BITCQ

TheIACR

Size: 57.3 GB
Magnet link

Name Size
TheIACR/Asiacrypt 2016/A General Polynomial Selection Method and New Asymptotic Complexities for ....mp4 51 MB
TheIACR/Asiacrypt 2016/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.mp4 64.4 MB
TheIACR/Asiacrypt 2016/A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4 85.3 MB
TheIACR/Asiacrypt 2016/A Shuffle Argument Secure in the Generic Model.mp4 54.3 MB
TheIACR/Asiacrypt 2016/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4 59.1 MB
TheIACR/Asiacrypt 2016/Adaptive Oblivious Transfer and Generalization.mp4 16.1 MB
TheIACR/Asiacrypt 2016/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ....mp4 95.3 MB
TheIACR/Asiacrypt 2016/Asiacrypt 2016 Rump Session.mp4 263.7 MB
TheIACR/Asiacrypt 2016/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4 203.3 MB
TheIACR/Asiacrypt 2016/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4 44.2 MB
TheIACR/Asiacrypt 2016/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4 78.7 MB
TheIACR/Asiacrypt 2016/Authenticated Encryption with Variable Stretch.mp4 26.3 MB
TheIACR/Asiacrypt 2016/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4 175.7 MB
TheIACR/Asiacrypt 2016/Characterisation and Estimation of the Key Rank Distribution in the context of side channel ....mp4 68.2 MB
TheIACR/Asiacrypt 2016/Cliptography Clipping the Power of Kleptographic Attacks.mp4 108.1 MB
TheIACR/Asiacrypt 2016/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4 61.4 MB
TheIACR/Asiacrypt 2016/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4 81.5 MB
TheIACR/Asiacrypt 2016/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ....mp4 122.5 MB
TheIACR/Asiacrypt 2016/Cryptography in Vietnam in the French and American Wars.mp4 118.5 MB
TheIACR/Asiacrypt 2016/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4 110.9 MB
TheIACR/Asiacrypt 2016/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting_.mp4 30.1 MB
TheIACR/Asiacrypt 2016/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4 17.8 MB
TheIACR/Asiacrypt 2016/Efficient Public Key Distance Bounding Protocol.mp4 124.7 MB
TheIACR/Asiacrypt 2016/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4 57.3 MB
TheIACR/Asiacrypt 2016/Efficient and Provable White Box Primitives.mp4 35 MB
TheIACR/Asiacrypt 2016/Faster Fully Homomorphic Encryption Bootstrapping in less than 0.1 Seconds.mp4 118.2 MB
TheIACR/Asiacrypt 2016/From 5 pass MQ based identification to MQ based signatures.mp4 29.3 MB
TheIACR/Asiacrypt 2016/From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4 40.5 MB
TheIACR/Asiacrypt 2016/General IACR Business Meeting.mp4 126 MB
TheIACR/Asiacrypt 2016/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4 89.6 MB
TheIACR/Asiacrypt 2016/How to Generate and use Universal Samplers.mp4 35.1 MB
TheIACR/Asiacrypt 2016/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4 31 MB
TheIACR/Asiacrypt 2016/Indistinguishable Proofs of Work or Knowledge.mp4 91.9 MB
TheIACR/Asiacrypt 2016/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4 105.2 MB
TheIACR/Asiacrypt 2016/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4 131.5 MB
TheIACR/Asiacrypt 2016/MiMC Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4 72 MB
TheIACR/Asiacrypt 2016/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4 27.6 MB
TheIACR/Asiacrypt 2016/Multi Input Functional Encryption with Unbounded Message Security.mp4 98.5 MB
TheIACR/Asiacrypt 2016/Multi Key Homomorphic Authenticators.mp4 66.6 MB
TheIACR/Asiacrypt 2016/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4 61.6 MB
TheIACR/Asiacrypt 2016/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4 449.5 MB
TheIACR/Asiacrypt 2016/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4 59.3 MB
TheIACR/Asiacrypt 2016/On the Security of Supersingular Isogeny Cryptosystems.mp4 51.8 MB
TheIACR/Asiacrypt 2016/Optimization of LPN Solving Algorithms.mp4 51.2 MB
TheIACR/Asiacrypt 2016/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4 65.7 MB
TheIACR/Asiacrypt 2016/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4 49 MB
TheIACR/Asiacrypt 2016/Reactive Garbling Foundation, Instantiation, Application.mp4 47.5 MB
TheIACR/Asiacrypt 2016/Reverse Cycle Walking and Its Applications.mp4 95 MB
TheIACR/Asiacrypt 2016/Selective Opening Security from Simulatable Data Encapsulation.mp4 40.3 MB
TheIACR/Asiacrypt 2016/Selective Opening Security in the Presence of Randomness Failures.mp4 48.5 MB
TheIACR/Asiacrypt 2016/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4 146.8 MB
TheIACR/Asiacrypt 2016/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4 48.9 MB
TheIACR/Asiacrypt 2016/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4 63.2 MB
TheIACR/Asiacrypt 2016/Size-Hiding Computation for Multiple Parties.mp4 62.8 MB
TheIACR/Asiacrypt 2016/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4 43.9 MB
TheIACR/Asiacrypt 2016/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4 63.7 MB
TheIACR/Asiacrypt 2016/The Kernel Matrix Diffie Hellman Assumption.mp4 93.2 MB
TheIACR/Asiacrypt 2016/The Reality of Cryptographic Deployments on the Internet.mp4 30.2 MB
TheIACR/Asiacrypt 2016/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4 56.2 MB
TheIACR/Asiacrypt 2016/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4 62 MB
TheIACR/Asiacrypt 2016/Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4 42.2 MB
TheIACR/Asiacrypt 2016/Universal Composition with Responsive Environments.mp4 36.2 MB
TheIACR/Asiacrypt 2016/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4 32.5 MB
TheIACR/Asiacrypt 2016/Unknown-Input Attacks in the Parallel Setting Improving the Security of the ....mp4 58.9 MB
TheIACR/Asiacrypt 2016/Verifiable Functional Encryption.mp4 74.5 MB
TheIACR/Asiacrypt 2016/Welcome to Asiacrypt.mp4 41.6 MB
TheIACR/Asiacrypt 2016/When are Fuzzy Extractors Possible.mp4 52.1 MB
TheIACR/Asiacrypt 2016/Zero Knowledge Accumulators and Set Algebra.mp4 22.2 MB
TheIACR/Asiacrypt 2016/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4 55.2 MB
TheIACR/Asiacrypt 2017/A Subversion-Resistant SNARK.mp4 150.6 MB
