 MB |
TheIACR/Asiacrypt 2017/Efficient Ring Signatures in the Standard Model.mp4 |
48.6 MB |
TheIACR/Asiacrypt 2017/Efficient Scalable Constant Round MPC via Garbled Circuits.mp4 |
67.2 MB |
TheIACR/Asiacrypt 2017/Faster Algorithms for Isogeny Problems using Torsion Point Images.mp4 |
82.5 MB |
TheIACR/Asiacrypt 2017/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.mp4 |
167.7 MB |
TheIACR/Asiacrypt 2017/Full state keyed duplex with built in multi user support.mp4 |
79.6 MB |
TheIACR/Asiacrypt 2017/Grover Meets Simon - Quantumly Attacking the FX construction.mp4 |
122.3 MB |
TheIACR/Asiacrypt 2017/Homomorphic Encryption for Arithmetic of Approximate Numbers.mp4 |
136.7 MB |
TheIACR/Asiacrypt 2017/How to use Metaheuristics for Design of Symmetric Key primitives.mp4 |
184.2 MB |
TheIACR/Asiacrypt 2017/IACR Business Meeting.mp4 |
351.5 MB |
TheIACR/Asiacrypt 2017/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.mp4 |
67.2 MB |
TheIACR/Asiacrypt 2017/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.mp4 |
39 MB |
TheIACR/Asiacrypt 2017/Improved Security for OCB3.mp4 |
96.7 MB |
TheIACR/Asiacrypt 2017/Instantaneous Decentralized Poker.mp4 |
146.1 MB |
TheIACR/Asiacrypt 2017/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes - YouTube.mp4 |
103.6 MB |
TheIACR/Asiacrypt 2017/Kummer for Genus One over Prime Order Fields.mp4 |
43.2 MB |
TheIACR/Asiacrypt 2017/Linear Cryptanalysis of DES with Asymmetries.mp4 |
32.3 MB |
TheIACR/Asiacrypt 2017/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.mp4 |
89.7 MB |
TheIACR/Asiacrypt 2017/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.mp4 |
12.4 MB |
TheIACR/Asiacrypt 2017/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.mp4 |
25 MB |
TheIACR/Asiacrypt 2017/More Efficient Universal Circuit Constructions.mp4 |
98.4 MB |
TheIACR/Asiacrypt 2017/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.mp4 |
28.2 MB |
TheIACR/Asiacrypt 2017/Non interactive multiparty computation without correlated randomness.mp4 |
158.5 MB |
TheIACR/Asiacrypt 2017/On the Depth of Oblivious Parallel RAM.mp4 |
20.7 MB |
TheIACR/Asiacrypt 2017/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.mp4 |
126 MB |
TheIACR/Asiacrypt 2017/Opening remarks at Asiacrypt 2017.mp4 |
161 MB |
TheIACR/Asiacrypt 2017/Optimal rate non committing encryption.mp4 |
156.4 MB |
TheIACR/Asiacrypt 2017/Overlaying Conditional Circuit Clauses for Secure Computation.mp4 |
136.7 MB |
TheIACR/Asiacrypt 2017/Post Quantum Security of Fiat Shamir.mp4 |
141 MB |
TheIACR/Asiacrypt 2017/Preventing CLT Attacks on Obfuscation with Linear Overhead.mp4 |
122.4 MB |
TheIACR/Asiacrypt 2017/Quantum Fully Homomorphic Encryption with Verification.mp4 |
131.5 MB |
TheIACR/Asiacrypt 2017/Quantum Multicollision Finding Algorithm.mp4 |
117.2 MB |
TheIACR/Asiacrypt 2017/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.mp4 |
168.1 MB |
TheIACR/Asiacrypt 2017/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.mp4 |
74.9 MB |
TheIACR/Asiacrypt 2017/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.mp4 |
192.1 MB |
TheIACR/Asiacrypt 2017/Strengthening Access Control Encryption.mp4 |
38.9 MB |
TheIACR/Asiacrypt 2017/Succinct Spooky Free Compilers Are Not Black Box Sound.mp4 |
141.4 MB |
TheIACR/Asiacrypt 2017/Symmetrically and Asymmetrically Hard Cryptography.mp4 |
177.9 MB |
TheIACR/Asiacrypt 2017/The Iterated Random Function Problem.mp4 |
149.4 MB |
TheIACR/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols (2).mp4 |
109.7 MB |
TheIACR/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols.mp4 |
151 MB |
TheIACR/Asiacrypt 2017/The Sleepy Model of Consensus.mp4 |
189.1 MB |
TheIACR/Asiacrypt 2017/The first thorough side channel hardware trojan.mp4 |
148.7 MB |
TheIACR/Asiacrypt 2017/The ship has sailed the NIST Post-Quantum Cryptography competition.mp4 |
332.1 MB |
TheIACR/Asiacrypt 2017/Tightly secure signatures from five move identification protocols.mp4 |
127.7 MB |
TheIACR/Asiacrypt 2017/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.mp4 |
114.9 MB |
TheIACR/Asiacrypt 2017/Two Round PAKE from Approximate SPH and Instantiations from Lattices.mp4 |
151.7 MB |
TheIACR/Asiacrypt 2017/White-box Cryptomania, Pascal Paillier.mp4 |
234.9 MB |
TheIACR/Asiacrypt 2017/Yoyo Tricks with AES.mp4 |
18.7 MB |
TheIACR/Asiacrypt 2017/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.mp4 |
184.7 MB |
TheIACR/Asiacrypt 2017/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.mp4 |
35.4 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/A Fine Grained Approach to Complexity.en.transcribed.srt |
129 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/A Fine Grained Approach to Complexity.mp4 |
111 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Certified Randomness from Quantum Supremacy.en.transcribed.srt |
141 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Certified Randomness from Quantum Supremacy.mp4 |
155.4 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Cryptography, Local Decoding, and Distributed Storage.en.transcribed.srt |
152 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Cryptography, Local Decoding, and Distributed Storage.mp4 |
35.6 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Machine Learning and Security The Good, the Bad, and the Hopeful.en.transcribed.srt |
170 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Machine Learning and Security The Good, the Bad, and the Hopeful.mp4 |
113.2 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/On Optimal Algorithms and Assumption Factories.en.transcribed.srt |
127 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/On Optimal Algorithms and Assumption Factories.mp4 |
138.9 MB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Theory for Society Crypto on Steroids.en.transcribed.srt |
117 KB |
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Theory for Society Crypto on Steroids.mp4 |
160 MB |
TheIACR/CHES 2016/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.mp4 |
96.3 MB |
TheIACR/CHES 2016/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.mp4 |
125.9 MB |
TheIACR/CHES 2016/Antikernel A Decentralized Secure Hardware Software Operating System.mp4 |
107.5 MB |
TheIACR/CHES 2016/CHES 2016 Panel Discussion.mp4 |
432.9 MB |
TheIACR/CHES 2016/Cache Attacks Enable Bulk Key Recovery on the Cloud - YouTube.mp4 |
97.9 MB |
TheIACR/CHES 2016/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.mp4 |
135.1 MB |
TheIACR/CHES 2016/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.mp4 |
167.8 MB |
TheIACR/CHES 2016/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.mp4 |
149.8 MB |
TheIACR/CHES 2016/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.mp4 |
71.4 MB |
TheIACR/CHES 2016/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.mp4 |
83.7 MB |
TheIACR/CHES 2016/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.mp4 |
114.9 MB |
TheIACR/CHES 2016/Faster Evaluation of SBoxes via Common Shares.mp4 |
71.2 MB |
TheIACR/CHES 2016/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.mp4 |
148 MB |
TheIACR/CHES 2016/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.mp4 |
149.2 MB |
TheIACR/CHES 2016/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.mp4 |
148.7 MB |
TheIACR/CHES 2016/Masking AES with d+1 Shares in Hardware.mp4 |
75.9 MB |
TheIACR/CHES 2016/Mitigating SAT Attack on Logic Locking.mp4 |
180.1 MB |
TheIACR/CHES 2016/No Place to Hide Contactless Probing of Secret Data on FPGAs.mp4 |
12.3 MB |
TheIACR/CHES 2016/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4 |
305.4 MB |
TheIACR/CHES 2016/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.mp4 |
25.6 MB |
TheIACR/CHES 2016/Physical Layer Group Key Agreement for Automotive Controller Area Network.mp4 |
128.8 MB |
TheIACR/CHES 2016/QcBits constant time small key code based cryptography.mp4 |
107.8 MB |
TheIACR/CHES 2016/Reducing the Number of Non linear Multiplications in Masking Schemes.mp4 |
135.3 MB |
TheIACR/CHES 2016/Run time Accessible DRAM PUFs in Commodity Devices.mp4 |
17.4 MB |
TheIACR/CHES 2016/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.mp4 |
75.4 MB |
TheIACR/CHES 2016/Software implementation of Koblitz curves over quadratic fields.mp4 |
87.2 MB |
TheIACR/CHES 2016/Strong 8 bit Sboxes with Efficient Masking in Hardware.mp4 |
73.7 MB |
TheIACR/CHES 2016/Strong Machine Learning Attack against PUFs with No Mathematical Model.mp4 |
118.8 MB |
TheIACR/CHES 2016/Towards Easy Leakage Certification.mp4 |
34.2 MB |
TheIACR/CHES 2016/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.mp4 |
25.8 MB |
TheIACR/CHES 2016/vatiCAN Vetted, Authenticated CAN Bus.mp4 |
132.9 MB |
TheIACR/CHES 2018/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.en.transcribed.srt |
43 KB |
TheIACR/CHES 2018/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.mp4 |
32.3 MB |
TheIACR/CHES 2018/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.en.transcribed.srt |
53 KB |
TheIACR/CHES 2018/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.mp4 |
22.1 MB |
TheIACR/CHES 2018/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.en.transcribed.srt |
54 KB |
TheIACR/CHES 2018/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.mp4 |
23.5 MB |
TheIACR/CHES 2018/CHES 2018 Rump Session.en.transcribed.srt |
187 KB |
TheIACR/CHES 2018/CHES 2018 Rump Session.mp4 |
153.8 MB |
TheIACR/CHES 2018/CacheQuote Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.en.transcribed.srt |
52 KB |
TheIACR/CHES 2018/CacheQuote Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.mp4 |
16.8 MB |
TheIACR/CHES 2018/Closing remarks at CHES 2018.en.transcribed.srt |
10 KB |
TheIACR/CHES 2018/Closing remarks at CHES 2018.mp4 |
13.1 MB |
TheIACR/CHES 2018/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.en.transcribed.srt |
99 KB |
TheIACR/CHES 2018/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.mp4 |
59 MB |
TheIACR/CHES 2018/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.en.transcribed.srt |
62 KB |
TheIACR/CHES 2018/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.mp4 |
40.9 MB |
TheIACR/CHES 2018/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.en.transcribed.srt |
38 KB |
TheIACR/CHES 2018/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.mp4 |
38.7 MB |
TheIACR/CHES 2018/Differential Fault Attacks on Deterministic Lattice Signatures.en.transcribed.srt |
44 KB |
TheIACR/CHES 2018/Differential Fault Attacks on Deterministic Lattice Signatures.mp4 |
28.4 MB |
TheIACR/CHES 2018/Dismantling the AUT64 Automotive Cipher.en.transcribed.srt |
43 KB |
TheIACR/CHES 2018/Dismantling the AUT64 Automotive Cipher.mp4 |
25.5 MB |
TheIACR/CHES 2018/EM Analysis in the IoT Context Lessons Learned from an Attack on Thread.en.transcribed.srt |
48 KB |
TheIACR/CHES 2018/EM Analysis in the IoT Context Lessons Learned from an Attack on Thread.mp4 |
43 MB |
TheIACR/CHES 2018/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.en.transcribed.srt |
40 KB |
TheIACR/CHES 2018/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.mp4 |
36.2 MB |
TheIACR/CHES 2018/Efficient Side Channel Protections of ARX Ciphers.mp4 |
23.5 MB |
TheIACR/CHES 2018/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.en.transcribed.srt |
40 KB |
TheIACR/CHES 2018/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.mp4 |
36.9 MB |
TheIACR/CHES 2018/ExpFault An Automated Framework for Exploitable Fault Characterization in Block Ciphers.en.transcribed.srt |
47 KB |
TheIACR/CHES 2018/ExpFault An Automated Framework for Exploitable Fault Characterization in Block Ciphers.mp4 |
32.5 MB |
TheIACR/CHES 2018/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.en.transcribed.srt |
42 KB |
TheIACR/CHES 2018/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.mp4 |
41.1 MB |
TheIACR/CHES 2018/FACE Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.en.transcribed.srt |
38 KB |
TheIACR/CHES 2018/FACE Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.mp4 |
25.7 MB |
TheIACR/CHES 2018/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.en.transcribed.srt |
36 KB |
TheIACR/CHES 2018/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.mp4 |
27 MB |
TheIACR/CHES 2018/FPGAhammer Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.en.transcribed.srt |
40 KB |
TheIACR/CHES 2018/FPGAhammer Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.mp4 |
21.4 MB |
TheIACR/CHES 2018/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.en.transcribed.srt |
59 KB |
TheIACR/CHES 2018/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.mp4 |
22.3 MB |
TheIACR/CHES 2018/Fault Attacks Made Easy Differential Fault Analysis Automation on Assembly Code.mp4 |
36.5 MB |
TheIACR/CHES 2018/Generic Low Latency Masking in Hardware.en.transcribed.srt |
40 KB |
TheIACR/CHES 2018/Generic Low Latency Masking in Hardware.mp4 |
24.7 MB |
TheIACR/CHES 2018/Hardware Masking, Revisited.en.transcribed.srt |
44 KB |
TheIACR/CHES 2018/Hardware Masking, Revisited.mp4 |
27.9 MB |
TheIACR/CHES 2018/High Order Masking of Look up Tables with Common Shares.mp4 |
21.6 MB |
TheIACR/CHES 2018/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.en.transcribed.srt |
39 KB |
TheIACR/CHES 2018/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.mp4 |
31.2 MB |
TheIACR/CHES 2018/Improved High Order Conversion From Boolean to Arithmetic Masking.mp4 |
21.1 MB |
TheIACR/CHES 2018/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.en.transcribed.srt |
51 KB |
TheIACR/CHES 2018/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.mp4 |
40.8 MB |
TheIACR/CHES 2018/Leakage Detection with the x2 Test.en.transcribed.srt |
37 KB |
TheIACR/CHES 2018/Leakage Detection with the x2 Test.mp4 |
23.1 MB |
TheIACR/CHES 2018/Linear Repairing Codes and Side Channel Attacks.en.transcribed.srt |
57 KB |
TheIACR/CHES 2018/Linear Repairing Codes and Side Channel Attacks.mp4 |
31.1 MB |
TheIACR/CHES 2018/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.en.transcribed.srt |
50 KB |
TheIACR/CHES 2018/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.mp4 |
30.8 MB |
TheIACR/CHES 2018/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.en.transcribed.srt |
32 KB |
TheIACR/CHES 2018/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.mp4 |
19.5 MB |
TheIACR/CHES 2018/Multiplicative Masking for AES in Hardware.en.transcribed.srt |
49 KB |
TheIACR/CHES 2018/Multiplicative Masking for AES in Hardware.mp4 |
37.4 MB |
TheIACR/CHES 2018/New Bleichenbacher Records Fault Attacks on qDSA Signatures.en.transcribed.srt |
43 KB |
TheIACR/CHES 2018/New Bleichenbacher Records Fault Attacks on qDSA Signatures.mp4 |
23.7 MB |
TheIACR/CHES 2018/On Recovering Affine Encodings in White Box Implementations.en.transcribed.srt |
42 KB |
TheIACR/CHES 2018/On Recovering Affine Encodings in White Box Implementations.mp4 |
26.4 MB |
TheIACR/CHES 2018/On the Difficulty of FSM based Hardware Obfuscation.en.transcribed.srt |
47 KB |
TheIACR/CHES 2018/On the Difficulty of FSM based Hardware Obfuscation.mp4 |
36.8 MB |
TheIACR/CHES 2018/Opening remarks.en.transcribed.srt |
17 KB |
TheIACR/CHES 2018/Opening remarks.mp4 |
16.1 MB |
TheIACR/CHES 2018/Persistent Fault Analysis on Block Ciphers.en.transcribed.srt |
49 KB |
TheIACR/CHES 2018/Persistent Fault Analysis on Block Ciphers.mp4 |
31.4 MB |
TheIACR/CHES 2018/Practical CCA2 Secure and Masked Ring LWE Implementation.mp4 |
25.6 MB |
TheIACR/CHES 2018/Rhythmic Keccak SCA Security and Low Latency in HW.en.transcribed.srt |
38 KB |
TheIACR/CHES 2018/Rhythmic Keccak SCA Security and Low Latency in HW.mp4 |
36.7 MB |
TheIACR/CHES 2018/SAEB A Lightweight Blockcipher Based AEAD Mode of Operation.en.transcribed.srt |
40 KB |
TheIACR/CHES 2018/SAEB A Lightweight Blockcipher Based AEAD Mode of Operation.mp4 |
24 MB |
TheIACR/CHES 2018/SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography.en.transcribed.srt |
52 KB |
TheIACR/CHES 2018/SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography.mp4 |
25.6 MB |
TheIACR/CHES 2018/Saber on ARM CCA secure module lattice based key encapsulation on ARM.en.transcribed.srt |
50 KB |
TheIACR/CHES 2018/Saber on ARM CCA secure module lattice based key encapsulation on ARM.mp4 |
27.1 MB |
TheIACR/CHES 2018/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.en.transcribed.srt |
29 KB |
TheIACR/CHES 2018/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.mp4 |
19.2 MB |
TheIACR/CHES 2018/Smashing the Implementation Records of AES S box.en.transcribed.srt |
43 KB |
TheIACR/CHES 2018/Smashing the Implementation Records of AES S box.mp4 |
26.2 MB |
TheIACR/CHES 2018/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.en.transcribed.srt |
51 KB |
TheIACR/CHES 2018/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.mp4 |
26.5 MB |
TheIACR/CHES 2018/Standard Lattice Based Key Encapsulation on Embedded Devices.en.transcribed.srt |
39 KB |
TheIACR/CHES 2018/Standard Lattice Based Key Encapsulation on Embedded Devices.mp4 |
22 MB |
TheIACR/CHES 2018/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.en.transcribed.srt |
51 KB |
TheIACR/CHES 2018/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.mp4 |
39.5 MB |
TheIACR/Crypto 2011 Rump Sessions/(More) Efficient Secure Computation from Garbled Circuits.mp4 |
6.6 MB |
TheIACR/Crypto 2011 Rump Sessions/A brief chat about approximate GCDs.mp4 |
5.7 MB |
TheIACR/Crypto 2011 Rump Sessions/A silent competition for ultra-fast public key cryptography.mp4 |
5.5 MB |
TheIACR/Crypto 2011 Rump Sessions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.mp4 |
6.3 MB |
TheIACR/Crypto 2011 Rump Sessions/An Application Of Frequency Shift Keying To Communication Resynchronisation.mp4 |
3.5 MB |
TheIACR/Crypto 2011 Rump Sessions/An historical call for papers ....mp4 |
7.3 MB |
TheIACR/Crypto 2011 Rump Sessions/An update about HiDalgo.mp4 |
6.2 MB |
TheIACR/Crypto 2011 Rump Sessions/Biclique cryptanalysis of the full AES.mp4 |
11.6 MB |
TheIACR/Crypto 2011 Rump Sessions/Blinding ballot copying in Helios from Condorcet to IACR.mp4 |
5.5 MB |
TheIACR/Crypto 2011 Rump Sessions/Bounds on Cloud File Retrievability.mp4 |
2 MB |
TheIACR/Crypto 2011 Rump Sessions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.mp4 |
8.5 MB |
TheIACR/Crypto 2011 Rump Sessions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.mp4 |
7.6 MB |
TheIACR/Crypto 2011 Rump Sessions/Extreme Threshold Cryptosystems.mp4 |