TheIACR/Asiacrypt 2017/A simple and compact algorithm for SIDH with arbitrary degree isogenies.mp4 121.1 MB
TheIACR/Asiacrypt 2017/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.mp4 3.5 MB
TheIACR/Asiacrypt 2017/Access Control Encryption for General Policies from Standard Assumptions.mp4 32.8 MB
TheIACR/Asiacrypt 2017/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.mp4 29.2 MB
TheIACR/Asiacrypt 2017/Amortizing Randomness Complexity in Private Circuits.mp4 105.1 MB
TheIACR/Asiacrypt 2017/An Efficient Pairing Based Shuffle Argument.mp4 42.1 MB
TheIACR/Asiacrypt 2017/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.mp4 99.5 MB
TheIACR/Asiacrypt 2017/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.mp4 52.2 MB
TheIACR/Asiacrypt 2017/Analyzing Multi Key Security Degradation.mp4 140.8 MB
TheIACR/Asiacrypt 2017/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.mp4 133.8 MB
TheIACR/Asiacrypt 2017/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.mp4 22 MB
TheIACR/Asiacrypt 2017/Blockcipher based MACs Beyond the Birthday Bound without Message Length.mp4 166.7 MB
TheIACR/Asiacrypt 2017/Coded BKW with Sieving.mp4 49.5 MB
TheIACR/Asiacrypt 2017/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.mp4 64.6 MB
TheIACR/Asiacrypt 2017/Combinatorics in Information theoretic cryptography.mp4 141.1 MB
TheIACR/Asiacrypt 2017/Consolidating Inner product Masking.mp4 160.4 MB
TheIACR/Asiacrypt 2017/Cycle slicer An algorithm for building permutations on special domains.mp4 178.5 MB
TheIACR/Asiacrypt 2017/Efficient Ring Signatures in the Standard Model.mp4 48.6 MB
TheIACR/Asiacrypt 2017/Efficient Scalable Constant Round MPC via Garbled Circuits.mp4 67.2 MB
TheIACR/Asiacrypt 2017/Faster Algorithms for Isogeny Problems using Torsion Point Images.mp4 82.5 MB
TheIACR/Asiacrypt 2017/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.mp4 167.7 MB
TheIACR/Asiacrypt 2017/Full state keyed duplex with built in multi user support.mp4 79.6 MB
TheIACR/Asiacrypt 2017/Grover Meets Simon - Quantumly Attacking the FX construction.mp4 122.3 MB
TheIACR/Asiacrypt 2017/Homomorphic Encryption for Arithmetic of Approximate Numbers.mp4 136.7 MB
TheIACR/Asiacrypt 2017/How to use Metaheuristics for Design of Symmetric Key primitives.mp4 184.2 MB
TheIACR/Asiacrypt 2017/IACR Business Meeting.mp4 351.5 MB
TheIACR/Asiacrypt 2017/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.mp4 67.2 MB
TheIACR/Asiacrypt 2017/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.mp4 39 MB
TheIACR/Asiacrypt 2017/Improved Security for OCB3.mp4 96.7 MB
TheIACR/Asiacrypt 2017/Instantaneous Decentralized Poker.mp4 146.1 MB
TheIACR/Asiacrypt 2017/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes - YouTube.mp4 103.6 MB
TheIACR/Asiacrypt 2017/Kummer for Genus One over Prime Order Fields.mp4 43.2 MB
TheIACR/Asiacrypt 2017/Linear Cryptanalysis of DES with Asymmetries.mp4 32.3 MB
TheIACR/Asiacrypt 2017/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.mp4 89.7 MB
TheIACR/Asiacrypt 2017/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.mp4 12.4 MB
TheIACR/Asiacrypt 2017/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.mp4 25 MB
TheIACR/Asiacrypt 2017/More Efficient Universal Circuit Constructions.mp4 98.4 MB
TheIACR/Asiacrypt 2017/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.mp4 28.2 MB
TheIACR/Asiacrypt 2017/Non interactive multiparty computation without correlated randomness.mp4 158.5 MB
TheIACR/Asiacrypt 2017/On the Depth of Oblivious Parallel RAM.mp4 20.7 MB
TheIACR/Asiacrypt 2017/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.mp4 126 MB
TheIACR/Asiacrypt 2017/Opening remarks at Asiacrypt 2017.mp4 161 MB
TheIACR/Asiacrypt 2017/Optimal rate non committing encryption.mp4 156.4 MB
TheIACR/Asiacrypt 2017/Overlaying Conditional Circuit Clauses for Secure Computation.mp4 136.7 MB
TheIACR/Asiacrypt 2017/Post Quantum Security of Fiat Shamir.mp4 141 MB
TheIACR/Asiacrypt 2017/Preventing CLT Attacks on Obfuscation with Linear Overhead.mp4 122.4 MB
TheIACR/Asiacrypt 2017/Quantum Fully Homomorphic Encryption with Verification.mp4 131.5 MB
TheIACR/Asiacrypt 2017/Quantum Multicollision Finding Algorithm.mp4 117.2 MB
TheIACR/Asiacrypt 2017/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.mp4 168.1 MB
TheIACR/Asiacrypt 2017/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.mp4 74.9 MB
TheIACR/Asiacrypt 2017/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.mp4 192.1 MB
TheIACR/Asiacrypt 2017/Strengthening Access Control Encryption.mp4 38.9 MB
TheIACR/Asiacrypt 2017/Succinct Spooky Free Compilers Are Not Black Box Sound.mp4 141.4 MB
TheIACR/Asiacrypt 2017/Symmetrically and Asymmetrically Hard Cryptography.mp4 177.9 MB
TheIACR/Asiacrypt 2017/The Iterated Random Function Problem.mp4 149.4 MB
TheIACR/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols (2).mp4 109.7 MB
TheIACR/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols.mp4 151 MB
TheIACR/Asiacrypt 2017/The Sleepy Model of Consensus.mp4 189.1 MB
TheIACR/Asiacrypt 2017/The first thorough side channel hardware trojan.mp4 148.7 MB
TheIACR/Asiacrypt 2017/The ship has sailed the NIST Post-Quantum Cryptography competition.mp4 332.1 MB
TheIACR/Asiacrypt 2017/Tightly secure signatures from five move identification protocols.mp4 127.7 MB
TheIACR/Asiacrypt 2017/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.mp4 114.9 MB
TheIACR/Asiacrypt 2017/Two Round PAKE from Approximate SPH and Instantiations from Lattices.mp4 151.7 MB
TheIACR/Asiacrypt 2017/White-box Cryptomania, Pascal Paillier.mp4 234.9 MB
TheIACR/Asiacrypt 2017/Yoyo Tricks with AES.mp4 18.7 MB
TheIACR/Asiacrypt 2017/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.mp4 184.7 MB
TheIACR/Asiacrypt 2017/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.mp4 35.4 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/A Fine Grained Approach to Complexity.en.transcribed.srt 129 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/A Fine Grained Approach to Complexity.mp4 111 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Certified Randomness from Quantum Supremacy.en.transcribed.srt 141 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Certified Randomness from Quantum Supremacy.mp4 155.4 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Cryptography, Local Decoding, and Distributed Storage.en.transcribed.srt 152 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Cryptography, Local Decoding, and Distributed Storage.mp4 35.6 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Machine Learning and Security The Good, the Bad, and the Hopeful.en.transcribed.srt 170 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Machine Learning and Security The Good, the Bad, and the Hopeful.mp4 113.2 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/On Optimal Algorithms and Assumption Factories.en.transcribed.srt 127 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/On Optimal Algorithms and Assumption Factories.mp4 138.9 MB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Theory for Society Crypto on Steroids.en.transcribed.srt 117 KB
TheIACR/Beyond Crypto A TCS Perspective (affiliated event at Crypto 2018)/Theory for Society Crypto on Steroids.mp4 160 MB
TheIACR/CHES 2016/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.mp4 96.3 MB
TheIACR/CHES 2016/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.mp4 125.9 MB
TheIACR/CHES 2016/Antikernel A Decentralized Secure Hardware Software Operating System.mp4 107.5 MB
TheIACR/CHES 2016/CHES 2016 Panel Discussion.mp4 432.9 MB
TheIACR/CHES 2016/Cache Attacks Enable Bulk Key Recovery on the Cloud - YouTube.mp4 97.9 MB
TheIACR/CHES 2016/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.mp4 135.1 MB
TheIACR/CHES 2016/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.mp4 167.8 MB
TheIACR/CHES 2016/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.mp4 149.8 MB
TheIACR/CHES 2016/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.mp4 71.4 MB
TheIACR/CHES 2016/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.mp4 83.7 MB
TheIACR/CHES 2016/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.mp4 114.9 MB
TheIACR/CHES 2016/Faster Evaluation of SBoxes via Common Shares.mp4 71.2 MB
TheIACR/CHES 2016/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.mp4 148 MB
TheIACR/CHES 2016/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.mp4 149.2 MB
TheIACR/CHES 2016/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.mp4 148.7 MB
TheIACR/CHES 2016/Masking AES with d+1 Shares in Hardware.mp4 75.9 MB
TheIACR/CHES 2016/Mitigating SAT Attack on Logic Locking.mp4 180.1 MB
TheIACR/CHES 2016/No Place to Hide Contactless Probing of Secret Data on FPGAs.mp4 12.3 MB
TheIACR/CHES 2016/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4 305.4 MB
TheIACR/CHES 2016/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.mp4 25.6 MB
TheIACR/CHES 2016/Physical Layer Group Key Agreement for Automotive Controller Area Network.mp4 128.8 MB
TheIACR/CHES 2016/QcBits constant time small key code based cryptography.mp4 107.8 MB
TheIACR/CHES 2016/Reducing the Number of Non linear Multiplications in Masking Schemes.mp4 135.3 MB
TheIACR/CHES 2016/Run time Accessible DRAM PUFs in Commodity Devices.mp4 17.4 MB
TheIACR/CHES 2016/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.mp4 75.4 MB
TheIACR/CHES 2016/Software implementation of Koblitz curves over quadratic fields.mp4 87.2 MB
TheIACR/CHES 2016/Strong 8 bit Sboxes with Efficient Masking in Hardware.mp4 73.7 MB
TheIACR/CHES 2016/Strong Machine Learning Attack against PUFs with No Mathematical Model.mp4 118.8 MB
TheIACR/CHES 2016/Towards Easy Leakage Certification.mp4 34.2 MB
TheIACR/CHES 2016/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.mp4 25.8 MB
TheIACR/CHES 2016/vatiCAN Vetted, Authenticated CAN Bus.mp4 132.9 MB
TheIACR/CHES 2018/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.en.transcribed.srt 43 KB
TheIACR/CHES 2018/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.mp4 32.3 MB
TheIACR/CHES 2018/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.en.transcribed.srt 53 KB
TheIACR/CHES 2018/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.mp4 22.1 MB
TheIACR/CHES 2018/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.en.transcribed.srt 54 KB
TheIACR/CHES 2018/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.mp4 23.5 MB
TheIACR/CHES 2018/CHES 2018 Rump Session.en.transcribed.srt 187 KB
TheIACR/CHES 2018/CHES 2018 Rump Session.mp4 153.8 MB
TheIACR/CHES 2018/CacheQuote Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.en.transcribed.srt 52 KB
TheIACR/CHES 2018/CacheQuote Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.mp4 16.8 MB
TheIACR/CHES 2018/Closing remarks at CHES 2018.en.transcribed.srt 10 KB
TheIACR/CHES 2018/Closing remarks at CHES 2018.mp4 13.1 MB
TheIACR/CHES 2018/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.en.transcribed.srt 99 KB
TheIACR/CHES 2018/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.mp4 59 MB
TheIACR/CHES 2018/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.en.transcribed.srt 62 KB
TheIACR/CHES 2018/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.mp4 40.9 MB
TheIACR/CHES 2018/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.en.transcribed.srt 38 KB
TheIACR/CHES 2018/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.mp4 38.7 MB
TheIACR/CHES 2018/Differential Fault Attacks on Deterministic Lattice Signatures.en.transcribed.srt 44 KB
TheIACR/CHES 2018/Differential Fault Attacks on Deterministic Lattice Signatures.mp4 28.4 MB
TheIACR/CHES 2018/Dismantling the AUT64 Automotive Cipher.en.transcribed.srt 43 KB
TheIACR/CHES 2018/Dismantling the AUT64 Automotive Cipher.mp4 25.5 MB
TheIACR/CHES 2018/EM Analysis in the IoT Context Lessons Learned from an Attack on Thread.en.transcribed.srt 48 KB
TheIACR/CHES 2018/EM Analysis in the IoT Context Lessons Learned from an Attack on Thread.mp4 43 MB
TheIACR/CHES 2018/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.en.transcribed.srt 40 KB
TheIACR/CHES 2018/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.mp4 36.2 MB