4.8 MB |
TheIACR/Crypto 2011 Rump Sessions/FlipIt and the Cramér-Rao bound.mp4 |
5.1 MB |
TheIACR/Crypto 2011 Rump Sessions/HB^N An HB-like protocol secure against Man-in-the-Middle attacks.mp4 |
6.9 MB |
TheIACR/Crypto 2011 Rump Sessions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).mp4 |
7.7 MB |
TheIACR/Crypto 2011 Rump Sessions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.mp4 |
7.1 MB |
TheIACR/Crypto 2011 Rump Sessions/NIST Announcements.mp4 |
10.4 MB |
TheIACR/Crypto 2011 Rump Sessions/Non-Malleable Codes in the Split-State Model.mp4 |
3.7 MB |
TheIACR/Crypto 2011 Rump Sessions/Observations on H-PRESENT-128.mp4 |
5.4 MB |
TheIACR/Crypto 2011 Rump Sessions/Panel discussion on leakage.mp4 |
3.2 MB |
TheIACR/Crypto 2011 Rump Sessions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.mp4 |
3.5 MB |
TheIACR/Crypto 2011 Rump Sessions/Predicate Encryption for Inner Products from LWE.mp4 |
7.1 MB |
TheIACR/Crypto 2011 Rump Sessions/Pseudorandom Functions and Lattices.mp4 |
8.1 MB |
TheIACR/Crypto 2011 Rump Sessions/Remotegrity.mp4 |
10.7 MB |
TheIACR/Crypto 2011 Rump Sessions/Rethinking IDEA.mp4 |
5.8 MB |
TheIACR/Crypto 2011 Rump Sessions/Robust Coin Flipping.mp4 |
7.6 MB |
TheIACR/Crypto 2011 Rump Sessions/Secure Computation with Sublinear Amortized Work.mp4 |
6.1 MB |
TheIACR/Crypto 2011 Rump Sessions/Secure Verification of Delegated Presentation Delivery.mp4 |
3.9 MB |
TheIACR/Crypto 2011 Rump Sessions/The 2011 IACR Fellowship Induction Ceremony.mp4 |
18.7 MB |
TheIACR/Crypto 2011 Rump Sessions/The Garden-Hose Model.mp4 |
7.4 MB |
TheIACR/Crypto 2011 Rump Sessions/The Hunting of the SNARK.mp4 |
8.2 MB |
TheIACR/Crypto 2011 Rump Sessions/Trapdoors for Lattices Simpler, Tighter, Faster, Smaller.mp4 |
6.1 MB |
TheIACR/Crypto 2011 Rump Sessions/Variants of Sponge-like Construction.mp4 |
5.4 MB |
TheIACR/Crypto 2011/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).mp4 |
20.6 MB |
TheIACR/Crypto 2011/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.mp4 |
10 MB |
TheIACR/Crypto 2011/A New Variant of PMAC Beyond the Birthday Bound.mp4 |
30.7 MB |
TheIACR/Crypto 2011/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.mp4 |
10.4 MB |
TheIACR/Crypto 2011/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.mp4 |
12.8 MB |
TheIACR/Crypto 2011/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).mp4 |
23.5 MB |
TheIACR/Crypto 2011/Bi-Deniable Public-Key Encryption.mp4 |
14.7 MB |
TheIACR/Crypto 2011/Classical Cryptographic Protocols in a Quantum World.mp4 |
22 MB |
TheIACR/Crypto 2011/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).mp4 |
16.1 MB |
TheIACR/Crypto 2011/Constant-Rate Oblivious Transfer from Noisy Channels.mp4 |
11.4 MB |
TheIACR/Crypto 2011/Cryptanalysis of PrintCIPHER.mp4 |
21.6 MB |
TheIACR/Crypto 2011/Cryptography with Tamperable and Leaky Memory (Crypto 2011).mp4 |
11.3 MB |
TheIACR/Crypto 2011/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.mp4 |
24.8 MB |
TheIACR/Crypto 2011/Generic Side-Channel Distinguishers Improvements and Limitations (Crypto 2011).mp4 |
28.4 MB |
TheIACR/Crypto 2011/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4 |
68.8 MB |
TheIACR/Crypto 2011/Inverting HFE Systems is Quasi-Polynomial for All Fields.mp4 |
12.5 MB |
TheIACR/Crypto 2011/Leakage-Resilient Zero Knowledge (Crypto 2011).mp4 |
24.2 MB |
TheIACR/Crypto 2011/Leftover Hash Lemma, Revisited (Crypto 2011).mp4 |
40.1 MB |
TheIACR/Crypto 2011/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.mp4 |
28.3 MB |
TheIACR/Crypto 2011/Memory Delegation (Crypto 2011).mp4 |
11.2 MB |
TheIACR/Crypto 2011/Merkle Puzzles in a Quantum World.mp4 |
10.5 MB |
TheIACR/Crypto 2011/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.mp4 |
15.2 MB |
TheIACR/Crypto 2011/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).mp4 |
11.9 MB |
TheIACR/Crypto 2011/Order-Preserving Encryption Revisited Improved Security Analysis and Alternative Solutions.mp4 |
11.4 MB |
TheIACR/Crypto 2011/Perfectly-Secure Multiplication for any t n 3 (Crypto 2011).mp4 |
11.3 MB |
TheIACR/Crypto 2011/Physically Uncloneable Functions in the Universal Composition Framework.mp4 |
28.6 MB |
TheIACR/Crypto 2011/Position-Based Quantum Cryptography Impossibility and Constructions.mp4 |
13.8 MB |
TheIACR/Crypto 2011/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.mp4 |
21 MB |
TheIACR/Crypto 2011/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.mp4 |
38 MB |
TheIACR/Crypto 2011/Random Oracle Reducibility (Crypto 2011).mp4 |
8.7 MB |
TheIACR/Crypto 2011/Round Optimal Blind Signatures in the Standard Model.mp4 |
23.4 MB |
TheIACR/Crypto 2011/Secure Computation on the Web Computing without Simultaneous Interaction (Crypto 2011).mp4 |
12.1 MB |
TheIACR/Crypto 2011/Smaller Decoding Exponents Ball-Collision Decoding.mp4 |
26.3 MB |
TheIACR/Crypto 2011/The Collision Security of Tandem-DM in the Ideal Cipher Model.mp4 |
11.5 MB |
TheIACR/Crypto 2011/The IPS Compiler Optimizations, Variants and Concrete Efficiency (Crypto 2011).mp4 |
12 MB |
TheIACR/Crypto 2011/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).mp4 |
20.7 MB |
TheIACR/Crypto 2011/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.mp4 |
11.4 MB |
TheIACR/Crypto 2011/Time-Lock Puzzles in the Random Oracle Model.mp4 |
11.5 MB |
TheIACR/Crypto 2011/Tor and Circumvention Lessons Learned, by Roger Dingledine.mp4 |
61.4 MB |
TheIACR/Crypto 2011/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).mp4 |
11.7 MB |
TheIACR/Crypto 2012/A New Approach to Practical Active-Secure Two-Party Comp ....mp4 |
20.6 MB |
TheIACR/Crypto 2012/Actively Secure Two-Party Evaluation of Any Quantum Oper ....mp4 |
24.4 MB |
TheIACR/Crypto 2012/Adaptively Secure Multi-Party Computation with Dishonest ....mp4 |
35.2 MB |
TheIACR/Crypto 2012/An Enciphering Scheme Based on a Card Shuffle.mp4 |
43.4 MB |
TheIACR/Crypto 2012/Black-Box Constructions of Composable Protocols without ....mp4 |
19.7 MB |
TheIACR/Crypto 2012/Breaking and Repairing GCM Security Proofs.mp4 |
47.5 MB |
TheIACR/Crypto 2012/Collusion-Preserving Computation.mp4 |
21.8 MB |
TheIACR/Crypto 2012/Crowd-Blending Privacy.mp4 |
11.6 MB |
TheIACR/Crypto 2012/Differential Privacy with Imperfect Randomness.mp4 |
21.7 MB |
TheIACR/Crypto 2012/Dynamic Credentials and Ciphertext Delegation for Attrib ....mp4 |
27.8 MB |
TheIACR/Crypto 2012/Efficient Dissection of Composite Problems, with Applica ....mp4 |
64.3 MB |
TheIACR/Crypto 2012/Efficient Padding Oracle Attacks on Cryptographic Hardware.mp4 |
49.9 MB |
TheIACR/Crypto 2012/Fully Homomorphic Encryption without Modulus Switching f ....mp4 |
36.5 MB |
TheIACR/Crypto 2012/Functional Encryption for Regular Languages.mp4 |
28.6 MB |
TheIACR/Crypto 2012/Functional Encryption with Bounded Collusions via Multi- ....mp4 |
31.8 MB |
TheIACR/Crypto 2012/Hardness of Computing Individual Bits for One-Way Functi ....mp4 |
29 MB |
TheIACR/Crypto 2012/Hash Functions Based on Three Permutations A Generic Se ....mp4 |
22.7 MB |
TheIACR/Crypto 2012/Homomorphic Evaluation of the AES Circuit.mp4 |
58.2 MB |
TheIACR/Crypto 2012/Multi-instance Security and Its Application to Password- ....mp4 |
30.6 MB |
TheIACR/Crypto 2012/Multiparty Computation from Somewhat Homomorphic Encryption.mp4 |
17.2 MB |
TheIACR/Crypto 2012/Must You Know the Code of f to Securely Compute f.mp4 |
24.8 MB |
TheIACR/Crypto 2012/Near-Linear Unconditionally-Secure Multiparty Computatio ....mp4 |
20.2 MB |
TheIACR/Crypto 2012/New Impossibility Results for Concurrent Composition and ....mp4 |
8.5 MB |
TheIACR/Crypto 2012/New Preimage Attacks against Reduced SHA-1.mp4 |
19.1 MB |
TheIACR/Crypto 2012/On the Distribution of Linear Biases Three Instructive ....mp4 |
31.9 MB |
TheIACR/Crypto 2012/On the Impossibility of Constructing Efficient Key Encap ....mp4 |
16.7 MB |
TheIACR/Crypto 2012/On the Security of TLS-DHE in the Standard Model.mp4 |
26 MB |
TheIACR/Crypto 2012/Pinning Down Privacy in Statistical Databases.mp4 |
100.6 MB |
TheIACR/Crypto 2012/Public Keys.mp4 |
25.6 MB |
TheIACR/Crypto 2012/Quantum to Classical Randomness Extractors.mp4 |
17.9 MB |
TheIACR/Crypto 2012/Resistance against Iterated Attacks by Decorrelation Rev ....mp4 |
18.9 MB |
TheIACR/Crypto 2012/Secret Sharing Schemes for Very Dense Graphs.mp4 |
24.3 MB |
TheIACR/Crypto 2012/Secure Identity-Based Encryption in the Quantum Random O ....mp4 |
20.5 MB |
TheIACR/Crypto 2012/Securing Circuits against Constant-Rate Tampering.mp4 |
17 MB |
TheIACR/Crypto 2012/Semantic Security for the Wiretap Channel.mp4 |
29.3 MB |
TheIACR/Crypto 2012/Stam's Conjecture and Threshold Phenomena in Collision R ....mp4 |
16.4 MB |
TheIACR/Crypto 2012/Substitution-Permutation Networks, Pseudorandom Function ....mp4 |
96.7 MB |
TheIACR/Crypto 2012/Succinct Arguments from Multi-prover Interactive Proofs ....mp4 |
19.2 MB |
TheIACR/Crypto 2012/Tamper and Leakage Resilience in the Split-State Model.mp4 |
13.9 MB |
TheIACR/Crypto 2012/The Curious Case of Non-Interactive Commitments - On the ....mp4 |
20.8 MB |
TheIACR/Crypto 2012/The End of Crypto.mp4 |
92 MB |
TheIACR/Crypto 2012/Tightly Secure Signatures and Public-Key Encryption.mp4 |
21.2 MB |
TheIACR/Crypto 2012/To Hash or Not to Hash Again (In)Differentiability Resu ....mp4 |
18 MB |
TheIACR/Crypto 2012/Tweakable Blockciphers with Beyond Birthday-Bound Security.mp4 |
23.5 MB |
TheIACR/Crypto 2012/Universal Composability from Essentially Any Trusted Setup.mp4 |
21.7 MB |
TheIACR/Crypto 2012/Welcome to Crypto 2012.mp4 |
12.8 MB |
TheIACR/Crypto 2013 Rump Session/Spying NSA (reprise)..mp4 |
37.2 MB |
TheIACR/Crypto 2013 Rump Session/Spying NSA.mp4 |
36.8 MB |
TheIACR/Crypto 2013 Rump Session/Under Surveillance.mp4 |
27.7 MB |
TheIACR/Crypto 2013/A Uniform Min-Max Theorem with Applications in Cryptography.mp4 |
38.8 MB |
TheIACR/Crypto 2013/Accuracy-Privacy Tradeoffs for Two-Party Differentially ....mp4 |
19.4 MB |
TheIACR/Crypto 2013/Achieving the Limits of the Noisy-Storage Model Using En ....mp4 |
62.1 MB |
TheIACR/Crypto 2013/An Algebraic Framework for Diffie-Hellman Assumptions.mp4 |
87.3 MB |
TheIACR/Crypto 2013/Attribute-Based Encryption for Circuits from Multilinear ....mp4 |
73.2 MB |
TheIACR/Crypto 2013/Construction of Differential Characteristics in ARX Desi ....mp4 |
60.4 MB |
TheIACR/Crypto 2013/Counter-Cryptanalysis.mp4 |
113.8 MB |
TheIACR/Crypto 2013/Digital Signatures with Minimal Overhead from Indifferen ....mp4 |
47.1 MB |
TheIACR/Crypto 2013/Efficient Multiparty Protocols via Log-Depth Threshold F ....mp4 |
48.8 MB |
TheIACR/Crypto 2013/Encoding Functions with Constant Online Rate or How to C ....mp4 |
65.8 MB |
TheIACR/Crypto 2013/Everlasting Multi-party Computation.mp4 |
59.3 MB |
TheIACR/Crypto 2013/Fast Cut-and-Choose Based Protocols for Malicious and Co ....mp4 |
52.2 MB |
TheIACR/Crypto 2013/Full Domain Hash from (Leveled) Multilinear Maps and Ide ....mp4 |
31.4 MB |
TheIACR/Crypto 2013/Functional Encryption New Perspectives and Lower Bounds.mp4 |
59.4 MB |
TheIACR/Crypto 2013/Hard-Core Predicates for a Diffie-Hellman Problem over F ....mp4 |
80.1 MB |
TheIACR/Crypto 2013/Hardness of SIS and LWE with Small Parameters.mp4 |
47.3 MB |
TheIACR/Crypto 2013/Highly-Scalable Searchable Symmetric Encryption with Sup ....mp4 |
108.7 MB |
TheIACR/Crypto 2013/Homomorphic Encryption from Learning with Errors Concep ....mp4 |
83.6 MB |
TheIACR/Crypto 2013/How to Run Turing Machines on Encrypted Data.mp4 |
85.4 MB |
TheIACR/Crypto 2013/Improved OT Extension for Transferring Short Secrets.mp4 |
44.6 MB |
TheIACR/Crypto 2013/Instantiating Random Oracles via UCEs.mp4 |
71.2 MB |
TheIACR/Crypto 2013/Leakage-Resilient Symmetric Cryptography under Empirical ....mp4 |
77.3 MB |
TheIACR/Crypto 2013/Learning with Rounding, Revisited - New Reduction, Prope ....mp4 |
26.1 MB |
TheIACR/Crypto 2013/Limits of Provable Security for Homomorphic Encryption.mp4 |
45 MB |
TheIACR/Crypto 2013/Limits on the Power of Cryptographic Cheap Talk.mp4 |
34.4 MB |
TheIACR/Crypto 2013/New Techniques for SPHFs and Efficient One-Round PAKE Pr ....mp4 |
55.9 MB |
TheIACR/Crypto 2013/Non-malleable Codes from Two-Source Extractors.mp4 |
61 MB |
TheIACR/Crypto 2013/On Fair Exchange, Fair Coins and Fair Sampling - YouTube.mp4 |
42.1 MB |
TheIACR/Crypto 2013/On the Achievability of Simulation-Based Security for Fu ....mp4 |
66.2 MB |
TheIACR/Crypto 2013/On the Indifferentiability of Key-Alternating Ciphers.mp4 |
80.4 MB |
TheIACR/Crypto 2013/Optimal Coding for Streaming Authentication and Interact ....mp4 |
26.1 MB |
TheIACR/Crypto 2013/Plain versus Randomized Cascading-Based Key-Length Exten ....mp4 |
42.3 MB |
TheIACR/Crypto 2013/Practical Bootstrapping in Quasilinear Time.mp4 |
72.7 MB |
TheIACR/Crypto 2013/Practical Multilinear Maps over the Integers.mp4 |
69.5 MB |
TheIACR/Crypto 2013/Programmable Hash Functions in the Multilinear Setting.mp4 |
48.1 MB |
TheIACR/Crypto 2013/Quantum One-Time Programs - (Extended Abstract).mp4 |
40.1 MB |
TheIACR/Crypto 2013/Real Time Cryptanalysis of Bluetooth Encryption with Con ....mp4 |
75.8 MB |
TheIACR/Crypto 2013/SNARKs for C Verifying Program Executions Succinctly an ....mp4 |
73.9 MB |
TheIACR/Crypto 2013/Secret Sharing, Rank Inequalities and Information Inequa ....mp4 |
75.5 MB |
TheIACR/Crypto 2013/Secure Computation against Adaptive Auxiliary Information.mp4 |
59.5 MB |
TheIACR/Crypto 2013/Secure Signatures and Chosen Ciphertext Security in a Qu ....mp4 |
46.6 MB |
TheIACR/Crypto 2013/Sieve-in-the-Middle Improved MITM Attacks.mp4 |
70 MB |
TheIACR/Crypto 2013/The Mix-and-Cut Shuffle Small-Domain Encryption Secure ....mp4 |
64.3 MB |
TheIACR/Crypto 2013/Time-Optimal Interactive Proofs for Circuit Evaluation.mp4 |
78.6 MB |
TheIACR/Crypto 2013/What Information Is Leaked under Concurrent Composition.mp4 |
60.4 MB |
TheIACR/Crypto 2014/Algorithms in HElib.mp4 |
12.5 MB |
TheIACR/Crypto 2014/Amplifying Privacy in Privacy Amplification.mp4 |
12.8 MB |
TheIACR/Crypto 2014/Automated Analysis of Cryptographic Assumptions in Generic Group Models.mp4 |
14.6 MB |
TheIACR/Crypto 2014/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).mp4 |
13.8 MB |
TheIACR/Crypto 2014/Breaking '128-bit Secure' Supersingular Binary Curves.mp4 |
13.2 MB |
TheIACR/Crypto 2014/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.mp4 |
10.8 MB |
TheIACR/Crypto 2014/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.mp4 |
23.3 MB |
TheIACR/Crypto 2014/Cryptography from Compression Functions The UCE Bridge to the ROM.mp4 |
23.7 MB |
TheIACR/Crypto 2014/Cryptography with Streaming Algorithms.mp4 |
12.4 MB |
TheIACR/Crypto 2014/Dishonest Majority Multi-Party Computation for Binary Circuits.mp4 |
13 MB |
TheIACR/Crypto 2014/Faster Bootstrapping with Polynomial Error.mp4 |
13.4 MB |
TheIACR/Crypto 2014/FleXOR Flexible garbling for XOR gates that beats free-XOR.mp4 |
11.8 MB |
TheIACR/Crypto 2014/Hardness of k-LWE and Applications in Traitor Tracing.mp4 |
16 MB |
TheIACR/Crypto 2014/Hierarchical Identity Based Encryption from Affine Messafe Authentication.mp4 |
12.3 MB |
TheIACR/Crypto 2014/Homomorphic Signatures with Efficient Verification for Polynomial Functions.mp4 |
16.1 MB |
TheIACR/Crypto 2014/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.mp4 |
12.3 MB |
TheIACR/Crypto 2014/How to Use Bitcoin to Design Fair Protocols.mp4 |
23.7 MB |
TheIACR/Crypto 2014/IACR Distinguished Lecture Caught in Between Theory and Practice.mp4 |
125.3 MB |
TheIACR/Crypto 2014/Improved Generic Attacks against Hash-Based MACs and HAIFA.mp4 |
20.4 MB |
TheIACR/Crypto 2014/Improved Short Lattice Signatures in the Standard Model.mp4 |
14.1 MB |
TheIACR/Crypto 2014/Indistinguishability Obfuscation and UCEs The Case of Computationally Unpredictable Sources.mp4 |
24 MB |
TheIACR/Crypto 2014/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.mp4 |
9.4 MB |
TheIACR/Crypto 2014/Interactive Proofs under Continual Memory Leakage.mp4 |
29.1 MB |
TheIACR/Crypto 2014/Invited Talk How to delegate computations the power of no-signaling proofs.mp4 |
32.1 MB |
TheIACR/Crypto 2014/Leakage-Tolerant Computation with Input-Independent Preprocessing.mp4 |
13.9 MB |
TheIACR/Crypto 2014/Low Overhead Broadcast Encryption from Multilinear Maps.mp4 |
25.8 MB |
TheIACR/Crypto 2014/Maliciously Circuit-Private FHE.mp4 |
12.1 MB |
TheIACR/Crypto 2014/Memento How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.mp4 |
14.4 MB |
TheIACR/Crypto 2014/Minimizing the Two-Round Even-Mansour Cipher.mp4 |
18.9 MB |
TheIACR/Crypto 2014/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.mp4 |
8 MB |
TheIACR/Crypto 2014/New and Improved Key-Homomorphic Pseudorandom Functions.mp4 |
27.7 MB |
TheIACR/Crypto 2014/Non-Interactive Secure Multiparty Computation.mp4 |
13.8 MB |
TheIACR/Crypto 2014/On Virtual Grey Box Obfuscation for General Circuits.mp4 |
12.5 MB |
TheIACR/Crypto 2014/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with ....mp4 |
12 MB |
TheIACR/Crypto 2014/Optimal Non-perfect Uniform Secret Sharing Schemes.mp4 |
12.5 MB |
TheIACR/Crypto 2014/Physical Zero-Knowledge Proofs of Physical Properties.mp4 |
13.8 MB |
TheIACR/Crypto 2014/Polynomial Spaces A New Framework for Composite-to-Prime-Order Transformations.mp4 |
28.1 MB |
TheIACR/Crypto 2014/Proving the TLS Handshake Secure (As It Is).mp4 |
13.6 MB |
TheIACR/Crypto 2014/Quantum Position Verification in the Random Oracle Model.mp4 |
11.9 MB |
TheIACR/Crypto 2014/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.mp4 |
21.1 MB |
TheIACR/Crypto 2014/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.mp4 |
10.8 MB |
TheIACR/Crypto 2014/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.mp4 |
13.5 MB |
TheIACR/Crypto 2014/Scalable Zero Knowledge via Cycles of Elliptic Curves.mp4 |
13.7 MB |
TheIACR/Crypto 2014/Secure Multi-Party Computation with Identifiable Abort.mp4 |
22.3 MB |
TheIACR/Crypto 2014/Security Analysis of Multilinear Maps over the Integers.mp4 |
25.3 MB |
TheIACR/Crypto 2014/Security of Symmetric Encryption against Mass Surveillance.mp4 |
36.2 MB |
TheIACR/Crypto 2014/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.mp4 |
11.4 MB |
TheIACR/Crypto 2014/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.mp4 |
13.4 MB |
TheIACR/Crypto 2014/Structure-Preserving Signatures from Type II Pairings.mp4 |
14.3 MB |
TheIACR/Crypto 2014/The Exact PRF-Security of NMAC and HMAC.mp4 |