TheIACR/CHES 2018/Efficient Side Channel Protections of ARX Ciphers.mp4 23.5 MB
TheIACR/CHES 2018/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.en.transcribed.srt 40 KB
TheIACR/CHES 2018/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.mp4 36.9 MB
TheIACR/CHES 2018/ExpFault An Automated Framework for Exploitable Fault Characterization in Block Ciphers.en.transcribed.srt 47 KB
TheIACR/CHES 2018/ExpFault An Automated Framework for Exploitable Fault Characterization in Block Ciphers.mp4 32.5 MB
TheIACR/CHES 2018/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.en.transcribed.srt 42 KB
TheIACR/CHES 2018/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.mp4 41.1 MB
TheIACR/CHES 2018/FACE Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.en.transcribed.srt 38 KB
TheIACR/CHES 2018/FACE Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.mp4 25.7 MB
TheIACR/CHES 2018/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.en.transcribed.srt 36 KB
TheIACR/CHES 2018/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.mp4 27 MB
TheIACR/CHES 2018/FPGAhammer Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.en.transcribed.srt 40 KB
TheIACR/CHES 2018/FPGAhammer Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.mp4 21.4 MB
TheIACR/CHES 2018/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.en.transcribed.srt 59 KB
TheIACR/CHES 2018/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.mp4 22.3 MB
TheIACR/CHES 2018/Fault Attacks Made Easy Differential Fault Analysis Automation on Assembly Code.mp4 36.5 MB
TheIACR/CHES 2018/Generic Low Latency Masking in Hardware.en.transcribed.srt 40 KB
TheIACR/CHES 2018/Generic Low Latency Masking in Hardware.mp4 24.7 MB
TheIACR/CHES 2018/Hardware Masking, Revisited.en.transcribed.srt 44 KB
TheIACR/CHES 2018/Hardware Masking, Revisited.mp4 27.9 MB
TheIACR/CHES 2018/High Order Masking of Look up Tables with Common Shares.mp4 21.6 MB
TheIACR/CHES 2018/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.en.transcribed.srt 39 KB
TheIACR/CHES 2018/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.mp4 31.2 MB
TheIACR/CHES 2018/Improved High Order Conversion From Boolean to Arithmetic Masking.mp4 21.1 MB
TheIACR/CHES 2018/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.en.transcribed.srt 51 KB
TheIACR/CHES 2018/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.mp4 40.8 MB
TheIACR/CHES 2018/Leakage Detection with the x2 Test.en.transcribed.srt 37 KB
TheIACR/CHES 2018/Leakage Detection with the x2 Test.mp4 23.1 MB
TheIACR/CHES 2018/Linear Repairing Codes and Side Channel Attacks.en.transcribed.srt 57 KB
TheIACR/CHES 2018/Linear Repairing Codes and Side Channel Attacks.mp4 31.1 MB
TheIACR/CHES 2018/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.en.transcribed.srt 50 KB
TheIACR/CHES 2018/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.mp4 30.8 MB
TheIACR/CHES 2018/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.en.transcribed.srt 32 KB
TheIACR/CHES 2018/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.mp4 19.5 MB
TheIACR/CHES 2018/Multiplicative Masking for AES in Hardware.en.transcribed.srt 49 KB
TheIACR/CHES 2018/Multiplicative Masking for AES in Hardware.mp4 37.4 MB
TheIACR/CHES 2018/New Bleichenbacher Records Fault Attacks on qDSA Signatures.en.transcribed.srt 43 KB
TheIACR/CHES 2018/New Bleichenbacher Records Fault Attacks on qDSA Signatures.mp4 23.7 MB
TheIACR/CHES 2018/On Recovering Affine Encodings in White Box Implementations.en.transcribed.srt 42 KB
TheIACR/CHES 2018/On Recovering Affine Encodings in White Box Implementations.mp4 26.4 MB
TheIACR/CHES 2018/On the Difficulty of FSM based Hardware Obfuscation.en.transcribed.srt 47 KB
TheIACR/CHES 2018/On the Difficulty of FSM based Hardware Obfuscation.mp4 36.8 MB
TheIACR/CHES 2018/Opening remarks.en.transcribed.srt 17 KB
TheIACR/CHES 2018/Opening remarks.mp4 16.1 MB
TheIACR/CHES 2018/Persistent Fault Analysis on Block Ciphers.en.transcribed.srt 49 KB
TheIACR/CHES 2018/Persistent Fault Analysis on Block Ciphers.mp4 31.4 MB
TheIACR/CHES 2018/Practical CCA2 Secure and Masked Ring LWE Implementation.mp4 25.6 MB
TheIACR/CHES 2018/Rhythmic Keccak SCA Security and Low Latency in HW.en.transcribed.srt 38 KB
TheIACR/CHES 2018/Rhythmic Keccak SCA Security and Low Latency in HW.mp4 36.7 MB
TheIACR/CHES 2018/SAEB A Lightweight Blockcipher Based AEAD Mode of Operation.en.transcribed.srt 40 KB
TheIACR/CHES 2018/SAEB A Lightweight Blockcipher Based AEAD Mode of Operation.mp4 24 MB
TheIACR/CHES 2018/SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography.en.transcribed.srt 52 KB
TheIACR/CHES 2018/SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography.mp4 25.6 MB
TheIACR/CHES 2018/Saber on ARM CCA secure module lattice based key encapsulation on ARM.en.transcribed.srt 50 KB
TheIACR/CHES 2018/Saber on ARM CCA secure module lattice based key encapsulation on ARM.mp4 27.1 MB
TheIACR/CHES 2018/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.en.transcribed.srt 29 KB
TheIACR/CHES 2018/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.mp4 19.2 MB
TheIACR/CHES 2018/Smashing the Implementation Records of AES S box.en.transcribed.srt 43 KB
TheIACR/CHES 2018/Smashing the Implementation Records of AES S box.mp4 26.2 MB
TheIACR/CHES 2018/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.en.transcribed.srt 51 KB
TheIACR/CHES 2018/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.mp4 26.5 MB
TheIACR/CHES 2018/Standard Lattice Based Key Encapsulation on Embedded Devices.en.transcribed.srt 39 KB
TheIACR/CHES 2018/Standard Lattice Based Key Encapsulation on Embedded Devices.mp4 22 MB
TheIACR/CHES 2018/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.en.transcribed.srt 51 KB
TheIACR/CHES 2018/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.mp4 39.5 MB
TheIACR/Crypto 2011 Rump Sessions/(More) Efficient Secure Computation from Garbled Circuits.mp4 6.6 MB
TheIACR/Crypto 2011 Rump Sessions/A brief chat about approximate GCDs.mp4 5.7 MB
TheIACR/Crypto 2011 Rump Sessions/A silent competition for ultra-fast public key cryptography.mp4 5.5 MB
TheIACR/Crypto 2011 Rump Sessions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.mp4 6.3 MB
TheIACR/Crypto 2011 Rump Sessions/An Application Of Frequency Shift Keying To Communication Resynchronisation.mp4 3.5 MB
TheIACR/Crypto 2011 Rump Sessions/An historical call for papers ....mp4 7.3 MB
TheIACR/Crypto 2011 Rump Sessions/An update about HiDalgo.mp4 6.2 MB
TheIACR/Crypto 2011 Rump Sessions/Biclique cryptanalysis of the full AES.mp4 11.6 MB
TheIACR/Crypto 2011 Rump Sessions/Blinding ballot copying in Helios from Condorcet to IACR.mp4 5.5 MB
TheIACR/Crypto 2011 Rump Sessions/Bounds on Cloud File Retrievability.mp4 2 MB
TheIACR/Crypto 2011 Rump Sessions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.mp4 8.5 MB
TheIACR/Crypto 2011 Rump Sessions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.mp4 7.6 MB
TheIACR/Crypto 2011 Rump Sessions/Extreme Threshold Cryptosystems.mp4 4.8 MB
TheIACR/Crypto 2011 Rump Sessions/FlipIt and the Cramér-Rao bound.mp4 5.1 MB
TheIACR/Crypto 2011 Rump Sessions/HB^N An HB-like protocol secure against Man-in-the-Middle attacks.mp4 6.9 MB
TheIACR/Crypto 2011 Rump Sessions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).mp4 7.7 MB
TheIACR/Crypto 2011 Rump Sessions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.mp4 7.1 MB
TheIACR/Crypto 2011 Rump Sessions/NIST Announcements.mp4 10.4 MB
TheIACR/Crypto 2011 Rump Sessions/Non-Malleable Codes in the Split-State Model.mp4 3.7 MB
TheIACR/Crypto 2011 Rump Sessions/Observations on H-PRESENT-128.mp4 5.4 MB
TheIACR/Crypto 2011 Rump Sessions/Panel discussion on leakage.mp4 3.2 MB
TheIACR/Crypto 2011 Rump Sessions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.mp4 3.5 MB
TheIACR/Crypto 2011 Rump Sessions/Predicate Encryption for Inner Products from LWE.mp4 7.1 MB
TheIACR/Crypto 2011 Rump Sessions/Pseudorandom Functions and Lattices.mp4 8.1 MB
TheIACR/Crypto 2011 Rump Sessions/Remotegrity.mp4 10.7 MB
TheIACR/Crypto 2011 Rump Sessions/Rethinking IDEA.mp4 5.8 MB
TheIACR/Crypto 2011 Rump Sessions/Robust Coin Flipping.mp4 7.6 MB
TheIACR/Crypto 2011 Rump Sessions/Secure Computation with Sublinear Amortized Work.mp4 6.1 MB
TheIACR/Crypto 2011 Rump Sessions/Secure Verification of Delegated Presentation Delivery.mp4 3.9 MB
TheIACR/Crypto 2011 Rump Sessions/The 2011 IACR Fellowship Induction Ceremony.mp4 18.7 MB
TheIACR/Crypto 2011 Rump Sessions/The Garden-Hose Model.mp4 7.4 MB
TheIACR/Crypto 2011 Rump Sessions/The Hunting of the SNARK.mp4 8.2 MB
TheIACR/Crypto 2011 Rump Sessions/Trapdoors for Lattices Simpler, Tighter, Faster, Smaller.mp4 6.1 MB
TheIACR/Crypto 2011 Rump Sessions/Variants of Sponge-like Construction.mp4 5.4 MB
TheIACR/Crypto 2011/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).mp4 20.6 MB
TheIACR/Crypto 2011/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.mp4 10 MB
TheIACR/Crypto 2011/A New Variant of PMAC Beyond the Birthday Bound.mp4 30.7 MB
TheIACR/Crypto 2011/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.mp4 10.4 MB
TheIACR/Crypto 2011/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.mp4 12.8 MB
TheIACR/Crypto 2011/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).mp4 23.5 MB
TheIACR/Crypto 2011/Bi-Deniable Public-Key Encryption.mp4 14.7 MB
TheIACR/Crypto 2011/Classical Cryptographic Protocols in a Quantum World.mp4 22 MB
TheIACR/Crypto 2011/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).mp4 16.1 MB
TheIACR/Crypto 2011/Constant-Rate Oblivious Transfer from Noisy Channels.mp4 11.4 MB
TheIACR/Crypto 2011/Cryptanalysis of PrintCIPHER.mp4 21.6 MB
TheIACR/Crypto 2011/Cryptography with Tamperable and Leaky Memory (Crypto 2011).mp4 11.3 MB
TheIACR/Crypto 2011/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.mp4 24.8 MB
TheIACR/Crypto 2011/Generic Side-Channel Distinguishers Improvements and Limitations (Crypto 2011).mp4 28.4 MB
TheIACR/Crypto 2011/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4 68.8 MB
TheIACR/Crypto 2011/Inverting HFE Systems is Quasi-Polynomial for All Fields.mp4 12.5 MB
TheIACR/Crypto 2011/Leakage-Resilient Zero Knowledge (Crypto 2011).mp4 24.2 MB
TheIACR/Crypto 2011/Leftover Hash Lemma, Revisited (Crypto 2011).mp4 40.1 MB
TheIACR/Crypto 2011/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.mp4 28.3 MB
TheIACR/Crypto 2011/Memory Delegation (Crypto 2011).mp4 11.2 MB
TheIACR/Crypto 2011/Merkle Puzzles in a Quantum World.mp4 10.5 MB
TheIACR/Crypto 2011/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.mp4 15.2 MB
TheIACR/Crypto 2011/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).mp4 11.9 MB
TheIACR/Crypto 2011/Order-Preserving Encryption Revisited Improved Security Analysis and Alternative Solutions.mp4 11.4 MB
TheIACR/Crypto 2011/Perfectly-Secure Multiplication for any t n 3 (Crypto 2011).mp4 11.3 MB
TheIACR/Crypto 2011/Physically Uncloneable Functions in the Universal Composition Framework.mp4 28.6 MB
TheIACR/Crypto 2011/Position-Based Quantum Cryptography Impossibility and Constructions.mp4 13.8 MB
TheIACR/Crypto 2011/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.mp4 21 MB
TheIACR/Crypto 2011/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.mp4 38 MB
TheIACR/Crypto 2011/Random Oracle Reducibility (Crypto 2011).mp4 8.7 MB
TheIACR/Crypto 2011/Round Optimal Blind Signatures in the Standard Model.mp4 23.4 MB
TheIACR/Crypto 2011/Secure Computation on the Web Computing without Simultaneous Interaction (Crypto 2011).mp4 12.1 MB
TheIACR/Crypto 2011/Smaller Decoding Exponents Ball-Collision Decoding.mp4 26.3 MB
TheIACR/Crypto 2011/The Collision Security of Tandem-DM in the Ideal Cipher Model.mp4 11.5 MB
TheIACR/Crypto 2011/The IPS Compiler Optimizations, Variants and Concrete Efficiency (Crypto 2011).mp4 12 MB
TheIACR/Crypto 2011/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).mp4 20.7 MB
TheIACR/Crypto 2011/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.mp4 11.4 MB
TheIACR/Crypto 2011/Time-Lock Puzzles in the Random Oracle Model.mp4 11.5 MB
TheIACR/Crypto 2011/Tor and Circumvention Lessons Learned, by Roger Dingledine.mp4 61.4 MB