25.3 MB |
TheIACR/Crypto 2014/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.mp4 |
13.2 MB |
TheIACR/Crypto 2014/The Security of Multiple Encryption in the Ideal Cipher Model.mp4 |
13.9 MB |
TheIACR/Crypto 2014/Updates on Generic Attacks against HMAC and NMAC.mp4 |
23.6 MB |
TheIACR/Crypto 2015/A Punctured Programming Approach to Adaptive Security in Functional Encryption.mp4 |
13.4 MB |
TheIACR/Crypto 2015/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.mp4 |
22.6 MB |
TheIACR/Crypto 2015/Algebriac Decomposition for Probing Security.mp4 |
20.6 MB |
TheIACR/Crypto 2015/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.mp4 |
25.4 MB |
TheIACR/Crypto 2015/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.mp4 |
11.9 MB |
TheIACR/Crypto 2015/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.mp4 |
14.3 MB |
TheIACR/Crypto 2015/Arguments of Proximity.mp4 |
14.9 MB |
TheIACR/Crypto 2015/Bilinear Entropy Expansion from the Decisional Linear Assumption.mp4 |
11 MB |
TheIACR/Crypto 2015/Bit Commitment schemes with Non Signaling Adversaries.mp4 |
11.8 MB |
TheIACR/Crypto 2015/Bloom Filters in Adversarial Environments.mp4 |
15 MB |
TheIACR/Crypto 2015/Capacity and Data Complexity in Multidimensional Linear Attack.mp4 |
39.5 MB |
TheIACR/Crypto 2015/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.mp4 |
11.9 MB |
TheIACR/Crypto 2015/Concurrent Secure Computation via Non Black Box Simulation.mp4 |
19.3 MB |
TheIACR/Crypto 2015/Concurrent Secure Computation with Optimal Query Complexity.mp4 |
23.5 MB |
TheIACR/Crypto 2015/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.mp4 |
17.6 MB |
TheIACR/Crypto 2015/Constant Round MPC with Fairness and Guarantee of Output Delivery.mp4 |
18.3 MB |
TheIACR/Crypto 2015/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.mp4 |
26 MB |
TheIACR/Crypto 2015/Cryptanalysis of the Co ACD Assumption.mp4 |
15.9 MB |
TheIACR/Crypto 2015/Cryptography with One Way Communication.mp4 |
13.1 MB |
TheIACR/Crypto 2015/Cryptography, Security, and Public Safety A Policy Perspective.mp4 |
26 MB |
TheIACR/Crypto 2015/Data Is a Stream Security of Stream Based Channels.mp4 |
20.5 MB |
TheIACR/Crypto 2015/Decaf Eliminating Cofactors Through Quotients and Isogenies.mp4 |
18.1 MB |
TheIACR/Crypto 2015/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.mp4 |
17.2 MB |
TheIACR/Crypto 2015/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.mp4 |
21.3 MB |
TheIACR/Crypto 2015/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.mp4 |
14.9 MB |
TheIACR/Crypto 2015/Efficient Pseudorandom Functions via On the Fly Adaptation.mp4 |
12.7 MB |
TheIACR/Crypto 2015/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.mp4 |
13.1 MB |
TheIACR/Crypto 2015/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.mp4 |
14 MB |
TheIACR/Crypto 2015/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.mp4 |
19.8 MB |
TheIACR/Crypto 2015/From Selective to Adaptive Security in Functional Encryption.mp4 |
17.1 MB |
TheIACR/Crypto 2015/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.mp4 |
13.5 MB |
TheIACR/Crypto 2015/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.mp4 |
17.2 MB |
TheIACR/Crypto 2015/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.mp4 |
16.8 MB |
TheIACR/Crypto 2015/Indistinguishability Obfuscation from Compact Functional Encryption.mp4 |
14.6 MB |
TheIACR/Crypto 2015/Integral Cryptanalysis on Full MISTY1.mp4 |
20 MB |
TheIACR/Crypto 2015/Known key Distinguisher on Full PRESENT.mp4 |
14.8 MB |
TheIACR/Crypto 2015/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.mp4 |
16.3 MB |
TheIACR/Crypto 2015/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.mp4 |
13.7 MB |
TheIACR/Crypto 2015/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.mp4 |
16 MB |
TheIACR/Crypto 2015/Malicious for free OT Extension The Pipe is the Limit.mp4 |
17.3 MB |
TheIACR/Crypto 2015/Multi Identity and Multi Key Leveled FHE from Learning with Errors.mp4 |
28.5 MB |
TheIACR/Crypto 2015/Multi Key Security The Even Mansour Construction Revisted.mp4 |
13.7 MB |
TheIACR/Crypto 2015/New Attacks on Feistel Structures with Improved Memory Complexities.mp4 |
36.1 MB |
TheIACR/Crypto 2015/Observations on the SIMON Block Cipher Family.mp4 |
12.5 MB |
TheIACR/Crypto 2015/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.mp4 |
21.8 MB |
TheIACR/Crypto 2015/Parallel Hashing via List Recoverability.mp4 |
13.4 MB |
TheIACR/Crypto 2015/PoW Based Distributed Cryptography with no Trusted Setup.mp4 |
19.9 MB |
TheIACR/Crypto 2015/Practical Free Start Collision Attacks on the 76 Step SHA 1.mp4 |
18 MB |
TheIACR/Crypto 2015/Practical Round Optimal Blind Signatures in the Standard Model.mp4 |
13 MB |
TheIACR/Crypto 2015/Predicate Encryption for Circuits from LWE.mp4 |
14.5 MB |
TheIACR/Crypto 2015/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.mp4 |
18.9 MB |
TheIACR/Crypto 2015/Proofs of Space.mp4 |
15.9 MB |
TheIACR/Crypto 2015/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.mp4 |
16.8 MB |
TheIACR/Crypto 2015/Secure Computation from Leaky Correlated Randomness.mp4 |
15.1 MB |
TheIACR/Crypto 2015/Secure Computation with Minimal Interaction, Revisited.mp4 |
23.8 MB |
TheIACR/Crypto 2015/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.mp4 |
23.1 MB |
TheIACR/Crypto 2015/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.mp4 |
16.7 MB |
TheIACR/Crypto 2015/The Iterated Random Permutation Problem with Applications to Cascade Encryption.mp4 |
14.1 MB |
TheIACR/Crypto 2015/The State of Cryptographic Multilinear Maps.mp4 |
37.8 MB |
TheIACR/Crypto 2015/Tweaking Even Mansour Ciphers.mp4 |
17.2 MB |
TheIACR/Crypto 2015/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.mp4 |
17 MB |
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump Session Part 1.mp4 |
333.3 MB |
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump session part 2..mp4 |
360.3 MB |
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump session part 3..mp4 |
155.1 MB |
TheIACR/Crypto 2016/A 2^70 Attack on the Full MISTY1.mp4 |
72.9 MB |
TheIACR/Crypto 2016/A Practical Cryptanalysis of the Algebraic Eraser.mp4 |
107.5 MB |
TheIACR/Crypto 2016/A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded En.mp4 |
78.6 MB |
TheIACR/Crypto 2016/Adaptively Secure Garbled Circuits from One Way Functions.mp4 |
128.9 MB |
TheIACR/Crypto 2016/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.mp4 |
43.1 MB |
TheIACR/Crypto 2016/Akamai Faster Forward Crypto at Scale.mp4 |
103.2 MB |
TheIACR/Crypto 2016/Annihilation Attacks for Multilinear Maps Cryptanalysis of Indistinguishability Obfuscation over GG.mp4 |
156.3 MB |
TheIACR/Crypto 2016/Another View of the Division Property.mp4 |
50.9 MB |
TheIACR/Crypto 2016/Automatic Search of Meet in the Middle and Impossible Differential Attacks.mp4 |
80.6 MB |
TheIACR/Crypto 2016/Backdoors in Pseudorandom Number Generators Possibility and Impossibility Results.mp4 |
116 MB |
TheIACR/Crypto 2016/Big Key Symmetric Encryption Resisting Key Exfiltration.mp4 |
55.7 MB |
TheIACR/Crypto 2016/Bounded Indistinguishability and the Complexity of Recovering Secrets.mp4 |
151.7 MB |
TheIACR/Crypto 2016/Breaking Symmetric Cryptosystems using Quantum Period Finding.mp4 |
145.5 MB |
TheIACR/Crypto 2016/Breaking the Circuit Size Barrier for Secure Computation Under DDH.mp4 |
114.6 MB |
TheIACR/Crypto 2016/Concurrent Non Malleable Commitments and More in 3 Rounds.mp4 |
118.3 MB |
TheIACR/Crypto 2016/Counter in Tweak Authenticated Encryption Modes for Tweakable Block Ciphers.mp4 |
159.6 MB |
TheIACR/Crypto 2016/Cryptanalysis of GGH15 Multilinear Maps.mp4 |
176.8 MB |
TheIACR/Crypto 2016/Cryptanalysis of a Theorem Decomposing the Only Known Solution to the Big APN Problem.mp4 |
105.1 MB |
TheIACR/Crypto 2016/Cryptanalysis of the FLIP Family of Stream Ciphers.mp4 |
25.5 MB |
TheIACR/Crypto 2016/Crypto 2016 Rump Session Part 1.mp4 |
333.3 MB |
TheIACR/Crypto 2016/Crypto 2016 Rump session part 2..mp4 |
360.3 MB |
TheIACR/Crypto 2016/Crypto 2016 Rump session part 3..mp4 |
155.1 MB |
TheIACR/Crypto 2016/Design in Type I, Run in Type III Fast and Scalable Bilinear Type Conversion using Integer Programm.mp4 |
158.1 MB |
TheIACR/Crypto 2016/EWCDM An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.mp4 |
160.7 MB |
TheIACR/Crypto 2016/Efficient Algorithms for Supersingular Isogeny Diffie Hellman.mp4 |
95.7 MB |
TheIACR/Crypto 2016/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.mp4 |
125.4 MB |
TheIACR/Crypto 2016/Efficiently Computing Data Independent Memory Hard Functions.mp4 |
113.2 MB |
TheIACR/Crypto 2016/Encryption Switching Protocols.mp4 |
111.9 MB |
TheIACR/Crypto 2016/Extended Tower Number Field Sieve A New Complexity for the Medium Prime Case.mp4 |
165 MB |
TheIACR/Crypto 2016/FHE Circuit Privacy Almost For Free.mp4 |
94.5 MB |
TheIACR/Crypto 2016/Fine grained Cryptography.mp4 |
124 MB |
TheIACR/Crypto 2016/How to Prove Knowledge of Small Secrets.mp4 |
157.7 MB |
TheIACR/Crypto 2016/Indifferentiability of 8 Round Feistel Networks.mp4 |
143.4 MB |
TheIACR/Crypto 2016/Key Wrapping for Cryptographic APIs.mp4 |
180.5 MB |
TheIACR/Crypto 2016/Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.mp4 |
104.6 MB |
TheIACR/Crypto 2016/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.mp4 |
79.8 MB |
TheIACR/Crypto 2016/Lightweight Multiplication in GF2n with Applications to MDS Matrices.mp4 |
124.5 MB |
TheIACR/Crypto 2016/Linicrypt A Model for Practical Cryptography.mp4 |
157.3 MB |
TheIACR/Crypto 2016/Memory Efficient Algorithms for Finding Needles in Haystacks.mp4 |
98.8 MB |
TheIACR/Crypto 2016/Network Hiding Communication and Applications to Multi Party Protocols.mp4 |
129.2 MB |
TheIACR/Crypto 2016/Network Oblivious Transfer.mp4 |
149 MB |
TheIACR/Crypto 2016/New Insights on AES Like SPN Ciphers.mp4 |
39.1 MB |
TheIACR/Crypto 2016/Obfuscation Combiners.mp4 |
145.1 MB |
TheIACR/Crypto 2016/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4 |
305.4 MB |
TheIACR/Crypto 2016/On the Communication required for Unconditionally Secure Multiplication.mp4 |
153.2 MB |
TheIACR/Crypto 2016/On the Power of Secure Two Party Computation.mp4 |
160.5 MB |
TheIACR/Crypto 2016/On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings - YouTube.mp4 |
153 MB |
TheIACR/Crypto 2016/Optimal Security Proofs for Signatures from Identification Schemes.mp4 |
130 MB |
TheIACR/Crypto 2016/ParTI Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.mp4 |
33.3 MB |
TheIACR/Crypto 2016/Probabilistic Termination and Composability of Cryptographic Protocols.mp4 |
178.2 MB |
TheIACR/Crypto 2016/Programmable Hash Functions from Lattices.mp4 |
174.7 MB |
TheIACR/Crypto 2016/Quantum Homomorphic Encryption for Polynomial sized Circuits.mp4 |
147.4 MB |
TheIACR/Crypto 2016/Rate 1, Linear Time and Additively Homomorphic UC Commitments.mp4 |
158.1 MB |
TheIACR/Crypto 2016/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.mp4 |
210.6 MB |
TheIACR/Crypto 2016/Secure Protocol Transformations.mp4 |
91.5 MB |
TheIACR/Crypto 2016/Semantic Security and Indistinguishability in the Quantum World.mp4 |
170.6 MB |
TheIACR/Crypto 2016/Separate Separations of CPA and Circular Security for Any Cycle Length.mp4 |
144.8 MB |
TheIACR/Crypto 2016/TWORAM Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.mp4 |
173.3 MB |
TheIACR/Crypto 2016/The Magic of ELFs.mp4 |
125.9 MB |
TheIACR/Crypto 2016/The Multi User Security of Authenticated Encryption AES GCM in TLS 1 3.mp4 |
110.8 MB |
TheIACR/Crypto 2016/Towards Sound Fresh Re Keying with Hard Physical Learning Problems.mp4 |
87.5 MB |
TheIACR/Crypto 2016/Two Message Oblivious Evaluation of Cryptographic Functionalities.mp4 |
159.6 MB |
TheIACR/Crypto 2016/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.mp4 |
163.4 MB |
TheIACR/Crypto 2016/Universal Obfuscation and Witness Encryption Boosting Correctness and Combining Security.mp4 |
171.7 MB |
TheIACR/Crypto 2016/XPX Generalized Tweakable Even Mansour with Improved Security Guarantees.mp4 |
117.4 MB |
TheIACR/Crypto 2017 Rump Session/Blockchains and consensus protocols Snake oil warning.mp4 |
8.9 MB |
TheIACR/Crypto 2017 Rump Session/Browser Security with a Grain of Salt.mp4 |
6.9 MB |
TheIACR/Crypto 2017 Rump Session/Constraint Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.mp4 |
16.1 MB |
TheIACR/Crypto 2017 Rump Session/Delegatable Anonymous Credentials from Mercurial Signatures.mp4 |
15.5 MB |
TheIACR/Crypto 2017 Rump Session/Forty years and still running.mp4 |
15 MB |
TheIACR/Crypto 2017 Rump Session/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.mp4 |
10.4 MB |
TheIACR/Crypto 2017 Rump Session/How not to pay with Bitcoin.mp4 |
13.5 MB |
TheIACR/Crypto 2017 Rump Session/IACR Award Ceremony.mp4 |
33 MB |
TheIACR/Crypto 2017 Rump Session/Implementing Provably Secure Detection of Direct Injection Attacks.mp4 |
18.2 MB |
TheIACR/Crypto 2017 Rump Session/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.mp4 |
3.7 MB |
TheIACR/Crypto 2017 Rump Session/Learning the One Time Pad algorithm with Chosen Plaintext Attack Adversarial Neural Cryptography.mp4 |
3.2 MB |
TheIACR/Crypto 2017 Rump Session/Lockable Obfuscation.mp4 |
20 MB |
TheIACR/Crypto 2017 Rump Session/Magallanes.mp4 |
15.4 MB |
TheIACR/Crypto 2017 Rump Session/Make Crypto Not Maps!.mp4 |
11.3 MB |
TheIACR/Crypto 2017 Rump Session/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.mp4 |
21.9 MB |
TheIACR/Crypto 2017 Rump Session/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.mp4 |
18.7 MB |
TheIACR/Crypto 2017 Rump Session/Notes on ``Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.mp4 |
12.9 MB |
TheIACR/Crypto 2017 Rump Session/Program Chair's Report by Jonathan Katz.mp4 |
8.5 MB |
TheIACR/Crypto 2017 Rump Session/Proofs of Work for Blockchain Protocols.mp4 |
3.5 MB |
TheIACR/Crypto 2017 Rump Session/Quantum Computing Threat or Menace.mp4 |
4.2 MB |
TheIACR/Crypto 2017 Rump Session/Real world zkSNARKs updates on Zcash, libsnark.mp4 |
10 MB |
TheIACR/Crypto 2017 Rump Session/Report from ECC 2017.mp4 |
4.6 MB |
TheIACR/Crypto 2017 Rump Session/Security and Composition of Rational Cryptographic Protocols.mp4 |
12.2 MB |
TheIACR/Crypto 2017 Rump Session/Self Correcting Random Oracles and Its Cliptographic Applications.mp4 |
8 MB |
TheIACR/Crypto 2017 Rump Session/Separable Statistics, New Extension to Linear Cryptanalysis.mp4 |
5.3 MB |
TheIACR/Crypto 2017 Rump Session/Test of Time Award for the best Rump Session Presentation!.mp4 |
17.3 MB |
TheIACR/Crypto 2017 Rump Session/The JMAC MAC.mp4 |
6.3 MB |
TheIACR/Crypto 2017 Rump Session/The Sound of Quantum.mp4 |
4.9 MB |
TheIACR/Crypto 2017 Rump Session/The early history of blockchains.mp4 |
7.1 MB |
TheIACR/Crypto 2017 Rump Session/Top secret! A world of codes and ciphers an exhibition.mp4 |
3.2 MB |
TheIACR/Crypto 2017/A Formal Treatment of Multi key Channels - YouTube.mp4 |
62.9 MB |
TheIACR/Crypto 2017/A New Approach to Round Optimal Secure Multiparty Computation.mp4 |
27 MB |
TheIACR/Crypto 2017/A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.mp4 |
86.2 MB |
TheIACR/Crypto 2017/Amortization with Fewer Equations for Proving Knowledge of Small Secrets.mp4 |
58.2 MB |
TheIACR/Crypto 2017/Anonymous Attestation with Subverted TPMs.mp4 |
85.6 MB |
TheIACR/Crypto 2017/Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.mp4 |
103.9 MB |
TheIACR/Crypto 2017/Be Adaptive, Avoid Overcommitting.mp4 |
75.6 MB |
TheIACR/Crypto 2017/Bitcoin as a Transaction Ledger A Composable Treatment.mp4 |
24.8 MB |
TheIACR/Crypto 2017/Black Box Parallel Garbled RAM.mp4 |
66 MB |
TheIACR/Crypto 2017/Boosting Authenticated Encryption Robustness With Minimal Modifications.mp4 |
156.9 MB |
TheIACR/Crypto 2017/Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.mp4 |
37.1 MB |
TheIACR/Crypto 2017/Compact Structure Preserving Signatures with Almost Tight Security - YouTube.mp4 |
109.2 MB |
TheIACR/Crypto 2017/Conditional Disclosure of Secrets Amplification, Closure, Amortization, Lower bounds, and Separatio.mp4 |
98.3 MB |
TheIACR/Crypto 2017/Conditional Disclosure of Secrets via Non Linear Reconstruction.mp4 |
83.2 MB |
TheIACR/Crypto 2017/Cube Attacks on Non Blackbox Polynomials Based on Division Property.mp4 |
98.2 MB |
TheIACR/Crypto 2017/Degree Evaluation of NFSR Based Cryptosystems.mp4 |
64.5 MB |
TheIACR/Crypto 2017/Distinguisher Dependent Simulation in Two Rounds and Its Applications.mp4 |
81.3 MB |
TheIACR/Crypto 2017/Encrypted Davies Meyer and Its Dual Towards Optimal Security Using Mirror Theory.mp4 |
88.4 MB |
TheIACR/Crypto 2017/Encryption switching protocols revisited switching modulo p.mp4 |
34.4 MB |
TheIACR/Crypto 2017/Fast Secure Two Party ECDSA Signing.mp4 |
141.2 MB |
TheIACR/Crypto 2017/Four Round Concurrent Non Malleable Commitments from One Way Functions.mp4 |
103.4 MB |
TheIACR/Crypto 2017/From Obfuscation to the Security of Fiat Shamir for Proofs.mp4 |
161.8 MB |
TheIACR/Crypto 2017/Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners.mp4 |
90.6 MB |
TheIACR/Crypto 2017/Gaussian Sampling over the Integers Efficient, Generic, Constant Time.mp4 |
135.7 MB |
TheIACR/Crypto 2017/Generic Transformations of Predicate Encodings Constructions and Applications.mp4 |
68.7 MB |
TheIACR/Crypto 2017/Hedging Public Key Encryption in the Real World.mp4 |
24.7 MB |
TheIACR/Crypto 2017/Identity Based Encryption from the Diffie Hellman Assumption.mp4 |
31.7 MB |
TheIACR/Crypto 2017/Identity based Encryption from Codes with Rank Metric.mp4 |
68.7 MB |
TheIACR/Crypto 2017/Incremental Program Obfuscation.mp4 |
93.5 MB |
TheIACR/Crypto 2017/Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.mp4 |
68.8 MB |
TheIACR/Crypto 2017/Indistinguishability Obfuscation for Turing Machines Constant Overhead and Amortization.mp4 |
120.8 MB |
TheIACR/Crypto 2017/Information theoretic Indistinguishability via the Chi squared Method.mp4 |
144.1 MB |
TheIACR/Crypto 2017/Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.mp4 |
151.3 MB |
TheIACR/Crypto 2017/Joint presentation.mp4 |
93.1 MB |
TheIACR/Crypto 2017/Key Rotation for Authenticated Encryption.mp4 |
86.1 MB |
TheIACR/Crypto 2017/Kurosawa Desmedt Meets Tight Security.mp4 |
81.7 MB |
TheIACR/Crypto 2017/LPN Decoded.mp4 |
74.3 MB |
TheIACR/Crypto 2017/Laconic Oblivious Transfer and its Applications.mp4 |
90.4 MB |