TheIACR/Crypto 2011/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).mp4 11.7 MB
TheIACR/Crypto 2012/A New Approach to Practical Active-Secure Two-Party Comp ....mp4 20.6 MB
TheIACR/Crypto 2012/Actively Secure Two-Party Evaluation of Any Quantum Oper ....mp4 24.4 MB
TheIACR/Crypto 2012/Adaptively Secure Multi-Party Computation with Dishonest ....mp4 35.2 MB
TheIACR/Crypto 2012/An Enciphering Scheme Based on a Card Shuffle.mp4 43.4 MB
TheIACR/Crypto 2012/Black-Box Constructions of Composable Protocols without ....mp4 19.7 MB
TheIACR/Crypto 2012/Breaking and Repairing GCM Security Proofs.mp4 47.5 MB
TheIACR/Crypto 2012/Collusion-Preserving Computation.mp4 21.8 MB
TheIACR/Crypto 2012/Crowd-Blending Privacy.mp4 11.6 MB
TheIACR/Crypto 2012/Differential Privacy with Imperfect Randomness.mp4 21.7 MB
TheIACR/Crypto 2012/Dynamic Credentials and Ciphertext Delegation for Attrib ....mp4 27.8 MB
TheIACR/Crypto 2012/Efficient Dissection of Composite Problems, with Applica ....mp4 64.3 MB
TheIACR/Crypto 2012/Efficient Padding Oracle Attacks on Cryptographic Hardware.mp4 49.9 MB
TheIACR/Crypto 2012/Fully Homomorphic Encryption without Modulus Switching f ....mp4 36.5 MB
TheIACR/Crypto 2012/Functional Encryption for Regular Languages.mp4 28.6 MB
TheIACR/Crypto 2012/Functional Encryption with Bounded Collusions via Multi- ....mp4 31.8 MB
TheIACR/Crypto 2012/Hardness of Computing Individual Bits for One-Way Functi ....mp4 29 MB
TheIACR/Crypto 2012/Hash Functions Based on Three Permutations A Generic Se ....mp4 22.7 MB
TheIACR/Crypto 2012/Homomorphic Evaluation of the AES Circuit.mp4 58.2 MB
TheIACR/Crypto 2012/Multi-instance Security and Its Application to Password- ....mp4 30.6 MB
TheIACR/Crypto 2012/Multiparty Computation from Somewhat Homomorphic Encryption.mp4 17.2 MB
TheIACR/Crypto 2012/Must You Know the Code of f to Securely Compute f.mp4 24.8 MB
TheIACR/Crypto 2012/Near-Linear Unconditionally-Secure Multiparty Computatio ....mp4 20.2 MB
TheIACR/Crypto 2012/New Impossibility Results for Concurrent Composition and ....mp4 8.5 MB
TheIACR/Crypto 2012/New Preimage Attacks against Reduced SHA-1.mp4 19.1 MB
TheIACR/Crypto 2012/On the Distribution of Linear Biases Three Instructive ....mp4 31.9 MB
TheIACR/Crypto 2012/On the Impossibility of Constructing Efficient Key Encap ....mp4 16.7 MB
TheIACR/Crypto 2012/On the Security of TLS-DHE in the Standard Model.mp4 26 MB
TheIACR/Crypto 2012/Pinning Down Privacy in Statistical Databases.mp4 100.6 MB
TheIACR/Crypto 2012/Public Keys.mp4 25.6 MB
TheIACR/Crypto 2012/Quantum to Classical Randomness Extractors.mp4 17.9 MB
TheIACR/Crypto 2012/Resistance against Iterated Attacks by Decorrelation Rev ....mp4 18.9 MB
TheIACR/Crypto 2012/Secret Sharing Schemes for Very Dense Graphs.mp4 24.3 MB
TheIACR/Crypto 2012/Secure Identity-Based Encryption in the Quantum Random O ....mp4 20.5 MB
TheIACR/Crypto 2012/Securing Circuits against Constant-Rate Tampering.mp4 17 MB
TheIACR/Crypto 2012/Semantic Security for the Wiretap Channel.mp4 29.3 MB
TheIACR/Crypto 2012/Stam's Conjecture and Threshold Phenomena in Collision R ....mp4 16.4 MB
TheIACR/Crypto 2012/Substitution-Permutation Networks, Pseudorandom Function ....mp4 96.7 MB
TheIACR/Crypto 2012/Succinct Arguments from Multi-prover Interactive Proofs ....mp4 19.2 MB
TheIACR/Crypto 2012/Tamper and Leakage Resilience in the Split-State Model.mp4 13.9 MB
TheIACR/Crypto 2012/The Curious Case of Non-Interactive Commitments - On the ....mp4 20.8 MB
TheIACR/Crypto 2012/The End of Crypto.mp4 92 MB
TheIACR/Crypto 2012/Tightly Secure Signatures and Public-Key Encryption.mp4 21.2 MB
TheIACR/Crypto 2012/To Hash or Not to Hash Again (In)Differentiability Resu ....mp4 18 MB
TheIACR/Crypto 2012/Tweakable Blockciphers with Beyond Birthday-Bound Security.mp4 23.5 MB
TheIACR/Crypto 2012/Universal Composability from Essentially Any Trusted Setup.mp4 21.7 MB
TheIACR/Crypto 2012/Welcome to Crypto 2012.mp4 12.8 MB
TheIACR/Crypto 2013 Rump Session/Spying NSA (reprise)..mp4 37.2 MB
TheIACR/Crypto 2013 Rump Session/Spying NSA.mp4 36.8 MB
TheIACR/Crypto 2013 Rump Session/Under Surveillance.mp4 27.7 MB
TheIACR/Crypto 2013/A Uniform Min-Max Theorem with Applications in Cryptography.mp4 38.8 MB
TheIACR/Crypto 2013/Accuracy-Privacy Tradeoffs for Two-Party Differentially ....mp4 19.4 MB
TheIACR/Crypto 2013/Achieving the Limits of the Noisy-Storage Model Using En ....mp4 62.1 MB
TheIACR/Crypto 2013/An Algebraic Framework for Diffie-Hellman Assumptions.mp4 87.3 MB
TheIACR/Crypto 2013/Attribute-Based Encryption for Circuits from Multilinear ....mp4 73.2 MB
TheIACR/Crypto 2013/Construction of Differential Characteristics in ARX Desi ....mp4 60.4 MB
TheIACR/Crypto 2013/Counter-Cryptanalysis.mp4 113.8 MB
TheIACR/Crypto 2013/Digital Signatures with Minimal Overhead from Indifferen ....mp4 47.1 MB
TheIACR/Crypto 2013/Efficient Multiparty Protocols via Log-Depth Threshold F ....mp4 48.8 MB
TheIACR/Crypto 2013/Encoding Functions with Constant Online Rate or How to C ....mp4 65.8 MB
TheIACR/Crypto 2013/Everlasting Multi-party Computation.mp4 59.3 MB
TheIACR/Crypto 2013/Fast Cut-and-Choose Based Protocols for Malicious and Co ....mp4 52.2 MB
TheIACR/Crypto 2013/Full Domain Hash from (Leveled) Multilinear Maps and Ide ....mp4 31.4 MB
TheIACR/Crypto 2013/Functional Encryption New Perspectives and Lower Bounds.mp4 59.4 MB
TheIACR/Crypto 2013/Hard-Core Predicates for a Diffie-Hellman Problem over F ....mp4 80.1 MB
TheIACR/Crypto 2013/Hardness of SIS and LWE with Small Parameters.mp4 47.3 MB
TheIACR/Crypto 2013/Highly-Scalable Searchable Symmetric Encryption with Sup ....mp4 108.7 MB
TheIACR/Crypto 2013/Homomorphic Encryption from Learning with Errors Concep ....mp4 83.6 MB
TheIACR/Crypto 2013/How to Run Turing Machines on Encrypted Data.mp4 85.4 MB
TheIACR/Crypto 2013/Improved OT Extension for Transferring Short Secrets.mp4 44.6 MB
TheIACR/Crypto 2013/Instantiating Random Oracles via UCEs.mp4 71.2 MB
TheIACR/Crypto 2013/Leakage-Resilient Symmetric Cryptography under Empirical ....mp4 77.3 MB
TheIACR/Crypto 2013/Learning with Rounding, Revisited - New Reduction, Prope ....mp4 26.1 MB
TheIACR/Crypto 2013/Limits of Provable Security for Homomorphic Encryption.mp4 45 MB
TheIACR/Crypto 2013/Limits on the Power of Cryptographic Cheap Talk.mp4 34.4 MB
TheIACR/Crypto 2013/New Techniques for SPHFs and Efficient One-Round PAKE Pr ....mp4 55.9 MB
TheIACR/Crypto 2013/Non-malleable Codes from Two-Source Extractors.mp4 61 MB
TheIACR/Crypto 2013/On Fair Exchange, Fair Coins and Fair Sampling - YouTube.mp4 42.1 MB
TheIACR/Crypto 2013/On the Achievability of Simulation-Based Security for Fu ....mp4 66.2 MB
TheIACR/Crypto 2013/On the Indifferentiability of Key-Alternating Ciphers.mp4 80.4 MB
TheIACR/Crypto 2013/Optimal Coding for Streaming Authentication and Interact ....mp4 26.1 MB
TheIACR/Crypto 2013/Plain versus Randomized Cascading-Based Key-Length Exten ....mp4 42.3 MB
TheIACR/Crypto 2013/Practical Bootstrapping in Quasilinear Time.mp4 72.7 MB
TheIACR/Crypto 2013/Practical Multilinear Maps over the Integers.mp4 69.5 MB
TheIACR/Crypto 2013/Programmable Hash Functions in the Multilinear Setting.mp4 48.1 MB
TheIACR/Crypto 2013/Quantum One-Time Programs - (Extended Abstract).mp4 40.1 MB
TheIACR/Crypto 2013/Real Time Cryptanalysis of Bluetooth Encryption with Con ....mp4 75.8 MB
TheIACR/Crypto 2013/SNARKs for C Verifying Program Executions Succinctly an ....mp4 73.9 MB
TheIACR/Crypto 2013/Secret Sharing, Rank Inequalities and Information Inequa ....mp4 75.5 MB
TheIACR/Crypto 2013/Secure Computation against Adaptive Auxiliary Information.mp4 59.5 MB
TheIACR/Crypto 2013/Secure Signatures and Chosen Ciphertext Security in a Qu ....mp4 46.6 MB
TheIACR/Crypto 2013/Sieve-in-the-Middle Improved MITM Attacks.mp4 70 MB
TheIACR/Crypto 2013/The Mix-and-Cut Shuffle Small-Domain Encryption Secure ....mp4 64.3 MB
TheIACR/Crypto 2013/Time-Optimal Interactive Proofs for Circuit Evaluation.mp4 78.6 MB
TheIACR/Crypto 2013/What Information Is Leaked under Concurrent Composition.mp4 60.4 MB
TheIACR/Crypto 2014/Algorithms in HElib.mp4 12.5 MB
TheIACR/Crypto 2014/Amplifying Privacy in Privacy Amplification.mp4 12.8 MB
TheIACR/Crypto 2014/Automated Analysis of Cryptographic Assumptions in Generic Group Models.mp4 14.6 MB
TheIACR/Crypto 2014/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).mp4 13.8 MB
TheIACR/Crypto 2014/Breaking '128-bit Secure' Supersingular Binary Curves.mp4 13.2 MB
TheIACR/Crypto 2014/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.mp4 10.8 MB
TheIACR/Crypto 2014/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.mp4 23.3 MB
TheIACR/Crypto 2014/Cryptography from Compression Functions The UCE Bridge to the ROM.mp4 23.7 MB
TheIACR/Crypto 2014/Cryptography with Streaming Algorithms.mp4 12.4 MB
TheIACR/Crypto 2014/Dishonest Majority Multi-Party Computation for Binary Circuits.mp4 13 MB
TheIACR/Crypto 2014/Faster Bootstrapping with Polynomial Error.mp4 13.4 MB
TheIACR/Crypto 2014/FleXOR Flexible garbling for XOR gates that beats free-XOR.mp4 11.8 MB
TheIACR/Crypto 2014/Hardness of k-LWE and Applications in Traitor Tracing.mp4 16 MB
TheIACR/Crypto 2014/Hierarchical Identity Based Encryption from Affine Messafe Authentication.mp4 12.3 MB
TheIACR/Crypto 2014/Homomorphic Signatures with Efficient Verification for Polynomial Functions.mp4 16.1 MB
TheIACR/Crypto 2014/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.mp4 12.3 MB
TheIACR/Crypto 2014/How to Use Bitcoin to Design Fair Protocols.mp4 23.7 MB
TheIACR/Crypto 2014/IACR Distinguished Lecture Caught in Between Theory and Practice.mp4 125.3 MB
TheIACR/Crypto 2014/Improved Generic Attacks against Hash-Based MACs and HAIFA.mp4 20.4 MB
TheIACR/Crypto 2014/Improved Short Lattice Signatures in the Standard Model.mp4 14.1 MB
TheIACR/Crypto 2014/Indistinguishability Obfuscation and UCEs The Case of Computationally Unpredictable Sources.mp4 24 MB
TheIACR/Crypto 2014/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.mp4 9.4 MB
TheIACR/Crypto 2014/Interactive Proofs under Continual Memory Leakage.mp4 29.1 MB
TheIACR/Crypto 2014/Invited Talk How to delegate computations the power of no-signaling proofs.mp4 32.1 MB
TheIACR/Crypto 2014/Leakage-Tolerant Computation with Input-Independent Preprocessing.mp4 13.9 MB
TheIACR/Crypto 2014/Low Overhead Broadcast Encryption from Multilinear Maps.mp4 25.8 MB
TheIACR/Crypto 2014/Maliciously Circuit-Private FHE.mp4 12.1 MB
TheIACR/Crypto 2014/Memento How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.mp4 14.4 MB
TheIACR/Crypto 2014/Minimizing the Two-Round Even-Mansour Cipher.mp4 18.9 MB
TheIACR/Crypto 2014/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.mp4 8 MB
TheIACR/Crypto 2014/New and Improved Key-Homomorphic Pseudorandom Functions.mp4 27.7 MB
TheIACR/Crypto 2014/Non-Interactive Secure Multiparty Computation.mp4 13.8 MB
TheIACR/Crypto 2014/On Virtual Grey Box Obfuscation for General Circuits.mp4 12.5 MB
TheIACR/Crypto 2014/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with ....mp4 12 MB
TheIACR/Crypto 2014/Optimal Non-perfect Uniform Secret Sharing Schemes.mp4 12.5 MB
TheIACR/Crypto 2014/Physical Zero-Knowledge Proofs of Physical Properties.mp4 13.8 MB
TheIACR/Crypto 2014/Polynomial Spaces A New Framework for Composite-to-Prime-Order Transformations.mp4 28.1 MB
TheIACR/Crypto 2014/Proving the TLS Handshake Secure (As It Is).mp4 13.6 MB
TheIACR/Crypto 2014/Quantum Position Verification in the Random Oracle Model.mp4 11.9 MB
TheIACR/Crypto 2014/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.mp4 21.1 MB
TheIACR/Crypto 2014/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.mp4 10.8 MB
TheIACR/Crypto 2014/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.mp4 13.5 MB
TheIACR/Crypto 2014/Scalable Zero Knowledge via Cycles of Elliptic Curves.mp4 13.7 MB
TheIACR/Crypto 2014/Secure Multi-Party Computation with Identifiable Abort.mp4 22.3 MB
TheIACR/Crypto 2014/Security Analysis of Multilinear Maps over the Integers.mp4 25.3 MB
TheIACR/Crypto 2014/Security of Symmetric Encryption against Mass Surveillance.mp4 36.2 MB
TheIACR/Crypto 2014/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.mp4 11.4 MB