TheIACR/Crypto 2017/Lower Bounds on Obfuscation from All or Nothing Encryption.mp4 |
54 MB |
TheIACR/Crypto 2017/Memory Tight Reductions.mp4 |
68.8 MB |
TheIACR/Crypto 2017/Message Franking via Committing Authenticated Encryption.mp4 |
104.8 MB |
TheIACR/Crypto 2017/Middle Product Learning With Errors.mp4 |
61.7 MB |
TheIACR/Crypto 2017/New security notions and feasibility results for authentication of quantum data.mp4 |
71.6 MB |
TheIACR/Crypto 2017/Non Full Sbox Linearization Applications to Collision Attacks on Round Reduced Keccak.mp4 |
79.7 MB |
TheIACR/Crypto 2017/Non Malleable Codes for Space Bounded Tampering.mp4 |
75.9 MB |
TheIACR/Crypto 2017/Optimal Security Reductions for Unique Signatures Bypassing Impossibilities with A Counterexample.mp4 |
161.8 MB |
TheIACR/Crypto 2017/Ouroboros A Provably Secure Proof of Stake Protocol.mp4 |
42.6 MB |
TheIACR/Crypto 2017/PRF ODH Relations, Instantiations, and Impossibility Results.mp4 |
67.1 MB |
TheIACR/Crypto 2017/Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.mp4 |
26.1 MB |
TheIACR/Crypto 2017/Privacy Free Garbled Circuits for Formulas Size Zero and Information Theoretic.mp4 |
18.6 MB |
TheIACR/Crypto 2017/Private Multiplication over Finite Fields.mp4 |
70.6 MB |
TheIACR/Crypto 2017/Prospects for a Quantum Factoring Machine.mp4 |
235.4 MB |
TheIACR/Crypto 2017/Proving Resistance against Invariant Attacks How to Choose the Round Constants.mp4 |
114.6 MB |
TheIACR/Crypto 2017/Quantum Security of NMAC and Related Constructions.mp4 |
161 MB |
TheIACR/Crypto 2017/Quantum non malleability and authentication.mp4 |
99.2 MB |
TheIACR/Crypto 2017/Ratcheted Encryption and Key Exchange The Security of Messaging.mp4 |
78.7 MB |
TheIACR/Crypto 2017/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.mp4 |
62.9 MB |
TheIACR/Crypto 2017/Secure Computation based on Leaky Correlations High Resilience Setting.mp4 |
58.7 MB |
TheIACR/Crypto 2017/Snarky Signatures Minimal Signatures of Knowledge from Simulation Extractable SNARKs.mp4 |
117.4 MB |
TheIACR/Crypto 2017/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.mp4 |
64.6 MB |
TheIACR/Crypto 2017/Structure vs Hardness through the Obfuscation Lens.mp4 |
88.4 MB |
TheIACR/Crypto 2017/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.mp4 |
41.4 MB |
TheIACR/Crypto 2017/The Price of Low Communication in Secure Multi Party Computation.mp4 |
77.4 MB |
TheIACR/Crypto 2017/The TinyTable protocol or Gate scrambling Revisited.mp4 |
21.1 MB |
TheIACR/Crypto 2017/The first collision for full SHA 1.mp4 |
39.4 MB |
TheIACR/Crypto 2017/Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.mp4 |
155.7 MB |
TheIACR/Crypto 2017/Topology Hiding Computation on All Graphs.mp4 |
67.5 MB |
TheIACR/Crypto 2017/Two papers on Indistinguishability Obfuscation (soft merge).mp4 |
85.6 MB |
TheIACR/Crypto 2017/Verified Drop in Replacements for TLS&HTTPS.mp4 |
66.4 MB |
TheIACR/Crypto 2017/Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.mp4 |
88.8 MB |
TheIACR/Crypto 2017/ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.mp4 |
37.1 MB |
TheIACR/Crypto 2018 Rump Session/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2018 Rump Session/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.mp4 |
4.6 MB |
TheIACR/Crypto 2018 Rump Session/A small problem Regarding permutations.mp4 |
5.9 MB |
TheIACR/Crypto 2018 Rump Session/Account Management and Stake Pools in Proof of Stake Ledgers.en.transcribed.srt |
11 KB |
TheIACR/Crypto 2018 Rump Session/Account Management and Stake Pools in Proof of Stake Ledgers.mp4 |
10.5 MB |
TheIACR/Crypto 2018 Rump Session/Adversarial Correctness Favors Laziness.mp4 |
6.9 MB |
TheIACR/Crypto 2018 Rump Session/Attestation as a Service (AaaS).en.transcribed.srt |
21 KB |
TheIACR/Crypto 2018 Rump Session/Attestation as a Service (AaaS).mp4 |
21.2 MB |
TheIACR/Crypto 2018 Rump Session/Blockchain and the Identity Problem.en.transcribed.srt |
4 KB |
TheIACR/Crypto 2018 Rump Session/Blockchain and the Identity Problem.mp4 |
6.8 MB |
TheIACR/Crypto 2018 Rump Session/Blockchain!.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2018 Rump Session/Blockchain!.mp4 |
11 MB |
TheIACR/Crypto 2018 Rump Session/Bodka Not V, But B.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2018 Rump Session/Bodka Not V, But B.mp4 |
7.7 MB |
TheIACR/Crypto 2018 Rump Session/Computational Ring LWR problem.mp4 |
5.1 MB |
TheIACR/Crypto 2018 Rump Session/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.en.transcribed.srt |
5 KB |
TheIACR/Crypto 2018 Rump Session/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.mp4 |
6.5 MB |
TheIACR/Crypto 2018 Rump Session/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.en.transcribed.srt |
12 KB |
TheIACR/Crypto 2018 Rump Session/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.mp4 |
15 MB |
TheIACR/Crypto 2018 Rump Session/How to Mimic Nakamoto's Design via Proof of stake and more.en.transcribed.srt |
11 KB |
TheIACR/Crypto 2018 Rump Session/How to Mimic Nakamoto's Design via Proof of stake and more.mp4 |
11.5 MB |
TheIACR/Crypto 2018 Rump Session/IACR Award Ceremony.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2018 Rump Session/IACR Award Ceremony.mp4 |
126.9 MB |
TheIACR/Crypto 2018 Rump Session/In memory attacks at crypto currency wallets.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2018 Rump Session/In memory attacks at crypto currency wallets.mp4 |
7.1 MB |
TheIACR/Crypto 2018 Rump Session/Kahn Ni Melm - John Steinbeck's Secret Language.en.transcribed.srt |
19 KB |
TheIACR/Crypto 2018 Rump Session/Kahn Ni Melm - John Steinbeck's Secret Language.mp4 |
17 MB |
TheIACR/Crypto 2018 Rump Session/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.mp4 |
12.8 MB |
TheIACR/Crypto 2018 Rump Session/Laconic Function Evaluation.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2018 Rump Session/Laconic Function Evaluation.mp4 |
9 MB |
TheIACR/Crypto 2018 Rump Session/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2018 Rump Session/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.mp4 |
11.8 MB |
TheIACR/Crypto 2018 Rump Session/NIST Update.en.transcribed.srt |
23 KB |
TheIACR/Crypto 2018 Rump Session/NIST Update.mp4 |
18 MB |
TheIACR/Crypto 2018 Rump Session/Obfuscation Using Tensor Products.en.transcribed.srt |
12 KB |
TheIACR/Crypto 2018 Rump Session/Obfuscation Using Tensor Products.mp4 |
17.6 MB |
TheIACR/Crypto 2018 Rump Session/PQCzoo Post Quantum Beasts and Where to Find Them.en.transcribed.srt |
5 KB |
TheIACR/Crypto 2018 Rump Session/PQCzoo Post Quantum Beasts and Where to Find Them.mp4 |
4.6 MB |
TheIACR/Crypto 2018 Rump Session/Prime and Prejudice Primality Testing Under Adversarial Conditions.en.transcribed.srt |
12 KB |
TheIACR/Crypto 2018 Rump Session/Prime and Prejudice Primality Testing Under Adversarial Conditions.mp4 |
12.4 MB |
TheIACR/Crypto 2018 Rump Session/RISC V Foundation Security Standing Committee Call to action!!.en.transcribed.srt |
7 KB |
TheIACR/Crypto 2018 Rump Session/RISC V Foundation Security Standing Committee Call to action!!.mp4 |
6.8 MB |
TheIACR/Crypto 2018 Rump Session/RSA-OAEP without Random Oracles, Featuring Eminem.en.transcribed.srt |
15 KB |
TheIACR/Crypto 2018 Rump Session/RSA-OAEP without Random Oracles, Featuring Eminem.mp4 |
11.1 MB |
TheIACR/Crypto 2018 Rump Session/Robust Property Preserving Hashes.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2018 Rump Session/Robust Property Preserving Hashes.mp4 |
7 MB |
TheIACR/Crypto 2018 Rump Session/Secure MPC Laziness Leads to GOD.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2018 Rump Session/Secure MPC Laziness Leads to GOD.mp4 |
9.7 MB |
TheIACR/Crypto 2018 Rump Session/Setup Free SNARKs from Hidden Order Groups.en.transcribed.srt |
9 KB |
TheIACR/Crypto 2018 Rump Session/Setup Free SNARKs from Hidden Order Groups.mp4 |
9 MB |
TheIACR/Crypto 2018 Rump Session/SoK A Consensus Taxonomy in the Blockchain Era.en.transcribed.srt |
20 KB |
TheIACR/Crypto 2018 Rump Session/SoK A Consensus Taxonomy in the Blockchain Era.mp4 |
16.4 MB |
TheIACR/Crypto 2018 Rump Session/Stand up Crypto Comedy.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2018 Rump Session/Stand up Crypto Comedy.mp4 |
9.8 MB |
TheIACR/Crypto 2018 Rump Session/Statistical Ineffective Fault Attacks.mp4 |
5.5 MB |
TheIACR/Crypto 2018 Rump Session/Surveillance from Brussels Privacy at UCSB CAM for fun.en.transcribed.srt |
7 KB |
TheIACR/Crypto 2018 Rump Session/Surveillance from Brussels Privacy at UCSB CAM for fun.mp4 |
9.5 MB |
TheIACR/Crypto 2018 Rump Session/Synesthesia.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2018 Rump Session/Synesthesia.mp4 |
9.6 MB |
TheIACR/Crypto 2018 Rump Session/The CERES Project Campaign to Enhance Research Experience.en.transcribed.srt |
7 KB |
TheIACR/Crypto 2018 Rump Session/The CERES Project Campaign to Enhance Research Experience.mp4 |
6.4 MB |
TheIACR/Crypto 2018 Rump Session/The Collector Gigabit True Random Number Generator Using Image Sensor Noise.en.transcribed.srt |
7 KB |
TheIACR/Crypto 2018 Rump Session/The Collector Gigabit True Random Number Generator Using Image Sensor Noise.mp4 |
7.6 MB |
TheIACR/Crypto 2018 Rump Session/The Danish Crypto Choir Don't Worry, Be Happy!.en.transcribed.srt |
5 KB |
TheIACR/Crypto 2018 Rump Session/The Danish Crypto Choir Don't Worry, Be Happy!.mp4 |
24.8 MB |
TheIACR/Crypto 2018 Rump Session/Theory of Cryptography Conference Test-of-Time Award Recipients.mp4 |
5.5 MB |
TheIACR/Crypto 2018 Rump Session/Towards a general classification framework for cryptocurrency.mp4 |
21.7 MB |
TheIACR/Crypto 2018 Rump Session/What does the SHARK say.en.transcribed.srt |
12 KB |
TheIACR/Crypto 2018 Rump Session/What does the SHARK say.mp4 |
18 MB |
TheIACR/Crypto 2018 Rump Session/Zero Knowledge Standardization.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2018 Rump Session/Zero Knowledge Standardization.mp4 |
5.8 MB |
TheIACR/Crypto 2018 Rump Session/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2018 Rump Session/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.mp4 |
8 MB |
TheIACR/Crypto 2018/A Key recovery Attack on 855 round Trivium.en.transcribed.srt |
19 KB |
TheIACR/Crypto 2018/A Key recovery Attack on 855 round Trivium.mp4 |
17.9 MB |
TheIACR/Crypto 2018/A New Public Key Cryptosystem via Mersenne Numbers.en.transcribed.srt |
46 KB |
TheIACR/Crypto 2018/A New Public Key Cryptosystem via Mersenne Numbers.mp4 |
47.7 MB |
TheIACR/Crypto 2018/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.en.transcribed.srt |
64 KB |
TheIACR/Crypto 2018/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.mp4 |
66.3 MB |
TheIACR/Crypto 2018/Amortized Complexity of Information Theoretically Secure MPC Revisted.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2018/Amortized Complexity of Information Theoretically Secure MPC Revisted.mp4 |
71.6 MB |
TheIACR/Crypto 2018/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.en.transcribed.srt |
49 KB |
TheIACR/Crypto 2018/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.mp4 |
62.5 MB |
TheIACR/Crypto 2018/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.en.transcribed.srt |
64 KB |
TheIACR/Crypto 2018/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.mp4 |
76.1 MB |
TheIACR/Crypto 2018/CAPA The Spirit of Beaver Against Physical Attacks.en.transcribed.srt |
58 KB |
TheIACR/Crypto 2018/CAPA The Spirit of Beaver Against Physical Attacks.mp4 |
119.6 MB |
TheIACR/Crypto 2018/Combiners for Backdoored Random Oracles.en.transcribed.srt |
43 KB |
TheIACR/Crypto 2018/Combiners for Backdoored Random Oracles.mp4 |
37.9 MB |
TheIACR/Crypto 2018/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.mp4 |
85.3 MB |
TheIACR/Crypto 2018/Contrained PRFs for NC1 in Traditional Groups.en.transcribed.srt |
58 KB |
TheIACR/Crypto 2018/Contrained PRFs for NC1 in Traditional Groups.mp4 |
50.8 MB |
TheIACR/Crypto 2018/Correcting Subverted Random Oracles.en.transcribed.srt |
63 KB |
TheIACR/Crypto 2018/Correcting Subverted Random Oracles.mp4 |
111.6 MB |
TheIACR/Crypto 2018/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.mp4 |
80.9 MB |
TheIACR/Crypto 2018/Cryptanalysis via Algebraic Spans.en.transcribed.srt |
56 KB |
TheIACR/Crypto 2018/Cryptanalysis via Algebraic Spans.mp4 |
98.1 MB |
TheIACR/Crypto 2018/Crypto A Key Ingredient to Building Respectful Products.en.transcribed.srt |
129 KB |
TheIACR/Crypto 2018/Crypto A Key Ingredient to Building Respectful Products.mp4 |
165.4 MB |
TheIACR/Crypto 2018/Dissection BKW.en.transcribed.srt |
54 KB |
TheIACR/Crypto 2018/Dissection BKW.mp4 |
55 MB |
TheIACR/Crypto 2018/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2018/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.mp4 |
52.1 MB |
TheIACR/Crypto 2018/Fast Correlation Attack Revisted.en.transcribed.srt |
45 KB |
TheIACR/Crypto 2018/Fast Correlation Attack Revisted.mp4 |
37.2 MB |
TheIACR/Crypto 2018/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.mp4 |
61.3 MB |
TheIACR/Crypto 2018/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.en.transcribed.srt |
60 KB |
TheIACR/Crypto 2018/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.mp4 |
67.8 MB |
TheIACR/Crypto 2018/Fast Large Scale Honest Majority MPC for Malicious Adversaries.en.transcribed.srt |
60 KB |
TheIACR/Crypto 2018/Fast Large Scale Honest Majority MPC for Malicious Adversaries.mp4 |
64.8 MB |
TheIACR/Crypto 2018/Fast Message Franking From Invisible Salamanders to Encryptment.en.transcribed.srt |
62 KB |
TheIACR/Crypto 2018/Fast Message Franking From Invisible Salamanders to Encryptment.mp4 |
83.9 MB |
TheIACR/Crypto 2018/Faster Homomorphic Linear Transformations in HElib.en.transcribed.srt |
62 KB |
TheIACR/Crypto 2018/Faster Homomorphic Linear Transformations in HElib.mp4 |
84.5 MB |
TheIACR/Crypto 2018/From Idea to Impact, the Crypto Story What's Next.en.transcribed.srt |
202 KB |
TheIACR/Crypto 2018/From Idea to Impact, the Crypto Story What's Next.mp4 |
183.4 MB |
TheIACR/Crypto 2018/From Laconic Zero Knowledge to Public Key Cryptography.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/From Laconic Zero Knowledge to Public Key Cryptography.mp4 |
71.9 MB |
TheIACR/Crypto 2018/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.en.transcribed.srt |
64 KB |
TheIACR/Crypto 2018/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.mp4 |
53.2 MB |
TheIACR/Crypto 2018/Generic Attacks Against Beyond Birthday Bound MACs.mp4 |
81.5 MB |
TheIACR/Crypto 2018/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.en.transcribed.srt |
82 KB |
TheIACR/Crypto 2018/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.mp4 |
59 MB |
TheIACR/Crypto 2018/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.en.transcribed.srt |
34 KB |
TheIACR/Crypto 2018/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.mp4 |
35.9 MB |
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.986be025-7357-4c41-a308-671cf2fbedf2.part |
94.5 MB |
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.en.transcribed.srt |
51 KB |
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.mp4 |
17 MB |
TheIACR/Crypto 2018/Indifferentiable Authenticated Encryption.en.transcribed.srt |
47 KB |
TheIACR/Crypto 2018/Indifferentiable Authenticated Encryption.mp4 |
48.1 MB |
TheIACR/Crypto 2018/Lattice Based Zero Knowledge Arguments for Integer Relations.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/Lattice Based Zero Knowledge Arguments for Integer Relations.mp4 |
114.4 MB |
TheIACR/Crypto 2018/Limits of Practical Sublinear Secure Computation.en.transcribed.srt |
63 KB |
TheIACR/Crypto 2018/Limits of Practical Sublinear Secure Computation.mp4 |
41.3 MB |
TheIACR/Crypto 2018/Limits on the Power of Garbling Techniques for Public Key Encryption.en.transcribed.srt |
59 KB |
TheIACR/Crypto 2018/Limits on the Power of Garbling Techniques for Public Key Encryption.mp4 |
69.9 MB |
TheIACR/Crypto 2018/Lower Bounds on Lattice Enumeration with Extreme Pruning.mp4 |
54.5 MB |
TheIACR/Crypto 2018/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.en.transcribed.srt |
54 KB |
TheIACR/Crypto 2018/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.mp4 |
58.3 MB |
TheIACR/Crypto 2018/Multi Theorem Preprocessing NIZKs from Lattices.en.transcribed.srt |
69 KB |
TheIACR/Crypto 2018/Multi Theorem Preprocessing NIZKs from Lattices.mp4 |
54.8 MB |
TheIACR/Crypto 2018/Must the Communication Graph of MPC Protocols be an Expander.en.transcribed.srt |
45 KB |
TheIACR/Crypto 2018/Must the Communication Graph of MPC Protocols be an Expander.mp4 |
65.8 MB |
TheIACR/Crypto 2018/Non Interactive Zero Knowledge Proofs for Composite Statements.en.transcribed.srt |
56 KB |
TheIACR/Crypto 2018/Non Interactive Zero Knowledge Proofs for Composite Statements.mp4 |
45.2 MB |
TheIACR/Crypto 2018/Non Malleable Codes for Partial Functions with Manipulation Detection.en.transcribed.srt |
54 KB |
TheIACR/Crypto 2018/Non Malleable Codes for Partial Functions with Manipulation Detection.mp4 |
64.1 MB |
TheIACR/Crypto 2018/Non Malleable Secret Sharing for General Access Structures.mp4 |
110.4 MB |
TheIACR/Crypto 2018/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.en.transcribed.srt |
53 KB |
TheIACR/Crypto 2018/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.mp4 |
48.9 MB |
TheIACR/Crypto 2018/On Distributional Collision Resistant Hashing.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/On Distributional Collision Resistant Hashing.mp4 |
65.3 MB |
TheIACR/Crypto 2018/On Tightly Secure Non Interactive Key Exchange.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2018/On Tightly Secure Non Interactive Key Exchange.mp4 |
98.5 MB |
TheIACR/Crypto 2018/On the Complexity of Compressing Obfuscation.en.transcribed.srt |
59 KB |
TheIACR/Crypto 2018/On the Complexity of Compressing Obfuscation.mp4 |
71.6 MB |
TheIACR/Crypto 2018/On the Exact Round Complexity of Secure Three Party Computation.en.transcribed.srt |
62 KB |
TheIACR/Crypto 2018/On the Exact Round Complexity of Secure Three Party Computation.mp4 |
50.5 MB |
TheIACR/Crypto 2018/On the Local Leakage Resilience of Linear Secret Sharing Schemes.en.transcribed.srt |
60 KB |
TheIACR/Crypto 2018/On the Local Leakage Resilience of Linear Secret Sharing Schemes.mp4 |
55.9 MB |
TheIACR/Crypto 2018/On the Round Complexity of OT Extension.en.transcribed.srt |
56 KB |
TheIACR/Crypto 2018/On the Round Complexity of OT Extension.mp4 |
58.8 MB |
TheIACR/Crypto 2018/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.en.transcribed.srt |
46 KB |
TheIACR/Crypto 2018/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.mp4 |
91.8 MB |
TheIACR/Crypto 2018/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.en.transcribed.srt |
68 KB |
TheIACR/Crypto 2018/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.mp4 |
53 MB |
TheIACR/Crypto 2018/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.en.transcribed.srt |
65 KB |
TheIACR/Crypto 2018/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.mp4 |
35.3 MB |
TheIACR/Crypto 2018/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.en.transcribed.srt |
50 KB |
TheIACR/Crypto 2018/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.mp4 |
89.4 MB |
TheIACR/Crypto 2018/Private Circuits A Modular Approach.en.transcribed.srt |
56 KB |
TheIACR/Crypto 2018/Private Circuits A Modular Approach.mp4 |
51.5 MB |
TheIACR/Crypto 2018/Promise Zero Knowledge and its Applications to Round Optimal MPC.mp4 |
27.9 MB |
TheIACR/Crypto 2018/Proofs of Work from Worst Case Assumptions.en.transcribed.srt |
62 KB |
TheIACR/Crypto 2018/Proofs of Work from Worst Case Assumptions.mp4 |
68.6 MB |
TheIACR/Crypto 2018/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.en.transcribed.srt |
50 KB |
TheIACR/Crypto 2018/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.mp4 |
33.2 MB |
TheIACR/Crypto 2018/Pseudorandom Quantum States.en.transcribed.srt |
49 KB |
TheIACR/Crypto 2018/Pseudorandom Quantum States.mp4 |
59 MB |
TheIACR/Crypto 2018/Quantum FHE Almost As Secure As Classical.en.transcribed.srt |
80 KB |
TheIACR/Crypto 2018/Quantum FHE Almost As Secure As Classical.mp4 |
67.6 MB |
TheIACR/Crypto 2018/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.en.transcribed.srt |
42 KB |
TheIACR/Crypto 2018/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.mp4 |
45.6 MB |
TheIACR/Crypto 2018/Round Optimal Secure Multi Party Computation.en.transcribed.srt |
29 KB |
TheIACR/Crypto 2018/Round Optimal Secure Multi Party Computation.mp4 |
37.4 MB |
TheIACR/Crypto 2018/Round Optimal Secure Multiparty Computation with Honest Majority.en.transcribed.srt |
49 KB |
TheIACR/Crypto 2018/Round Optimal Secure Multiparty Computation with Honest Majority.mp4 |
41.3 MB |
TheIACR/Crypto 2018/SPDZ2k Efficient MPC mod 2^k for Dishonest Majority.en.transcribed.srt |
82 KB |
TheIACR/Crypto 2018/SPDZ2k Efficient MPC mod 2^k for Dishonest Majority.mp4 |
68.4 MB |
TheIACR/Crypto 2018/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.mp4 |
60.6 MB |
TheIACR/Crypto 2018/Simplifying Game Based Definitions.en.transcribed.srt |
47 KB |
TheIACR/Crypto 2018/Simplifying Game Based Definitions.mp4 |
72.1 MB |
TheIACR/Crypto 2018/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.en.transcribed.srt |
54 KB |
TheIACR/Crypto 2018/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.mp4 |
40.1 MB |
TheIACR/Crypto 2018/The Algebraic Group Model and its Applications.mp4 |
57.9 MB |
TheIACR/Crypto 2018/The Curse of Small Domains New Attacks on Format Preserving Encryption.en.transcribed.srt |
42 KB |
TheIACR/Crypto 2018/The Curse of Small Domains New Attacks on Format Preserving Encryption.mp4 |
91.5 MB |
TheIACR/Crypto 2018/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2018/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.mp4 |
26.7 MB |
TheIACR/Crypto 2018/Tight Tradeoffs in Searchable Symmetric Encryption.en.transcribed.srt |
24 KB |
TheIACR/Crypto 2018/Tight Tradeoffs in Searchable Symmetric Encryption.mp4 |
32.4 MB |
TheIACR/Crypto 2018/TinyKeys A New Approach to Efficient Multi Party Computation.en.transcribed.srt |
56 KB |
TheIACR/Crypto 2018/TinyKeys A New Approach to Efficient Multi Party Computation.mp4 |
84.1 MB |
TheIACR/Crypto 2018/Towards Bidirectional Ratcheted Key Exchange.en.transcribed.srt |
57 KB |
TheIACR/Crypto 2018/Towards Bidirectional Ratcheted Key Exchange.mp4 |
95.6 MB |
TheIACR/Crypto 2018/Trapdoor Functions from the Computational Diffie Hellman Assumption.en.transcribed.srt |
50 KB |
TheIACR/Crypto 2018/Trapdoor Functions from the Computational Diffie Hellman Assumption.mp4 |
30.2 MB |
TheIACR/Crypto 2018/Two Round Multiparty Secure Computation Minimizing Public Key Operations.en.transcribed.srt |
54 KB |
TheIACR/Crypto 2018/Two Round Multiparty Secure Computation Minimizing Public Key Operations.mp4 |
97.3 MB |
TheIACR/Crypto 2018/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.en.transcribed.srt |
46 KB |
TheIACR/Crypto 2018/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.mp4 |
53.9 MB |
TheIACR/Crypto 2018/Verifiable Delay Functions.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2018/Verifiable Delay Functions.mp4 |
43.8 MB |
TheIACR/Crypto 2018/Yes, There is an Oblivious RAM Lower Bound!.mp4 |
56.9 MB |
TheIACR/Crypto 2018/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.en.transcribed.srt |
43 KB |
TheIACR/Crypto 2018/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.mp4 |
37.1 MB |
TheIACR/Crypto 2019 Rump Session/48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.en.transcribed.srt |
9 KB |
TheIACR/Crypto 2019 Rump Session/48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.mp4 |
21 MB |
TheIACR/Crypto 2019 Rump Session/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.mp4 |
12.3 MB |
TheIACR/Crypto 2019 Rump Session/Algebraically Structured LWE, Revisited.mp4 |
20.3 MB |
TheIACR/Crypto 2019 Rump Session/Asymmetric distributed trust.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2019 Rump Session/Asymmetric distributed trust.mp4 |
21.7 MB |
TheIACR/Crypto 2019 Rump Session/Bringing Verifiable Delay Functions Into Production.mp4 |
11.9 MB |
TheIACR/Crypto 2019 Rump Session/Cards Against Cryptography.en.transcribed.srt |
3 KB |
TheIACR/Crypto 2019 Rump Session/Cards Against Cryptography.mp4 |
8.7 MB |
TheIACR/Crypto 2019 Rump Session/Collusion Preserving Computation without a Mediator.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/Collusion Preserving Computation without a Mediator.mp4 |
20.3 MB |
TheIACR/Crypto 2019 Rump Session/Cryptanalyzing the Legendre PRF.en.transcribed.srt |
4 KB |
TheIACR/Crypto 2019 Rump Session/Cryptanalyzing the Legendre PRF.mp4 |
11.4 MB |
TheIACR/Crypto 2019 Rump Session/DARPA Cryptographic Research.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2019 Rump Session/DARPA Cryptographic Research.mp4 |
16.1 MB |
TheIACR/Crypto 2019 Rump Session/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.mp4 |
19.2 MB |
TheIACR/Crypto 2019 Rump Session/He Gives C Sieves on the CSIDH.en.transcribed.srt |
12 KB |
TheIACR/Crypto 2019 Rump Session/He Gives C Sieves on the CSIDH.mp4 |
25.2 MB |
TheIACR/Crypto 2019 Rump Session/Implementing Signal.mp4 |
24.2 MB |
TheIACR/Crypto 2019 Rump Session/International Olympiad in Cryptography NSUCRYPTO.en.transcribed.srt |
3 KB |
TheIACR/Crypto 2019 Rump Session/International Olympiad in Cryptography NSUCRYPTO.mp4 |
9.4 MB |
TheIACR/Crypto 2019 Rump Session/Key Words.en.transcribed.srt |
8 KB |
TheIACR/Crypto 2019 Rump Session/Key Words.mp4 |
22.8 MB |
TheIACR/Crypto 2019 Rump Session/Microsoft's ElectionGuard.en.transcribed.srt |
9 KB |
TheIACR/Crypto 2019 Rump Session/Microsoft's ElectionGuard.mp4 |
21 MB |
TheIACR/Crypto 2019 Rump Session/NIST Update.en.transcribed.srt |
10 KB |
TheIACR/Crypto 2019 Rump Session/NIST Update.mp4 |
22 MB |
TheIACR/Crypto 2019 Rump Session/New Conference on Information Theoretic Cryptography (ITC).en.transcribed.srt |
4 KB |
TheIACR/Crypto 2019 Rump Session/New Conference on Information Theoretic Cryptography (ITC).mp4 |
9 MB |
TheIACR/Crypto 2019 Rump Session/OPA!!!.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/OPA!!!.mp4 |
18.2 MB |
TheIACR/Crypto 2019 Rump Session/On parameter choices of Round5.en.transcribed.srt |
3 KB |
TheIACR/Crypto 2019 Rump Session/On parameter choices of Round5.mp4 |
10.6 MB |
TheIACR/Crypto 2019 Rump Session/On the Round Complexity of Randomized Byzantine Agreement.en.transcribed.srt |
4 KB |
TheIACR/Crypto 2019 Rump Session/On the Round Complexity of Randomized Byzantine Agreement.mp4 |
11.9 MB |
TheIACR/Crypto 2019 Rump Session/Opening and Borg Early Career Award (BECA) for Nadia Heninger.en.transcribed.srt |
9 KB |
TheIACR/Crypto 2019 Rump Session/Opening and Borg Early Career Award (BECA) for Nadia Heninger.mp4 |
10.7 MB |
TheIACR/Crypto 2019 Rump Session/PQC Wiki.en.transcribed.srt |
5 KB |
TheIACR/Crypto 2019 Rump Session/PQC Wiki.mp4 |
9 MB |
TheIACR/Crypto 2019 Rump Session/RSA Encraption.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/RSA Encraption.mp4 |
16.2 MB |
TheIACR/Crypto 2019 Rump Session/STARK friendly hash challenge.en.transcribed.srt |
695 B |
TheIACR/Crypto 2019 Rump Session/STARK friendly hash challenge.mp4 |
1.2 MB |
TheIACR/Crypto 2019 Rump Session/Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.mp4 |
12.3 MB |
TheIACR/Crypto 2019 Rump Session/The Chia Proof of Space construction and implementation competition.en.transcribed.srt |
1 KB |
TheIACR/Crypto 2019 Rump Session/The Chia Proof of Space construction and implementation competition.mp4 |
1.6 MB |
TheIACR/Crypto 2019 Rump Session/The Grand Unified Theory of Cryptology.en.transcribed.srt |
3 KB |
TheIACR/Crypto 2019 Rump Session/The Grand Unified Theory of Cryptology.mp4 |
8.2 MB |
TheIACR/Crypto 2019 Rump Session/Trivial Real World Crypto.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/Trivial Real World Crypto.mp4 |
14.4 MB |
TheIACR/Crypto 2019 Rump Session/Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.en.transcribed.srt |
11 KB |
TheIACR/Crypto 2019 Rump Session/Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.mp4 |
21.5 MB |
TheIACR/Crypto 2019 Rump Session/You are strong, FALCON, but we will break you!.en.transcribed.srt |
6 KB |
TheIACR/Crypto 2019 Rump Session/You are strong, FALCON, but we will break you!.mp4 |
18 MB |
TheIACR/Crypto 2019 Rump Session/decodingchallenge org.en.transcribed.srt |
3 KB |
TheIACR/Crypto 2019 Rump Session/decodingchallenge org.mp4 |
8.9 MB |
TheIACR/Crypto 2019/ABE for DFA from k-Lin.en.transcribed.srt |
26 KB |
TheIACR/Crypto 2019/ABE for DFA from k-Lin.mp4 |
65.2 MB |
TheIACR/Crypto 2019/Adaptively Secure MPC with Sublinear Communication Complexity.en.transcribed.srt |
45 KB |
TheIACR/Crypto 2019/Adaptively Secure MPC with Sublinear Communication Complexity.mp4 |
98.9 MB |
TheIACR/Crypto 2019/Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.en.transcribed.srt |
38 KB |
TheIACR/Crypto 2019/Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.mp4 |
96.5 MB |
TheIACR/Crypto 2019/Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.mp4 |
91.5 MB |
TheIACR/Crypto 2019/BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.mp4 |
92.7 MB |
TheIACR/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.mp4 |
93.4 MB |
TheIACR/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.en.transcribed.srt |
40 KB |
TheIACR/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.mp4 |
87.4 MB |
TheIACR/Crypto 2019/Broadcast and Trace with $$N^{ varepsilon }$$ Ciphertext Size from Standard Assumptions.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/Broadcast and Trace with $$N^{ varepsilon }$$ Ciphertext Size from Standard Assumptions.mp4 |
92.8 MB |
TheIACR/Crypto 2019/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.mp4 |
93 MB |
TheIACR/Crypto 2019/Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.mp4 |
93.8 MB |
TheIACR/Crypto 2019/Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.en.transcribed.srt |
28 KB |
TheIACR/Crypto 2019/Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.mp4 |
78.8 MB |
TheIACR/Crypto 2019/Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.mp4 |
93.3 MB |
TheIACR/Crypto 2019/Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO....en.transcribed.srt |
28 KB |
TheIACR/Crypto 2019/Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO....mp4 |
90.5 MB |
TheIACR/Crypto 2019/Cryptographic Sensing.mp4 |
99.9 MB |
TheIACR/Crypto 2019/Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.en.transcribed.srt |
42 KB |
TheIACR/Crypto 2019/Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.mp4 |
105.2 MB |
TheIACR/Crypto 2019/Efficient Collision Attack Frameworks for RIPEMD-160.en.transcribed.srt |
22 KB |
TheIACR/Crypto 2019/Efficient Collision Attack Frameworks for RIPEMD-160.mp4 |
70.8 MB |
TheIACR/Crypto 2019/Efficient Pseudorandom Correlation Generators Silent OT Extension and More.en.transcribed.srt |
42 KB |
TheIACR/Crypto 2019/Efficient Pseudorandom Correlation Generators Silent OT Extension and More.mp4 |
103 MB |
TheIACR/Crypto 2019/Explicit Rate-1 Non-malleable Codes for Local Tampering.en.transcribed.srt |
30 KB |
TheIACR/Crypto 2019/Explicit Rate-1 Non-malleable Codes for Local Tampering.mp4 |
54.4 MB |
TheIACR/Crypto 2019/Exploring Constructions of Compact NIZKs from Various Assumptions.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Exploring Constructions of Compact NIZKs from Various Assumptions.mp4 |
82.9 MB |
TheIACR/Crypto 2019/Highly Efficient Key Exchange Protocols with Optimal Tightness.en.transcribed.srt |
35 KB |
TheIACR/Crypto 2019/Highly Efficient Key Exchange Protocols with Optimal Tightness.mp4 |
94.1 MB |
TheIACR/Crypto 2019/Homomorphic Time-Lock Puzzles and Applications.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Homomorphic Time-Lock Puzzles and Applications.mp4 |
97.5 MB |
TheIACR/Crypto 2019/How to Build Pseudorandom Functions from Public Random Permutations.en.transcribed.srt |
26 KB |
TheIACR/Crypto 2019/How to Build Pseudorandom Functions from Public Random Permutations.mp4 |
65.9 MB |
TheIACR/Crypto 2019/How to Record Quantum Queries, and Applications to Quantum Indifferentiability.en.transcribed.srt |
34 KB |
TheIACR/Crypto 2019/How to Record Quantum Queries, and Applications to Quantum Indifferentiability.mp4 |
74.8 MB |
TheIACR/Crypto 2019/Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.en.transcribed.srt |
38 KB |
TheIACR/Crypto 2019/Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.mp4 |
91 MB |
TheIACR/Crypto 2019/Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps....en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps....mp4 |
100.6 MB |
TheIACR/Crypto 2019/Invited talk Contextual Integrity.en.transcribed.srt |
96 KB |
TheIACR/Crypto 2019/Invited talk Contextual Integrity.mp4 |
94 MB |
TheIACR/Crypto 2019/Invited talk Secure computation When theory meets....en.transcribed.srt |
113 KB |
TheIACR/Crypto 2019/Invited talk Secure computation When theory meets....mp4 |
239.7 MB |
TheIACR/Crypto 2019/It Wasn't Me!.en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/It Wasn't Me!.mp4 |
101.7 MB |
TheIACR/Crypto 2019/Joint Presentation on Lattices at Crypto 2019.en.transcribed.srt |
39 KB |
TheIACR/Crypto 2019/Joint Presentation on Lattices at Crypto 2019.mp4 |
110.5 MB |
TheIACR/Crypto 2019/Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap....en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap....mp4 |
98.1 MB |
TheIACR/Crypto 2019/Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.mp4 |
30.5 MB |
TheIACR/Crypto 2019/Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.mp4 |
99 MB |
TheIACR/Crypto 2019/Match Me if You Can Matchmaking Encryption and Its Applications.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Match Me if You Can Matchmaking Encryption and Its Applications.mp4 |
73 MB |
TheIACR/Crypto 2019/Memory-Hard Functions from Cryptographic Primitives.en.transcribed.srt |
45 KB |
TheIACR/Crypto 2019/Memory-Hard Functions from Cryptographic Primitives.mp4 |
36.7 MB |
TheIACR/Crypto 2019/New Constructions of Reusable Designated-Verifier NIZKs.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/New Constructions of Reusable Designated-Verifier NIZKs.mp4 |
97.2 MB |
TheIACR/Crypto 2019/New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.en.transcribed.srt |
20 KB |
TheIACR/Crypto 2019/New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.mp4 |
81.3 MB |
TheIACR/Crypto 2019/Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.mp4 |
81.7 MB |
TheIACR/Crypto 2019/Non-interactive Non-malleability from Quantum Supremacy.en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Non-interactive Non-malleability from Quantum Supremacy.mp4 |
93.2 MB |
TheIACR/Crypto 2019/Non-malleable Codes for Decision Trees.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/Non-malleable Codes for Decision Trees.mp4 |
82.9 MB |
TheIACR/Crypto 2019/Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re....en.transcribed.srt |
35 KB |
TheIACR/Crypto 2019/Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re....mp4 |
84.8 MB |
TheIACR/Crypto 2019/Nonces Are Noticed AEAD Revisited.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Nonces Are Noticed AEAD Revisited.mp4 |
86.3 MB |
TheIACR/Crypto 2019/Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.mp4 |
94.1 MB |
TheIACR/Crypto 2019/On Round Optimal Statistical Zero Knowledge Arguments.en.transcribed.srt |
34 KB |
TheIACR/Crypto 2019/On Round Optimal Statistical Zero Knowledge Arguments.mp4 |
66.9 MB |
TheIACR/Crypto 2019/On the Plausibility of Fully Homomorphic Encryption for RAMs.en.transcribed.srt |
35 KB |
TheIACR/Crypto 2019/On the Plausibility of Fully Homomorphic Encryption for RAMs.mp4 |
95.2 MB |
TheIACR/Crypto 2019/On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.mp4 |
79.3 MB |
TheIACR/Crypto 2019/Proofs of Replicated Storage Without Timing Assumptions.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/Proofs of Replicated Storage Without Timing Assumptions.mp4 |
58.2 MB |
TheIACR/Crypto 2019/Public-Key Cryptography in the Fine-Grained Setting.en.transcribed.srt |
39 KB |
TheIACR/Crypto 2019/Public-Key Cryptography in the Fine-Grained Setting.mp4 |
94.2 MB |
TheIACR/Crypto 2019/Quantum Indistinguishability of Random Sponges.en.transcribed.srt |
29 KB |
TheIACR/Crypto 2019/Quantum Indistinguishability of Random Sponges.mp4 |
73.3 MB |
TheIACR/Crypto 2019/Quantum Security Proofs Using Semi-classical Oracles.en.transcribed.srt |
48 KB |
TheIACR/Crypto 2019/Quantum Security Proofs Using Semi-classical Oracles.mp4 |
106.9 MB |
TheIACR/Crypto 2019/Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En....en.transcribed.srt |
42 KB |
TheIACR/Crypto 2019/Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En....mp4 |
66.7 MB |
TheIACR/Crypto 2019/Reusable Non-Interactive Secure Computation.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Reusable Non-Interactive Secure Computation.mp4 |
90.3 MB |
TheIACR/Crypto 2019/Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.en.transcribed.srt |
37 KB |
TheIACR/Crypto 2019/Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.mp4 |
86.2 MB |
TheIACR/Crypto 2019/Seedless Fruit Is the Sweetest Random Number Generation, Revisited.en.transcribed.srt |
39 KB |
TheIACR/Crypto 2019/Seedless Fruit Is the Sweetest Random Number Generation, Revisited.mp4 |
79.6 MB |
TheIACR/Crypto 2019/Shared presentation at Crypto 2019.en.transcribed.srt |
55 KB |
TheIACR/Crypto 2019/Shared presentation at Crypto 2019.mp4 |
122.7 MB |
TheIACR/Crypto 2019/Shared presentation on Fiat-Shamir security at Crypto 2019.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/Shared presentation on Fiat-Shamir security at Crypto 2019.mp4 |
118.3 MB |
TheIACR/Crypto 2019/Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..en.transcribed.srt |
51 KB |
TheIACR/Crypto 2019/Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..mp4 |
112.1 MB |
TheIACR/Crypto 2019/Shared presentation on Zero Knowledge at Crypto 2019.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/Shared presentation on Zero Knowledge at Crypto 2019.mp4 |
109.8 MB |
TheIACR/Crypto 2019/Simple Proofs of Space-Time and Rational Proofs of Storage.en.transcribed.srt |
32 KB |
TheIACR/Crypto 2019/Simple Proofs of Space-Time and Rational Proofs of Storage.mp4 |
75.1 MB |
TheIACR/Crypto 2019/Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.mp4 |
89.2 MB |
TheIACR/Crypto 2019/SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.en.transcribed.srt |
24 KB |
TheIACR/Crypto 2019/SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.mp4 |
45.3 MB |
TheIACR/Crypto 2019/Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin....en.transcribed.srt |
25 KB |
TheIACR/Crypto 2019/Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin....mp4 |
63.6 MB |
TheIACR/Crypto 2019/Strong Asymmetric PAKE Based on Trapdoor CKEM.en.transcribed.srt |
38 KB |
TheIACR/Crypto 2019/Strong Asymmetric PAKE Based on Trapdoor CKEM.mp4 |
75.3 MB |
TheIACR/Crypto 2019/Symmetric Primitives with Structured Secrets.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Symmetric Primitives with Structured Secrets.mp4 |
71.4 MB |
TheIACR/Crypto 2019/Synchronous, with a Chance of Partition Tolerance.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Synchronous, with a Chance of Partition Tolerance.mp4 |
67.9 MB |
TheIACR/Crypto 2019/The Communication Complexity of Threshold Private Set Intersection.en.transcribed.srt |
40 KB |
TheIACR/Crypto 2019/The Communication Complexity of Threshold Private Set Intersection.mp4 |
36.9 MB |
TheIACR/Crypto 2019/The Distinction Between Fixed and Random Generators in Group-Based Assumptions.en.transcribed.srt |
46 KB |
TheIACR/Crypto 2019/The Distinction Between Fixed and Random Generators in Group-Based Assumptions.mp4 |
94.8 MB |
TheIACR/Crypto 2019/The Privacy Blanket of the Shuffle Model.en.transcribed.srt |
36 KB |
TheIACR/Crypto 2019/The Privacy Blanket of the Shuffle Model.mp4 |
87 MB |
TheIACR/Crypto 2019/Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.mp4 |
96.8 MB |
TheIACR/Crypto 2019/Trapdoor Hash Functions and Their Applications.en.transcribed.srt |
40 KB |
TheIACR/Crypto 2019/Trapdoor Hash Functions and Their Applications.mp4 |
92.6 MB |
TheIACR/Crypto 2019/Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.en.transcribed.srt |
38 KB |
TheIACR/Crypto 2019/Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.mp4 |
92 MB |
TheIACR/Crypto 2019/Unconditionally Secure Computation Against Low-Complexity Leakage.en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Unconditionally Secure Computation Against Low-Complexity Leakage.mp4 |
94.5 MB |
TheIACR/Crypto 2019/Unifying Computational Entropies via Kullback-Leibler Divergence.en.transcribed.srt |
42 KB |
TheIACR/Crypto 2019/Unifying Computational Entropies via Kullback-Leibler Divergence.mp4 |
85.9 MB |
TheIACR/Crypto 2019/Unifying Leakage Models on a Renyi Day.mp4 |
74.3 MB |
TheIACR/Crypto 2019/Universally Composable Secure Computation with Corrupted Tokens.en.transcribed.srt |
33 KB |
TheIACR/Crypto 2019/Universally Composable Secure Computation with Corrupted Tokens.mp4 |
106.5 MB |
TheIACR/Crypto 2019/Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.en.transcribed.srt |
46 KB |
TheIACR/Crypto 2019/Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.mp4 |
97.5 MB |
TheIACR/Crypto 2019/Watermarking Public-Key Cryptographic Primitives.en.transcribed.srt |
41 KB |
TheIACR/Crypto 2019/Watermarking Public-Key Cryptographic Primitives.mp4 |
72.4 MB |
TheIACR/Crypto 2019/Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.en.transcribed.srt |
44 KB |
TheIACR/Crypto 2019/Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.mp4 |
84.5 MB |
TheIACR/Eurocrypt 2012/A Tutorial on High Performance Computing Applied to Cryp ....mp4 |
36.1 MB |
TheIACR/Eurocrypt 2012/Adaptively Attribute-Hiding (Hierarchical) Inner Product ....mp4 |
14 MB |
TheIACR/Eurocrypt 2012/All-But-Many Lossy Trapdoor Functions..mp4 |
20.2 MB |
TheIACR/Eurocrypt 2012/Another Look at Provable Security..mp4 |
71.7 MB |
TheIACR/Eurocrypt 2012/Concurrently Secure Computation in Constant Rounds..mp4 |
12.4 MB |
TheIACR/Eurocrypt 2012/Cover and Decomposition Index Calculus on Elliptic Curve ....mp4 |
32.8 MB |
TheIACR/Eurocrypt 2012/Cryptanalyses on a Merkle-Damgå_rd Based MAC - Almo ....mp4 |
13.7 MB |
TheIACR/Eurocrypt 2012/Decoding Random Binary Linear Codes in 2 n 20 How 1 + 1 ....mp4 |
26.6 MB |
TheIACR/Eurocrypt 2012/Detecting Dangerous Queries A New Approach for Chosen C ....mp4 |
12.2 MB |
TheIACR/Eurocrypt 2012/Efficient Zero-Knowledge Argument for Correctness of a S ....mp4 |
12.3 MB |
TheIACR/Eurocrypt 2012/Efficient and Optimally Secure Key-Length Extension for ....mp4 |
25.9 MB |
TheIACR/Eurocrypt 2012/Fair Computation with Rational Players..mp4 |
20.3 MB |
TheIACR/Eurocrypt 2012/Faster Algorithms for Approximate Common Divisors Break ....mp4 |
14.8 MB |
TheIACR/Eurocrypt 2012/Fully Homomorphic Encryption with Polylog Overhead..mp4 |
21.8 MB |
TheIACR/Eurocrypt 2012/Identity-Based (Lossy) Trapdoor Functions and Applications..mp4 |
35.7 MB |
TheIACR/Eurocrypt 2012/Identity-Based Encryption Resilient to Continual Auxilia ....mp4 |
12.8 MB |
TheIACR/Eurocrypt 2012/Incremental Deterministic Public-Key Encryption..mp4 |
13.8 MB |
TheIACR/Eurocrypt 2012/Key-Alternating Ciphers in a Provable Setting Encryptio ....mp4 |
12.8 MB |
TheIACR/Eurocrypt 2012/Lattice Signatures without Trapdoors..mp4 |
12.3 MB |
TheIACR/Eurocrypt 2012/Message Authentication, Revisited..mp4 |
12.4 MB |
TheIACR/Eurocrypt 2012/Multiparty Computation with Low Communication, Computati ....mp4 |
33.9 MB |
TheIACR/Eurocrypt 2012/Narrow-Bicliques Cryptanalysis of Full IDEA..mp4 |
24.4 MB |
TheIACR/Eurocrypt 2012/On the Exact Security of Schnorr-Type Signatures in the ....mp4 |
31.9 MB |
TheIACR/Eurocrypt 2012/Optimal Security Proofs for Full Domain Hash, Revisited..mp4 |
12.2 MB |
TheIACR/Eurocrypt 2012/Property Preserving Symmetric Encryption..mp4 |
14.7 MB |
TheIACR/Eurocrypt 2012/Pseudorandom Functions and Lattices..mp4 |
15.8 MB |
TheIACR/Eurocrypt 2012/Public Key Compression and Modulus Switching for Fully H ....mp4 |
16.5 MB |
TheIACR/Eurocrypt 2012/Quantum Proofs of Knowledge..mp4 |
24.4 MB |
TheIACR/Eurocrypt 2012/Robust Coin Flipping..mp4 |
11.9 MB |
TheIACR/Eurocrypt 2012/Security of Symmetric Encryption in the Presence of Ciph ....mp4 |
10 MB |
TheIACR/Eurocrypt 2012/Standard Security Does Not Imply Security against Select ....mp4 |
11.2 MB |
TheIACR/Eurocrypt 2012/Statistical Tools Flavor Side-Channel Collision Attacks..mp4 |
13.4 MB |
TheIACR/Eurocrypt 2012/Tightly-Secure Signatures from Lossy Identification Schemes..mp4 |
14.9 MB |
TheIACR/Eurocrypt 2012/Trapdoors for Lattices Simpler, Tighter, Faster, Smaller..mp4 |
14.5 MB |
TheIACR/Eurocrypt 2012/Unconditionally-Secure Robust Secret Sharing with Compac ....mp4 |
57 MB |
TheIACR/Eurocrypt 2016/Adaptively Secure Identity-Based Encryption from Lattices with ....mp4 |
19.4 MB |
TheIACR/Eurocrypt 2016/All Complete Functionalities are Reversible.mp4 |
17.1 MB |
TheIACR/Eurocrypt 2016/Anonymous Traitor Tracing How to Embed Arbitrary Information in a Key.mp4 |
14.2 MB |
TheIACR/Eurocrypt 2016/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.mp4 |
17 MB |
TheIACR/Eurocrypt 2016/CFRG Meeting.mp4 |
69.5 MB |
TheIACR/Eurocrypt 2016/Circuit Compilers with O(1 log (n)) Leakage Rate.mp4 |
14.6 MB |
TheIACR/Eurocrypt 2016/Computationally Binding Quantum Commitments.mp4 |
18.7 MB |
TheIACR/Eurocrypt 2016/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.mp4 |
16.2 MB |
TheIACR/Eurocrypt 2016/Constrained Pseudorandom Functions for Unconstrained Inputs.mp4 |
11 MB |
TheIACR/Eurocrypt 2016/Engineering Code Obfuscation - YouTube.mp4 |
40.4 MB |
TheIACR/Eurocrypt 2016/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.mp4 |
14.8 MB |
TheIACR/Eurocrypt 2016/Eurocrypt 2016 Rump Session.mp4 |
99.3 MB |
TheIACR/Eurocrypt 2016/Fair and Robust MPC using a Global Transaction Ledger.mp4 |
15.8 MB |
TheIACR/Eurocrypt 2016/Faster Algorithms for Solving LPN.mp4 |
18.3 MB |
TheIACR/Eurocrypt 2016/Freestart Collision for Full SHA-1.mp4 |
13.4 MB |
TheIACR/Eurocrypt 2016/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.mp4 |
15.3 MB |
TheIACR/Eurocrypt 2016/IACR Business meeting, Eurocrypt 2016.mp4 |
27.4 MB |
TheIACR/Eurocrypt 2016/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.mp4 |
15.3 MB |
TheIACR/Eurocrypt 2016/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.mp4 |
14.3 MB |
TheIACR/Eurocrypt 2016/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.mp4 |
13.6 MB |
TheIACR/Eurocrypt 2016/Indifferentiability of Confusion-Diffusion Networks.mp4 |
15.1 MB |
TheIACR/Eurocrypt 2016/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.mp4 |
16 MB |
TheIACR/Eurocrypt 2016/Multi-input Functional Encryption in the Private-Key Setting ....mp4 |
14.4 MB |
TheIACR/Eurocrypt 2016/New Attacks on the Concatenation and XOR Hash Combiners.mp4 |
13.8 MB |
TheIACR/Eurocrypt 2016/New negative results on differing-inputs obfuscation.mp4 |
10.4 MB |
TheIACR/Eurocrypt 2016/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.mp4 |
14.8 MB |
TheIACR/Eurocrypt 2016/On the Impossibility of Tight Cryptographic Reductions.mp4 |
14.7 MB |
TheIACR/Eurocrypt 2016/On the Power of Hierarchical Identity-Based Encryption.mp4 |
14.8 MB |
TheIACR/Eurocrypt 2016/On the Size of Pairing-Based Non-interactive Arguments.mp4 |
18.9 MB |
TheIACR/Eurocrypt 2016/Online Offline OR Composition of Sigma Protocols.mp4 |
15.8 MB |
TheIACR/Eurocrypt 2016/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.mp4 |
42.8 MB |
TheIACR/Eurocrypt 2016/Provably Robust Sponge-Based PRNGs and KDFs.mp4 |
16.3 MB |
TheIACR/Eurocrypt 2016/Provably Weak Instances of Ring-LWE Revisited.mp4 |
14.6 MB |
TheIACR/Eurocrypt 2016/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.mp4 |
15.5 MB |
TheIACR/Eurocrypt 2016/Randomness Complexity of Private Circuits for Multiplication.mp4 |
11.4 MB |
TheIACR/Eurocrypt 2016/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.mp4 |
16.4 MB |
TheIACR/Eurocrypt 2016/Sanitization of FHE Ciphertexts.mp4 |
13.3 MB |
TheIACR/Eurocrypt 2016/Secure Computation from Elastic Noisy Channels.mp4 |
29.7 MB |
TheIACR/Eurocrypt 2016/Securing Cryptography Implementations in Embedded Systems, part I.mp4 |
34.8 MB |
TheIACR/Eurocrypt 2016/Security Cryptography Implementations in Embedded Systems, Part 2..mp4 |
36.2 MB |
TheIACR/Eurocrypt 2016/Structural Lattice Reduction Generalized Worst-Case to Average-case Reductions and ....mp4 |
12.2 MB |
TheIACR/Eurocrypt 2016/The Exact Round Complexity of Secure Computation.mp4 |
14.2 MB |
TheIACR/Eurocrypt 2016/The future of cryptography - YouTube.mp4 |
42.5 MB |
TheIACR/Eurocrypt 2016/Tightly CCA-Secure Encryption Without Pairings.mp4 |
14.6 MB |
TheIACR/Eurocrypt 2016/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.mp4 |
17.7 MB |
TheIACR/Eurocrypt 2016/Two Round Multiparty Computation via Multi-key FHE.mp4 |
14.9 MB |
TheIACR/Eurocrypt 2016/Unconditionally Secure Computation with Reduced Interaction.mp4 |
13.2 MB |
TheIACR/Eurocrypt 2016/Zero-Knowledge Arguments for Lattice-Based Accumulators.mp4 |
15 MB |
TheIACR/Eurocrypt 2017/0 RTT Key Exchange with Full Forward Secrecy.mp4 |
109.8 MB |
TheIACR/Eurocrypt 2017/0 RTT Key Exchange with Full Forward Secrecy.srt |
48 KB |
TheIACR/Eurocrypt 2017/A New Structural Differential Property of 5 Round AES.mp4 |
12.5 MB |
TheIACR/Eurocrypt 2017/A New Structural Differential Property of 5 Round AES.srt |
47 KB |
TheIACR/Eurocrypt 2017/A Note on Perfect Correctness by Derandomization.mp4 |
137.6 MB |
TheIACR/Eurocrypt 2017/A Note on Perfect Correctness by Derandomization.srt |
50 KB |
TheIACR/Eurocrypt 2017/A kilobit hidden SNFS discrete logarithm computation.mp4 |
19.8 MB |
TheIACR/Eurocrypt 2017/A kilobit hidden SNFS discrete logarithm computation.srt |
59 KB |
TheIACR/Eurocrypt 2017/Ad Hoc PSM Protocols Secure Computation without Coordination.mp4 |
99.4 MB |
TheIACR/Eurocrypt 2017/Adaptive partitioning.mp4 |
178.3 MB |
TheIACR/Eurocrypt 2017/Adaptive partitioning.srt |
75 KB |
TheIACR/Eurocrypt 2017/Amortized Complexity of Zero-Knowledge Proofs Revisited Achieving Linear Soundness Slack.mp4 |
17 MB |
TheIACR/Eurocrypt 2017/Amortized Complexity of Zero-Knowledge Proofs Revisited Achieving Linear Soundness Slack.srt |
56 KB |
TheIACR/Eurocrypt 2017/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.mp4 |
20.2 MB |
TheIACR/Eurocrypt 2017/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.srt |
65 KB |
TheIACR/Eurocrypt 2017/Breaking the Sub Exponential Barrier in Obfustopia.mp4 |
159.7 MB |
TheIACR/Eurocrypt 2017/Breaking the Sub Exponential Barrier in Obfustopia.srt |
58 KB |
TheIACR/Eurocrypt 2017/Computational integrity with a public random string from quasi linear PCPs.mp4 |
134.5 MB |
TheIACR/Eurocrypt 2017/Computational integrity with a public random string from quasi linear PCPs.srt |
42 KB |
TheIACR/Eurocrypt 2017/Computing generator in cyclotomic integer rings.mp4 |
19.9 MB |
TheIACR/Eurocrypt 2017/Computing generator in cyclotomic integer rings.srt |
42 KB |
TheIACR/Eurocrypt 2017/Concurrently composable security with shielded super polynomial simulators.mp4 |
16.3 MB |
TheIACR/Eurocrypt 2017/Concurrently composable security with shielded super polynomial simulators.srt |
44 KB |
TheIACR/Eurocrypt 2017/Conditional Cube Attack on Reduced Round Keccak Sponge Function.mp4 |
23.2 MB |
TheIACR/Eurocrypt 2017/Conditional Cube Attack on Reduced Round Keccak Sponge Function.srt |
43 KB |
TheIACR/Eurocrypt 2017/Constraint hiding constrained PRFs for NC1 from LWE.mp4 |
20.6 MB |
TheIACR/Eurocrypt 2017/Constraint hiding constrained PRFs for NC1 from LWE.srt |
57 KB |
TheIACR/Eurocrypt 2017/Cryptanalyses of Candidate Branching Program Obfuscators.mp4 |
73.8 MB |
TheIACR/Eurocrypt 2017/Cryptanalyses of Candidate Branching Program Obfuscators.srt |
55 KB |
TheIACR/Eurocrypt 2017/Cryptography with Updates.mp4 |
158.8 MB |
TheIACR/Eurocrypt 2017/Cryptography with Updates.srt |
65 KB |
TheIACR/Eurocrypt 2017/Decentralized Anonymous Micropayments.mp4 |
18.3 MB |
TheIACR/Eurocrypt 2017/Decentralized Anonymous Micropayments.srt |
51 KB |
TheIACR/Eurocrypt 2017/Depth Robust Graphs and Their Cumulative Memory Complexity.mp4 |
155.2 MB |
TheIACR/Eurocrypt 2017/Depth Robust Graphs and Their Cumulative Memory Complexity.srt |
63 KB |
TheIACR/Eurocrypt 2017/Faster Secure Two Party Computation in the Single Execution Setting - YouTube.mp4 |
140.9 MB |
TheIACR/Eurocrypt 2017/Faster Secure Two Party Computation in the Single Execution Setting - YouTube.srt |
59 KB |
TheIACR/Eurocrypt 2017/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.mp4 |
169.8 MB |
TheIACR/Eurocrypt 2017/Formal Abstractions for Attested Execution Secure Processors.mp4 |
41.3 MB |
TheIACR/Eurocrypt 2017/Formal Abstractions for Attested Execution Secure Processors.srt |
65 KB |
TheIACR/Eurocrypt 2017/From Minicrypt to Obfustopia via Private Key Functional Encryption.mp4 |
19 MB |
TheIACR/Eurocrypt 2017/From Minicrypt to Obfustopia via Private Key Functional Encryption.srt |
48 KB |
TheIACR/Eurocrypt 2017/Functional Encryption Deterministic to Randomized Functions from Simple Assumptions.mp4 |
33.4 MB |
TheIACR/Eurocrypt 2017/Functional Encryption Deterministic to Randomized Functions from Simple Assumptions.srt |
72 KB |
TheIACR/Eurocrypt 2017/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.mp4 |
153.5 MB |
TheIACR/Eurocrypt 2017/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.srt |
75 KB |
TheIACR/Eurocrypt 2017/Hashing Garbled Circuits for Free.mp4 |
62.6 MB |
TheIACR/Eurocrypt 2017/Hashing Garbled Circuits for Free.srt |
50 KB |
TheIACR/Eurocrypt 2017/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.mp4 |
97.5 MB |
TheIACR/Eurocrypt 2017/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.srt |
43 KB |
TheIACR/Eurocrypt 2017/How Fast Can Higher Order Masking Be in Software.mp4 |
22.5 MB |
TheIACR/Eurocrypt 2017/Improved Private Set Intersection against Malicious Adversaries.mp4 |
37.2 MB |
TheIACR/Eurocrypt 2017/Improved Private Set Intersection against Malicious Adversaries.srt |
59 KB |
TheIACR/Eurocrypt 2017/Invited talk Advances in computer aided cryptography.mp4 |
63.3 MB |
TheIACR/Eurocrypt 2017/Invited talk Advances in computer aided cryptography.srt |
153 KB |
TheIACR/Eurocrypt 2017/Invited talk Living Between the Ideal and Real Worlds.mp4 |
48.3 MB |
TheIACR/Eurocrypt 2017/Invited talk Living Between the Ideal and Real Worlds.srt |
181 KB |
TheIACR/Eurocrypt 2017/Lattice Based SNARGs and Their Application to More Efficient Obfuscation.srt |
77 KB |
TheIACR/Eurocrypt 2017/Modifying an Enciphering Scheme after Deployment.mp4 |
13.2 MB |
TheIACR/Eurocrypt 2017/Modifying an Enciphering Scheme after Deployment.srt |
38 KB |
TheIACR/Eurocrypt 2017/Multi Input Inner Product Functional Encryption from Pairings.mp4 |
14.4 MB |
TheIACR/Eurocrypt 2017/Multi Input Inner Product Functional Encryption from Pairings.srt |
44 KB |
TheIACR/Eurocrypt 2017/New Collision Attacks on Round Reduced Keccak.mp4 |
13.7 MB |
TheIACR/Eurocrypt 2017/New Collision Attacks on Round Reduced Keccak.srt |
35 KB |
TheIACR/Eurocrypt 2017/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.mp4 |
22.3 MB |
TheIACR/Eurocrypt 2017/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.srt |
50 KB |
TheIACR/Eurocrypt 2017/Non Interactive Secure 2PC in the Offline Online and Batch Settings.mp4 |
190.2 MB |
TheIACR/Eurocrypt 2017/Non Interactive Secure 2PC in the Offline Online and Batch Settings.srt |
79 KB |
TheIACR/Eurocrypt 2017/On Removing Graded Encodings from Functional Encryption.mp4 |
18.7 MB |
TheIACR/Eurocrypt 2017/On Removing Graded Encodings from Functional Encryption.srt |
46 KB |
TheIACR/Eurocrypt 2017/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.mp4 |
18.1 MB |
TheIACR/Eurocrypt 2017/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.srt |
58 KB |
TheIACR/Eurocrypt 2017/On the Exact Round Complexity of Self Composable Two Party Computation.mp4 |
121.6 MB |
TheIACR/Eurocrypt 2017/On the Exact Round Complexity of Self Composable Two Party Computation.srt |
51 KB |
TheIACR/Eurocrypt 2017/One Shot Verifiable Encryption from Lattices.mp4 |
30.5 MB |
TheIACR/Eurocrypt 2017/One Shot Verifiable Encryption from Lattices.srt |
73 KB |
TheIACR/Eurocrypt 2017/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.mp4 |
21.8 MB |
TheIACR/Eurocrypt 2017/Private Puncturable PRFs From Standard Lattice Assumptions.mp4 |
24.5 MB |
TheIACR/Eurocrypt 2017/Private Puncturable PRFs From Standard Lattice Assumptions.srt |
61 KB |
TheIACR/Eurocrypt 2017/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.mp4 |
20 MB |
TheIACR/Eurocrypt 2017/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.srt |
54 KB |
TheIACR/Eurocrypt 2017/Public Seed Pseudorandom Permutations.mp4 |
20.9 MB |
TheIACR/Eurocrypt 2017/Quantum Authentication and Encryption with Key Recycling.mp4 |
159.7 MB |
TheIACR/Eurocrypt 2017/Quantum Authentication and Encryption with Key Recycling.srt |
59 KB |
TheIACR/Eurocrypt 2017/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.mp4 |
19.9 MB |
TheIACR/Eurocrypt 2017/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.srt |
63 KB |
TheIACR/Eurocrypt 2017/Quantum authentication with key recycling.mp4 |
199 MB |
TheIACR/Eurocrypt 2017/Quantum authentication with key recycling.srt |
74 KB |
TheIACR/Eurocrypt 2017/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.mp4 |
21.1 MB |
TheIACR/Eurocrypt 2017/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.srt |
55 KB |
TheIACR/Eurocrypt 2017/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.mp4 |
156.7 MB |
TheIACR/Eurocrypt 2017/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.srt |
60 KB |
TheIACR/Eurocrypt 2017/Removing the Strong RSA Assumption from Arguments over the Integers.mp4 |
149 MB |
TheIACR/Eurocrypt 2017/Removing the Strong RSA Assumption from Arguments over the Integers.srt |
60 KB |
TheIACR/Eurocrypt 2017/Revisiting Lattice Attacks on overstretched NTRU parameters.mp4 |
23.5 MB |
TheIACR/Eurocrypt 2017/Revisiting Lattice Attacks on overstretched NTRU parameters.srt |
39 KB |
TheIACR/Eurocrypt 2017/Robust transforming combiners from indistinguishability obfuscation to functional encryption.mp4 |
19.6 MB |
TheIACR/Eurocrypt 2017/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.mp4 |
21.8 MB |
TheIACR/Eurocrypt 2017/Short Stickelberger Class Relations and application to Ideal SVP.mp4 |
22.6 MB |
TheIACR/Eurocrypt 2017/Short Stickelberger Class Relations and application to Ideal SVP.srt |
48 KB |
TheIACR/Eurocrypt 2017/Short generators without quantum computers the case of multiquadratics.mp4 |
20.9 MB |
TheIACR/Eurocrypt 2017/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.mp4 |
18.5 MB |
TheIACR/Eurocrypt 2017/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.srt |
50 KB |
TheIACR/Eurocrypt 2017/Small CRT Exponent RSA Revisited.mp4 |
16.6 MB |
TheIACR/Eurocrypt 2017/Small CRT Exponent RSA Revisited.srt |
42 KB |
TheIACR/Eurocrypt 2017/Sublinear Zero Knowledge Arguments for RAM Programs.mp4 |
19.7 MB |
TheIACR/Eurocrypt 2017/The Multi User Security of Double Encryption.mp4 |
20.9 MB |
TheIACR/Eurocrypt 2017/The Multi User Security of Double Encryption.srt |
38 KB |
TheIACR/Eurocrypt 2017/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.mp4 |
135 MB |
TheIACR/Eurocrypt 2017/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.srt |
43 KB |
TheIACR/Eurocrypt 2017/Twisted u4 normal form for elliptic curves.mp4 |
17.6 MB |
TheIACR/Eurocrypt 2017/Twisted u4 normal form for elliptic curves.srt |
37 KB |
TheIACR/Eurocrypt 2017/Unconditional UC Secure Computation with Stronger Malicious PUFs.mp4 |
19 MB |
TheIACR/Eurocrypt 2018 Rump Session/3rd SKINNY Breaking Competition.mp4 |
5.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/A basketful of secret shares.mp4 |
6.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/Announcement Lightsec workshop.mp4 |
1.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/Another Application of Cryptocurrencies.en.transcribed.srt |
14 KB |
TheIACR/Eurocrypt 2018 Rump Session/Another Application of Cryptocurrencies.mp4 |
8.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/Bernstein Bound is Tight.mp4 |
7.2 MB |
TheIACR/Eurocrypt 2018 Rump Session/CSIDH an efficient post-quantum commutative group action.mp4 |
12.3 MB |
TheIACR/Eurocrypt 2018 Rump Session/Conditional Linear Cryptanalysis.mp4 |
5.7 MB |
TheIACR/Eurocrypt 2018 Rump Session/Cryptography with Dispensable Backdoors.mp4 |
8.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/Decoding distortions using frequency analysis.en.transcribed.srt |
11 KB |
TheIACR/Eurocrypt 2018 Rump Session/Decoding distortions using frequency analysis.mp4 |
4.8 MB |
TheIACR/Eurocrypt 2018 Rump Session/ElectroEuro.mp4 |
5.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/How to (not) share a password.mp4 |
7.8 MB |
TheIACR/Eurocrypt 2018 Rump Session/How to synchronize efficiently.mp4 |
5.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/How we avoided a second Dual-EC-DRBG fiasco.en.transcribed.srt |
15 KB |
TheIACR/Eurocrypt 2018 Rump Session/How we avoided a second Dual-EC-DRBG fiasco.mp4 |
7.8 MB |
TheIACR/Eurocrypt 2018 Rump Session/IACR Fellows nomination.mp4 |
5.2 MB |
TheIACR/Eurocrypt 2018 Rump Session/Kittens, Models And Thieves.mp4 |
6.9 MB |
TheIACR/Eurocrypt 2018 Rump Session/Make AES great again!.mp4 |
5 MB |
TheIACR/Eurocrypt 2018 Rump Session/Must the Communication Graph of MPC Protocols be an Expander.mp4 |
4.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/NIST Update.mp4 |
8.3 MB |
TheIACR/Eurocrypt 2018 Rump Session/P2P social networks why and how viable.en.transcribed.srt |
7 KB |
TheIACR/Eurocrypt 2018 Rump Session/P2P social networks why and how viable.mp4 |
4.2 MB |
TheIACR/Eurocrypt 2018 Rump Session/PRG.mp4 |
5.1 MB |
TheIACR/Eurocrypt 2018 Rump Session/QueerCrypt.mp4 |
3.8 MB |
TheIACR/Eurocrypt 2018 Rump Session/Random Oracles in the Real World.mp4 |
8.5 MB |
TheIACR/Eurocrypt 2018 Rump Session/Reverse Kuleshov effect in cryptography.mp4 |
4.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/Small-Box Cryptography, and the Provable Security of SPNs.mp4 |
7.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/State-Separating Proofs A Reduction Methodology for Real-World Protocols.mp4 |
8.1 MB |
TheIACR/Eurocrypt 2018 Rump Session/TCC GOA.mp4 |
3.6 MB |
TheIACR/Eurocrypt 2018 Rump Session/The Best of Both Worlds Byzantine Agreement Protocols for (but not limited to) Chickens.mp4 |
5.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/The ZUC-256 Stream Cipher.mp4 |
4.4 MB |
TheIACR/Eurocrypt 2018 Rump Session/Unknown presentation.mp4 |
2.1 MB |
TheIACR/Eurocrypt 2018 Rump Session/Workshops @ Crypto 2018.mp4 |
5 MB |
TheIACR/Eurocrypt 2018 Rump Session/libpqcrypto.mp4 |
6.4 MB |
TheIACR/Eurocrypt 2018/A New Approach to Black-Box Concurrent Secure Computation.en.transcribed.srt |
40 KB |
TheIACR/Eurocrypt 2018/A New Approach to Black-Box Concurrent Secure Computation.mp4 |
31.3 MB |
TheIACR/Eurocrypt 2018/Adaptively Secure Garbling with Near Optimal Online Complexity.mp4 |
30.2 MB |
TheIACR/Eurocrypt 2018/An Efficiency-Preserving Transformation from....mp4 |
33 MB |
TheIACR/Eurocrypt 2018/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.mp4 |
31.2 MB |
TheIACR/Eurocrypt 2018/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.mp4 |
29.6 MB |
TheIACR/Eurocrypt 2018/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.en.transcribed.srt |
57 KB |
TheIACR/Eurocrypt 2018/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.mp4 |
44.7 MB |
TheIACR/Eurocrypt 2018/Fuzzy Password-Authenticated Key Exchange.en.transcribed.srt |
54 KB |
TheIACR/Eurocrypt 2018/Fuzzy Password-Authenticated Key Exchange.mp4 |
26.7 MB |
TheIACR/Eurocrypt 2018/Limits on Low-Degree Pseudorandom Generators (Or Sum-of-Squares Meets Program Obfuscation).en.transcribed.srt |
54 KB |
TheIACR/Eurocrypt 2018/Limits on Low-Degree Pseudorandom Generators (Or Sum-of-Squares Meets Program Obfuscation).mp4 |
34.6 MB |
TheIACR/Eurocrypt 2018/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.en.transcribed.srt |
79 KB |
TheIACR/Eurocrypt 2018/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.mp4 |
51.5 MB |
TheIACR/Eurocrypt 2018/Masking the GLP Lattice-Based Signature Scheme at Any Order.en.transcribed.srt |
49 KB |
TheIACR/Eurocrypt 2018/Masking the GLP Lattice-Based Signature Scheme at Any Order.mp4 |
39.3 MB |
TheIACR/Eurocrypt 2018/Non-malleable Codes from Average-Case Hardness ....mp4 |
24.7 MB |
TheIACR/Eurocrypt 2018/Non-malleable Randomness Encoders and Their Applications.mp4 |
28.3 MB |
TheIACR/Eurocrypt 2018/OPAQUE An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.mp4 |
25.5 MB |
TheIACR/Eurocrypt 2018/Obfustopia Built on Secret-Key Functional Encryption.en.transcribed.srt |
46 KB |
TheIACR/Eurocrypt 2018/Obfustopia Built on Secret-Key Functional Encryption.mp4 |
25.9 MB |
TheIACR/Eurocrypt 2018/On the Existence of Three Round Zero-Knowledge Proofs.en.transcribed.srt |
47 KB |
TheIACR/Eurocrypt 2018/On the Existence of Three Round Zero-Knowledge Proofs.mp4 |
26.1 MB |
TheIACR/Eurocrypt 2018/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.mp4 |
37.7 MB |
TheIACR/Eurocrypt 2018/Simple Proofs of Sequential Work.mp4 |
42.5 MB |
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.c94bded4-1590-43bf-ae94-37393effd4c1.part |
15.9 MB |
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.en.transcribed.srt |
56 KB |
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.mp4 |
33.3 MB |
TheIACR/Eurocrypt 2018/Supersingular Isogeny Graphs and Endomorphism Rings Reductions and Solutions.mp4 |
32.6 MB |
TheIACR/Eurocrypt 2018/The Discrete-Logarithm Problem with Preprocessing.mp4 |
44.4 MB |
TheIACR/Eurocrypt 2018/Thirty Years of Digital Currency From Digicash to the Blockchain.en.transcribed.srt |
151 KB |
TheIACR/Eurocrypt 2018/Thirty Years of Digital Currency From Digicash to the Blockchain.mp4 |
79.3 MB |
TheIACR/Eurocrypt 2018/Two-Round Multiparty Secure Computation from Minimal Assumptions.mp4 |
32.1 MB |
TheIACR/Eurocrypt 2018/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.mp4 |
40.9 MB |
TheIACR/Eurocrypt 2018/too short MTS.en.transcribed.srt |
616 B |
TheIACR/Eurocrypt 2018/too short MTS.mp4 |
929 KB |
TheIACR/Eurocrypt 2019/A Modular Treatment of Blind Signatures from Identification Schemes.en.transcribed.srt |
37 KB |
TheIACR/Eurocrypt 2019/A Modular Treatment of Blind Signatures from Identification Schemes.mp4 |
16.4 MB |
TheIACR/Eurocrypt 2019/A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M....en.transcribed.srt |
31 KB |
TheIACR/Eurocrypt 2019/A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M....mp4 |
14.2 MB |
TheIACR/Eurocrypt 2019/A Quantum-Proof Non-malleable Extractor.en.transcribed.srt |
31 KB |
TheIACR/Eurocrypt 2019/A Quantum-Proof Non-malleable Extractor.mp4 |
21.3 MB |
TheIACR/Eurocrypt 2019/Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.en.transcribed.srt |
37 KB |
TheIACR/Eurocrypt 2019/Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.mp4 |
15.2 MB |
TheIACR/Eurocrypt 2019/An Algebraic Approach to Maliciously Secure Private Set Intersection.en.transcribed.srt |
38 KB |
TheIACR/Eurocrypt 2019/An Algebraic Approach to Maliciously Secure Private Set Intersection.mp4 |
21.1 MB |
TheIACR/Eurocrypt 2019/An Analysis of NIST SP 800-90A.en.transcribed.srt |
47 KB |
TheIACR/Eurocrypt 2019/An Analysis of NIST SP 800-90A.mp4 |
31 MB |
TheIACR/Eurocrypt 2019/Approx-SVP in Ideal Lattices with Pre-processing.en.transcribed.srt |
42 KB |
TheIACR/Eurocrypt 2019/Approx-SVP in Ideal Lattices with Pre-processing.mp4 |
20.8 MB |
TheIACR/Eurocrypt 2019/Attacks only Get Better How to Break FF3 on Large Domains.en.transcribed.srt |
33 KB |
TheIACR/Eurocrypt 2019/Attacks only Get Better How to Break FF3 on Large Domains.mp4 |
21.7 MB |
TheIACR/Eurocrypt 2019/Beyond Birthday Bound Secure MAC in Faulty Nonce Model.en.transcribed.srt |
26 KB |
TheIACR/Eurocrypt 2019/Beyond Birthday Bound Secure MAC in Faulty Nonce Model.mp4 |
19.2 MB |
TheIACR/Eurocrypt 2019/Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.en.transcribed.srt |
29 KB |
TheIACR/Eurocrypt 2019/Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.mp4 |
19.5 MB |
TheIACR/Eurocrypt 2019/Computationally Volume-Hiding Structured Encryption.en.transcribed.srt |
47 KB |
TheIACR/Eurocrypt 2019/Computationally Volume-Hiding Structured Encryption.mp4 |
23.3 MB |
TheIACR/Eurocrypt 2019/Consensus Through Herding.en.transcribed.srt |
55 KB |
TheIACR/Eurocrypt 2019/Consensus Through Herding.mp4 |
26.1 MB |
TheIACR/Eurocrypt 2019/Continuous Non-Malleable Codes in the 8-Split-State Model.mp4 |
25.9 MB |
TheIACR/Eurocrypt 2019/Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.en.transcribed.srt |
27 KB |
TheIACR/Eurocrypt 2019/Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.mp4 |
26.9 MB |
TheIACR/Eurocrypt 2019/Degree 2 is Complete for the Round-Complexity of Malicious MPC.en.transcribed.srt |
20 KB |
TheIACR/Eurocrypt 2019/Degree 2 is Complete for the Round-Complexity of Malicious MPC.mp4 |
14.8 MB |
TheIACR/Eurocrypt 2019/Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.en.transcribed.srt |
24 KB |
TheIACR/Eurocrypt 2019/Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.mp4 |
13.6 MB |
TheIACR/Eurocrypt 2019/Designated-Verifier Pseudorandom Generators, and Their Applications.en.transcribed.srt |
27 KB |
TheIACR/Eurocrypt 2019/Designated-Verifier Pseudorandom Generators, and Their Applications.mp4 |
12.3 MB |
TheIACR/Eurocrypt 2019/Differential Privacy and the People's Data.en.transcribed.srt |
84 KB |
TheIACR/Eurocrypt 2019/Differential Privacy and the People's Data.mp4 |
113.1 MB |
TheIACR/Eurocrypt 2019/Distributional Collision Resistance Beyond One-Way Functions.mp4 |
25.3 MB |
TheIACR/Eurocrypt 2019/Durandal A Rank Metric Based Signature Scheme.en.transcribed.srt |
26 KB |
TheIACR/Eurocrypt 2019/Durandal A Rank Metric Based Signature Scheme.mp4 |
16 MB |
TheIACR/Eurocrypt 2019/Efficient Circuit-Based PSI with Linear Communication.mp4 |
18.1 MB |
TheIACR/Eurocrypt 2019/Efficient Verifiable Delay Functions.en.transcribed.srt |
46 KB |
TheIACR/Eurocrypt 2019/Efficient Verifiable Delay Functions.mp4 |
22.4 MB |
TheIACR/Eurocrypt 2019/Founding Secure Computation on Blockchains.en.transcribed.srt |
42 KB |
TheIACR/Eurocrypt 2019/Founding Secure Computation on Blockchains.mp4 |
26.6 MB |
TheIACR/Eurocrypt 2019/From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.en.transcribed.srt |
52 KB |
TheIACR/Eurocrypt 2019/From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.mp4 |
23.1 MB |
TheIACR/Eurocrypt 2019/Fully Homomorphic Encryption from the Ground Up.mp4 |
114.7 MB |
TheIACR/Eurocrypt 2019/Homomorphic Secret Sharing from Lattices Without FHE.en.transcribed.srt |
39 KB |
TheIACR/Eurocrypt 2019/Homomorphic Secret Sharing from Lattices Without FHE.mp4 |
22.6 MB |
TheIACR/Eurocrypt 2019/Improved Bootstrapping for Approximate Homomorphic Encryption.en.transcribed.srt |
34 KB |
TheIACR/Eurocrypt 2019/Improved Bootstrapping for Approximate Homomorphic Encryption.mp4 |
20.2 MB |
TheIACR/Eurocrypt 2019/Incremental Proofs of Sequential Work.en.transcribed.srt |
38 KB |
TheIACR/Eurocrypt 2019/Incremental Proofs of Sequential Work.mp4 |
22.9 MB |
TheIACR/Eurocrypt 2019/Locality-Preserving Oblivious RAM.en.transcribed.srt |
35 KB |
TheIACR/Eurocrypt 2019/Locality-Preserving Oblivious RAM.mp4 |
28.3 MB |
TheIACR/Eurocrypt 2019/Lower Bounds for Differentially Private RAMs.en.transcribed.srt |
54 KB |
TheIACR/Eurocrypt 2019/Lower Bounds for Differentially Private RAMs.mp4 |
38.3 MB |
TheIACR/Eurocrypt 2019/Minicrypt Primitives with Algebraic Structure and Applications.mp4 |
16.1 MB |
TheIACR/Eurocrypt 2019/Misuse Attacks on Post-quantum Cryptosystems.en.transcribed.srt |
31 KB |
TheIACR/Eurocrypt 2019/Misuse Attacks on Post-quantum Cryptosystems.mp4 |
20.1 MB |
TheIACR/Eurocrypt 2019/Multi-party Virtual State Channels.mp4 |
21.4 MB |
TheIACR/Eurocrypt 2019/Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.en.transcribed.srt |
39 KB |
TheIACR/Eurocrypt 2019/Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.mp4 |
20.4 MB |
TheIACR/Eurocrypt 2019/New Techniques for Obfuscating Conjunctions.en.transcribed.srt |
56 KB |
TheIACR/Eurocrypt 2019/New Techniques for Obfuscating Conjunctions.mp4 |
27.3 MB |
TheIACR/Eurocrypt 2019/Non-Malleable Codes Against Bounded Polynomial Time Tampering.en.transcribed.srt |
41 KB |
TheIACR/Eurocrypt 2019/Non-Malleable Codes Against Bounded Polynomial Time Tampering.mp4 |
27.6 MB |
TheIACR/Eurocrypt 2019/On ELFs, Deterministic Encryption, and Correlated-Input Security.en.transcribed.srt |
45 KB |
TheIACR/Eurocrypt 2019/On ELFs, Deterministic Encryption, and Correlated-Input Security.mp4 |
29.3 MB |
TheIACR/Eurocrypt 2019/On Quantum Advantage in Information Theoretic Single-Server PIR.en.transcribed.srt |
51 KB |
TheIACR/Eurocrypt 2019/On Quantum Advantage in Information Theoretic Single-Server PIR.mp4 |
21.7 MB |
TheIACR/Eurocrypt 2019/Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.en.transcribed.srt |
27 KB |
TheIACR/Eurocrypt 2019/Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.mp4 |
17.1 MB |
TheIACR/Eurocrypt 2019/Private Anonymous Data Access.en.transcribed.srt |
36 KB |
TheIACR/Eurocrypt 2019/Private Anonymous Data Access.mp4 |
31.2 MB |
TheIACR/Eurocrypt 2019/Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.en.transcribed.srt |
46 KB |
TheIACR/Eurocrypt 2019/Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.mp4 |
23.1 MB |
TheIACR/Eurocrypt 2019/Quantum Lightning Never Strikes the Same State Twice.en.transcribed.srt |
49 KB |
TheIACR/Eurocrypt 2019/Quantum Lightning Never Strikes the Same State Twice.mp4 |
28.1 MB |
TheIACR/Eurocrypt 2019/Reusable Designated-Verifier NIZKs for all NP from CDH.en.transcribed.srt |
19 KB |
TheIACR/Eurocrypt 2019/Reusable Designated-Verifier NIZKs for all NP from CDH.mp4 |
8.8 MB |
TheIACR/Eurocrypt 2019/Reversible Proofs of Sequential Work.en.transcribed.srt |
40 KB |
TheIACR/Eurocrypt 2019/Reversible Proofs of Sequential Work.mp4 |
20 MB |
TheIACR/Eurocrypt 2019/Revisiting Non-Malleable Secret Sharing.en.transcribed.srt |
48 KB |
TheIACR/Eurocrypt 2019/Revisiting Non-Malleable Secret Sharing.mp4 |
29.6 MB |
TheIACR/Eurocrypt 2019/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.mp4 |
23.9 MB |
TheIACR/Eurocrypt 2019/SeaSign Compact Isogeny Signatures from Class Group Actions.en.transcribed.srt |
47 KB |
TheIACR/Eurocrypt 2019/SeaSign Compact Isogeny Signatures from Class Group Actions.mp4 |
55.3 MB |
TheIACR/Eurocrypt 2019/Secret-Sharing Schemes for General and Uniform Access Structures.mp4 |
25.4 MB |
TheIACR/Eurocrypt 2019/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.mp4 |
21.3 MB |
TheIACR/Eurocrypt 2019/Simple Schemes in the Bounded Storage Model.en.transcribed.srt |
56 KB |
TheIACR/Eurocrypt 2019/Simple Schemes in the Bounded Storage Model.mp4 |
34.8 MB |
TheIACR/Eurocrypt 2019/Symbolic Encryption with Pseudorandom Keys.mp4 |
27.8 MB |
TheIACR/Eurocrypt 2019/The General Sieve Kernel and New Records in Lattice Reduction.en.transcribed.srt |
38 KB |
TheIACR/Eurocrypt 2019/The General Sieve Kernel and New Records in Lattice Reduction.mp4 |
21.8 MB |
TheIACR/Eurocrypt 2019/Tight Proofs of Space and Replication.en.transcribed.srt |
47 KB |
TheIACR/Eurocrypt 2019/Tight Proofs of Space and Replication.mp4 |
36.1 MB |
TheIACR/Eurocrypt 2019/Tight Time-Memory Trade-Offs for Symmetric Encryption.en.transcribed.srt |
38 KB |
TheIACR/Eurocrypt 2019/Tight Time-Memory Trade-Offs for Symmetric Encryption.mp4 |
18.1 MB |
TheIACR/Eurocrypt 2019/Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.en.transcribed.srt |
34 KB |
TheIACR/Eurocrypt 2019/Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.mp4 |
23.2 MB |
TheIACR/Eurocrypt 2019/Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).en.transcribed.srt |
115 KB |
TheIACR/Eurocrypt 2019/Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).mp4 |
112.2 MB |
TheIACR/Eurocrypt 2019/Two Round Information-Theoretic MPC with Malicious Security.en.transcribed.srt |
28 KB |
TheIACR/Eurocrypt 2019/Two Round Information-Theoretic MPC with Malicious Security.mp4 |
20 MB |
TheIACR/Eurocrypt 2019/Uncovering Algebraic Structures in the MPC Landscape.en.transcribed.srt |
43 KB |
TheIACR/Eurocrypt 2019/Uncovering Algebraic Structures in the MPC Landscape.mp4 |
25.1 MB |
TheIACR/Eurocrypt 2019/Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear....en.transcribed.srt |
32 KB |
TheIACR/Eurocrypt 2019/Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear....mp4 |
19.3 MB |
TheIACR/Eurocrypt 2019/Welcome to Eurocrypt 2019, Marc Fischlin.en.transcribed.srt |
10 KB |
TheIACR/Eurocrypt 2019/Welcome to Eurocrypt 2019, Marc Fischlin.mp4 |
9.7 MB |
TheIACR/Eurocrypt 2019/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.mp4 |
29.7 MB |
TheIACR/Eurocrypt 2019/bison Instantiating the Whitened Swap-Or-Not Construction.mp4 |
19 MB |
TheIACR/FSE 2013/A Framework for Automated Independent-Biclique Cryptanalysis.mp4 |
93.7 MB |
TheIACR/FSE 2013/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.mp4 |
96.6 MB |
TheIACR/FSE 2013/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.mp4 |
85.6 MB |
TheIACR/FSE 2013/ALE AES-Based Lightweight Authenticated Encryption.mp4 |
83.4 MB |
TheIACR/FSE 2013/Attacks and Security Proofs of EAX-Prime.mp4 |
96.9 MB |
TheIACR/FSE 2013/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.mp4 |
109 MB |
TheIACR/FSE 2013/Complementing Feistel Ciphers.mp4 |
86.1 MB |
TheIACR/FSE 2013/Cryptanalysis of Round-Reduced LED.mp4 |
67.4 MB |
TheIACR/FSE 2013/Cryptanalysis of WIDEA.mp4 |
82.2 MB |
TheIACR/FSE 2013/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.mp4 |
96 MB |
TheIACR/FSE 2013/FSE 2013 Rump Session.mp4 |
239.6 MB |
TheIACR/FSE 2013/Full Plaintext Recovery Attack on Broadcast RC4.mp4 |
94.4 MB |
TheIACR/FSE 2013/Higher-Order Side Channel Security and Mask Refreshing.mp4 |
95 MB |
TheIACR/FSE 2013/Impossible plaintext cryptanalysis and probable plaintext collision attacks of 64 bit block ci.mp4 |
109.4 MB |
TheIACR/FSE 2013/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.mp4 |
98 MB |
TheIACR/FSE 2013/Invited Talk Failures of secret key cryptography.mp4 |
252.8 MB |
TheIACR/FSE 2013/Masking Tables - An Underestimated Security Risk.mp4 |
83.5 MB |
TheIACR/FSE 2013/Near Collision Attack on the Grain v1 Stream Cipher.mp4 |
92.6 MB |
TheIACR/FSE 2013/On Symmetric Encryption with Distinguishable Decryption Failures.mp4 |
86 MB |
TheIACR/FSE 2013/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.mp4 |
79 MB |
TheIACR/FSE 2013/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.mp4 |
83.3 MB |
TheIACR/FSE 2013/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.mp4 |
101.4 MB |
TheIACR/FSE 2013/Program Chair' Opening Remarks.mp4 |
6.8 MB |
TheIACR/FSE 2013/Reflection Cryptanalysis of PRINCE-Like Ciphers.mp4 |
94.1 MB |
TheIACR/FSE 2013/Related-Key Attacks Against Full Hummingbird-2.mp4 |
99.8 MB |
TheIACR/FSE 2013/Rotational Cryptanalysis of Round-Reduced Keccak.mp4 |
102.7 MB |
TheIACR/FSE 2013/Secure Message Authentication Against Related-Key Attack.mp4 |
95.8 MB |
TheIACR/FSE 2013/Security Analysis of PRINCE.mp4 |
87.8 MB |
TheIACR/FSE 2013/Smashing WEP in a Passive Attack.mp4 |
96.3 MB |
TheIACR/FSE 2013/Time-Memory Trade-Offs for Near-Collisions.mp4 |
100.8 MB |
TheIACR/FSE 2013/Towards Secure Distance Bounding.mp4 |
243.4 MB |
TheIACR/FSE 2013/Towards Understanding the Known-Key Security of Block Ciphers.mp4 |
106 MB |
TheIACR/FSE 2013/Tweakable Blockciphers with Asymptotically Optimal Security.mp4 |
68.6 MB |
TheIACR/FSE 2019/A General Proof Framework for Recent AES Distinguishers.en.transcribed.srt |
28 KB |
TheIACR/FSE 2019/A General Proof Framework for Recent AES Distinguishers.mp4 |
15.5 MB |
TheIACR/FSE 2019/Adiantum length-preserving encryption for entry-level processors.en.transcribed.srt |
38 KB |
TheIACR/FSE 2019/Adiantum length-preserving encryption for entry-level processors.mp4 |
19.1 MB |
TheIACR/FSE 2019/Boomerang Connectivity Table Revisited. Application to SKINNY and AES.en.transcribed.srt |
22 KB |
TheIACR/FSE 2019/Boomerang Connectivity Table Revisited. Application to SKINNY and AES.mp4 |
66.6 MB |
TheIACR/FSE 2019/Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.en.transcribed.srt |
28 KB |
TheIACR/FSE 2019/Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.mp4 |
18.9 MB |
TheIACR/FSE 2019/CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.en.transcribed.srt |
28 KB |
TheIACR/FSE 2019/CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.mp4 |
24.7 MB |
TheIACR/FSE 2019/Clustering Related-Tweak Characteristics Application to MANTIS-6.en.transcribed.srt |
41 KB |
TheIACR/FSE 2019/Clustering Related-Tweak Characteristics Application to MANTIS-6.mp4 |
92.2 MB |
TheIACR/FSE 2019/Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.en.transcribed.srt |
25 KB |
TheIACR/FSE 2019/Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.mp4 |
14 MB |
TheIACR/FSE 2019/Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.en.transcribed.srt |
22 KB |
TheIACR/FSE 2019/Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.mp4 |
17.4 MB |
TheIACR/FSE 2019/Cryptanalysis of AES-PRF and Its Dual.en.transcribed.srt |
24 KB |
TheIACR/FSE 2019/Cryptanalysis of AES-PRF and Its Dual.mp4 |
17 MB |
TheIACR/FSE 2019/Cryptanalysis of Low-Data Instances of Full LowMCv2.en.transcribed.srt |
28 KB |
TheIACR/FSE 2019/Cryptanalysis of Low-Data Instances of Full LowMCv2.mp4 |
17.5 MB |
TheIACR/FSE 2019/Cryptanalysis of Reduced round SKINNY Block Cipher.en.transcribed.srt |
21 KB |
TheIACR/FSE 2019/Cryptanalysis of Reduced round SKINNY Block Cipher.mp4 |
49.4 MB |
TheIACR/FSE 2019/Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.en.transcribed.srt |
27 KB |
TheIACR/FSE 2019/Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.mp4 |
22.2 MB |
TheIACR/FSE 2019/Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.en.transcribed.srt |
45 KB |
TheIACR/FSE 2019/Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.mp4 |
66 MB |
TheIACR/FSE 2019/FSE 2019 Rump Session.en.transcribed.srt |
102 KB |
TheIACR/FSE 2019/FSE 2019 Rump Session.mp4 |
208.2 MB |
TheIACR/FSE 2019/General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc....en.transcribed.srt |
33 KB |
TheIACR/FSE 2019/General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc....mp4 |
22.4 MB |
TheIACR/FSE 2019/Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.en.transcribed.srt |
29 KB |
TheIACR/FSE 2019/Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.mp4 |
73.5 MB |
TheIACR/FSE 2019/Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.en.transcribed.srt |
32 KB |
TheIACR/FSE 2019/Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.mp4 |
20.5 MB |
TheIACR/FSE 2019/Key Assignment Scheme with Authenticated Encryption.en.transcribed.srt |
30 KB |
TheIACR/FSE 2019/Key Assignment Scheme with Authenticated Encryption.mp4 |
24.4 MB |
TheIACR/FSE 2019/Key Prediction Security of Keyed Sponges.en.transcribed.srt |
26 KB |
TheIACR/FSE 2019/Key Prediction Security of Keyed Sponges.mp4 |
44.1 MB |
TheIACR/FSE 2019/Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.en.transcribed.srt |
30 KB |
TheIACR/FSE 2019/Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.mp4 |
72.3 MB |
TheIACR/FSE 2019/MDS Matrices with Lightweight Circuits.en.transcribed.srt |
34 KB |
TheIACR/FSE 2019/MDS Matrices with Lightweight Circuits.mp4 |
75.9 MB |
TheIACR/FSE 2019/Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc....en.transcribed.srt |
35 KB |
TheIACR/FSE 2019/Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc....mp4 |
65.6 MB |
TheIACR/FSE 2019/More Accurate Differential Properties of LED64 and Midori64.en.transcribed.srt |
29 KB |
TheIACR/FSE 2019/More Accurate Differential Properties of LED64 and Midori64.mp4 |
68.6 MB |
TheIACR/FSE 2019/New Yoyo Tricks with AES-based Permutations.en.transcribed.srt |
26 KB |
TheIACR/FSE 2019/New Yoyo Tricks with AES-based Permutations.mp4 |
46.2 MB |
TheIACR/FSE 2019/Nonlinear Approximations in Cryptanalysis Revisited.mp4 |
88 MB |
TheIACR/FSE 2019/On Invariant Attacks.en.transcribed.srt |
91 KB |
TheIACR/FSE 2019/On Invariant Attacks.mp4 |
71.7 MB |
TheIACR/FSE 2019/On the Boomerang Uniformity of Cryptographic Sboxes.en.transcribed.srt |
42 KB |
TheIACR/FSE 2019/On the Boomerang Uniformity of Cryptographic Sboxes.mp4 |
24 MB |
TheIACR/FSE 2019/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.mp4 |
24.3 MB |
TheIACR/FSE 2019/Partitions in the S-Box of Streebog and Kuznyechik.en.transcribed.srt |
45 KB |
TheIACR/FSE 2019/Partitions in the S-Box of Streebog and Kuznyechik.mp4 |
25.8 MB |
TheIACR/FSE 2019/Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.en.transcribed.srt |
27 KB |
TheIACR/FSE 2019/Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.mp4 |
18 MB |
TheIACR/FSE 2019/SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.en.transcribed.srt |
35 KB |
TheIACR/FSE 2019/SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.mp4 |
23.2 MB |
TheIACR/FSE 2019/Separable Statistics and Multidimensional Linear Cryptanalysis.mp4 |
18.7 MB |
TheIACR/FSE 2019/ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.en.transcribed.srt |
31 KB |
TheIACR/FSE 2019/ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.mp4 |
64.1 MB |
TheIACR/FSE 2019/Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.en.transcribed.srt |
40 KB |
TheIACR/FSE 2019/Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.mp4 |
84.1 MB |
TheIACR/FSE 2019/The design of Xoodoo and Xoofff.en.transcribed.srt |
30 KB |
TheIACR/FSE 2019/The design of Xoodoo and Xoofff.mp4 |
14.9 MB |
TheIACR/FSE 2019/Towards Low Energy Stream Ciphers.en.transcribed.srt |
30 KB |
TheIACR/FSE 2019/Towards Low Energy Stream Ciphers.mp4 |
22.8 MB |
TheIACR/FSE 2019/Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.en.transcribed.srt |
28 KB |
TheIACR/FSE 2019/Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.mp4 |
66.8 MB |
TheIACR/FSE 2019/libInterMAC Beyond Confidentiality and Integrity in Practice.en.transcribed.srt |
33 KB |
TheIACR/FSE 2019/libInterMAC Beyond Confidentiality and Integrity in Practice.mp4 |
19.5 MB |
TheIACR/IACR Crypt thank you.txt |
745 B |
TheIACR/IACR Distinguished Lectures/Differential Privacy and the People's Data.en.transcribed.srt |
84 KB |
TheIACR/IACR Distinguished Lectures/Differential Privacy and the People's Data.mp4 |
122 MB |
TheIACR/IACR Distinguished Lectures/From Idea to Impact, the Crypto Story What's Next.en.transcribed.srt |
131 KB |
TheIACR/IACR Distinguished Lectures/From Idea to Impact, the Crypto Story What's Next.mp4 |
125.4 MB |
TheIACR/IACR Distinguished Lectures/IACR Distinguished Lecture Caught in Between Theory and Practice.en.transcribed.srt |
106 KB |
TheIACR/IACR Distinguished Lectures/IACR Distinguished Lecture Caught in Between Theory and Practice.mp4 |
25.4 MB |
TheIACR/IACR Distinguished Lectures/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).en.transcribed.srt |
102 KB |
TheIACR/IACR Distinguished Lectures/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4 |
168.5 MB |
TheIACR/IACR Distinguished Lectures/Phil Rogaway - IACR Distinguished Lecture 2015.en.transcribed.srt |
112 KB |
TheIACR/IACR Distinguished Lectures/Phil Rogaway - IACR Distinguished Lecture 2015.mp4 |
146.4 MB |
TheIACR/IACR Distinguished Lectures/The future of cryptography.en.transcribed.srt |
132 KB |
TheIACR/IACR Distinguished Lectures/The future of cryptography.mp4 |
139.2 MB |
TheIACR/PKC 2010/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem..mp4 |
24.8 MB |
TheIACR/PKC 2010/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model..mp4 |
18.5 MB |
TheIACR/PKC 2010/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions..mp4 |
25.9 MB |
TheIACR/PKC 2010/Confidential Signatures and Deterministic Signcryption..mp4 |
18.4 MB |
TheIACR/PKC 2010/Constant Size Ciphertexts in Threshold Attribute-Based Encryption..mp4 |
20.8 MB |
TheIACR/PKC 2010/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments..mp4 |
23.4 MB |
TheIACR/PKC 2010/Duality in Lattice Based Cryptography.mp4 |
72.7 MB |
TheIACR/PKC 2010/Efficient Arithmetic on Hessian Curves..mp4 |
22.6 MB |
TheIACR/PKC 2010/Efficient Set Operations in the Presence of Malicious Adversaries..mp4 |
25.6 MB |
TheIACR/PKC 2010/Faster Pairing Computations on Curves with High-Degree Twists..mp4 |
30.1 MB |
TheIACR/PKC 2010/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions..mp4 |
27.2 MB |
TheIACR/PKC 2010/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes..mp4 |
27.3 MB |
TheIACR/PKC 2010/Functional Encryption for Inner Product Achieving Const ....mp4 |
31 MB |
TheIACR/PKC 2010/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA..mp4 |
30.5 MB |
TheIACR/PKC 2010/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA..mp4 |
28.5 MB |
TheIACR/PKC 2010/More Constructions of Lossy and Correlation-Secure Trapdoor Functions..mp4 |
22.3 MB |
TheIACR/PKC 2010/On the Feasibility of Consistent Computations..mp4 |
25.9 MB |
TheIACR/PKC 2010/Preventing Pollution Attacks in Multi-source Network Coding..mp4 |
29.6 MB |
TheIACR/PKC 2010/Secure Network Coding over the Integers..mp4 |
34.5 MB |
TheIACR/PKC 2010/Security of Encryption Schemes in Weakened Random Oracle Models..mp4 |
25.4 MB |
TheIACR/PKC 2010/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model..mp4 |
24.2 MB |
TheIACR/PKC 2010/Solving a 676-Bit Discrete Logarithm Problem in GF(3^6n)..mp4 |
20.9 MB |
TheIACR/PKC 2010/Text Search Protocols with Simulation Based Security..mp4 |
25 MB |
TheIACR/PKC 2010/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval..mp4 |
26.3 MB |
TheIACR/Tutorial on Homomorphic Encryption by Shai Halevi/Tutorial on Homomorphic Encryption (part 1).mp4 |
67.2 MB |
TheIACR/Tutorial on Homomorphic Encryption by Shai Halevi/Tutorial on Homomorphic Encryption (part 2).mp4 |
91.1 MB |
TheIACR/WAC 2 2019/Automating the Development of Chosen Ciphertext Attacks.en.transcribed.srt |
94 KB |
TheIACR/WAC 2 2019/Automating the Development of Chosen Ciphertext Attacks.mp4 |
96 MB |
TheIACR/WAC 2 2019/Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.en.transcribed.srt |
74 KB |
TheIACR/WAC 2 2019/Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.mp4 |
182.3 MB |
TheIACR/WAC 2 2019/Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.en.transcribed.srt |
62 KB |
TheIACR/WAC 2 2019/Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.mp4 |
165.6 MB |
TheIACR/WAC 2 2019/Dragonblood A Security Analysis of WPA3's SAE Handshake.en.transcribed.srt |
79 KB |
TheIACR/WAC 2 2019/Dragonblood A Security Analysis of WPA3's SAE Handshake.mp4 |
213.5 MB |
TheIACR/WAC 2 2019/RAMBleed Leaking Keys Across Address Spaces.mp4 |
219.6 MB |
TheIACR/WAC 2 2019/Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.en.transcribed.srt |
75 KB |
TheIACR/WAC 2 2019/Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.mp4 |
163.5 MB |
TheIACR/WAC 2 2019/The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.en.transcribed.srt |
71 KB |
TheIACR/WAC 2 2019/The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.mp4 |
174.7 MB |
TheIACR/WAC 2 2019/“Johnny, you are fired!” - Spoofing OpenPGP and S MIME Signatures in Emails.mp4 |
46.1 MB |
TheIACR/iacr logo.png |
40 KB |