TheIACR/Crypto 2014/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.mp4 13.4 MB
TheIACR/Crypto 2014/Structure-Preserving Signatures from Type II Pairings.mp4 14.3 MB
TheIACR/Crypto 2014/The Exact PRF-Security of NMAC and HMAC.mp4 25.3 MB
TheIACR/Crypto 2014/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.mp4 13.2 MB
TheIACR/Crypto 2014/The Security of Multiple Encryption in the Ideal Cipher Model.mp4 13.9 MB
TheIACR/Crypto 2014/Updates on Generic Attacks against HMAC and NMAC.mp4 23.6 MB
TheIACR/Crypto 2015/A Punctured Programming Approach to Adaptive Security in Functional Encryption.mp4 13.4 MB
TheIACR/Crypto 2015/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.mp4 22.6 MB
TheIACR/Crypto 2015/Algebriac Decomposition for Probing Security.mp4 20.6 MB
TheIACR/Crypto 2015/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.mp4 25.4 MB
TheIACR/Crypto 2015/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.mp4 11.9 MB
TheIACR/Crypto 2015/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.mp4 14.3 MB
TheIACR/Crypto 2015/Arguments of Proximity.mp4 14.9 MB
TheIACR/Crypto 2015/Bilinear Entropy Expansion from the Decisional Linear Assumption.mp4 11 MB
TheIACR/Crypto 2015/Bit Commitment schemes with Non Signaling Adversaries.mp4 11.8 MB
TheIACR/Crypto 2015/Bloom Filters in Adversarial Environments.mp4 15 MB
TheIACR/Crypto 2015/Capacity and Data Complexity in Multidimensional Linear Attack.mp4 39.5 MB
TheIACR/Crypto 2015/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.mp4 11.9 MB
TheIACR/Crypto 2015/Concurrent Secure Computation via Non Black Box Simulation.mp4 19.3 MB
TheIACR/Crypto 2015/Concurrent Secure Computation with Optimal Query Complexity.mp4 23.5 MB
TheIACR/Crypto 2015/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.mp4 17.6 MB
TheIACR/Crypto 2015/Constant Round MPC with Fairness and Guarantee of Output Delivery.mp4 18.3 MB
TheIACR/Crypto 2015/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.mp4 26 MB
TheIACR/Crypto 2015/Cryptanalysis of the Co ACD Assumption.mp4 15.9 MB
TheIACR/Crypto 2015/Cryptography with One Way Communication.mp4 13.1 MB
TheIACR/Crypto 2015/Cryptography, Security, and Public Safety A Policy Perspective.mp4 26 MB
TheIACR/Crypto 2015/Data Is a Stream Security of Stream Based Channels.mp4 20.5 MB
TheIACR/Crypto 2015/Decaf Eliminating Cofactors Through Quotients and Isogenies.mp4 18.1 MB
TheIACR/Crypto 2015/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.mp4 17.2 MB
TheIACR/Crypto 2015/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.mp4 21.3 MB
TheIACR/Crypto 2015/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.mp4 14.9 MB
TheIACR/Crypto 2015/Efficient Pseudorandom Functions via On the Fly Adaptation.mp4 12.7 MB
TheIACR/Crypto 2015/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.mp4 13.1 MB
TheIACR/Crypto 2015/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.mp4 14 MB
TheIACR/Crypto 2015/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.mp4 19.8 MB
TheIACR/Crypto 2015/From Selective to Adaptive Security in Functional Encryption.mp4 17.1 MB
TheIACR/Crypto 2015/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.mp4 13.5 MB
TheIACR/Crypto 2015/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.mp4 17.2 MB
TheIACR/Crypto 2015/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.mp4 16.8 MB
TheIACR/Crypto 2015/Indistinguishability Obfuscation from Compact Functional Encryption.mp4 14.6 MB
TheIACR/Crypto 2015/Integral Cryptanalysis on Full MISTY1.mp4 20 MB
TheIACR/Crypto 2015/Known key Distinguisher on Full PRESENT.mp4 14.8 MB
TheIACR/Crypto 2015/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.mp4 16.3 MB
TheIACR/Crypto 2015/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.mp4 13.7 MB
TheIACR/Crypto 2015/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.mp4 16 MB
TheIACR/Crypto 2015/Malicious for free OT Extension The Pipe is the Limit.mp4 17.3 MB
TheIACR/Crypto 2015/Multi Identity and Multi Key Leveled FHE from Learning with Errors.mp4 28.5 MB
TheIACR/Crypto 2015/Multi Key Security The Even Mansour Construction Revisted.mp4 13.7 MB
TheIACR/Crypto 2015/New Attacks on Feistel Structures with Improved Memory Complexities.mp4 36.1 MB
TheIACR/Crypto 2015/Observations on the SIMON Block Cipher Family.mp4 12.5 MB
TheIACR/Crypto 2015/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.mp4 21.8 MB
TheIACR/Crypto 2015/Parallel Hashing via List Recoverability.mp4 13.4 MB
TheIACR/Crypto 2015/PoW Based Distributed Cryptography with no Trusted Setup.mp4 19.9 MB
TheIACR/Crypto 2015/Practical Free Start Collision Attacks on the 76 Step SHA 1.mp4 18 MB
TheIACR/Crypto 2015/Practical Round Optimal Blind Signatures in the Standard Model.mp4 13 MB
TheIACR/Crypto 2015/Predicate Encryption for Circuits from LWE.mp4 14.5 MB
TheIACR/Crypto 2015/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.mp4 18.9 MB
TheIACR/Crypto 2015/Proofs of Space.mp4 15.9 MB
TheIACR/Crypto 2015/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.mp4 16.8 MB
TheIACR/Crypto 2015/Secure Computation from Leaky Correlated Randomness.mp4 15.1 MB
TheIACR/Crypto 2015/Secure Computation with Minimal Interaction, Revisited.mp4 23.8 MB
TheIACR/Crypto 2015/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.mp4 23.1 MB
TheIACR/Crypto 2015/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.mp4 16.7 MB
TheIACR/Crypto 2015/The Iterated Random Permutation Problem with Applications to Cascade Encryption.mp4 14.1 MB
TheIACR/Crypto 2015/The State of Cryptographic Multilinear Maps.mp4 37.8 MB
TheIACR/Crypto 2015/Tweaking Even Mansour Ciphers.mp4 17.2 MB
TheIACR/Crypto 2015/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.mp4 17 MB
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump Session Part 1.mp4 333.3 MB
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump session part 2..mp4 360.3 MB
TheIACR/Crypto 2016 Rump Session/Crypto 2016 Rump session part 3..mp4 155.1 MB
TheIACR/Crypto 2016/A 2^70 Attack on the Full MISTY1.mp4 72.9 MB
TheIACR/Crypto 2016/A Practical Cryptanalysis of the Algebraic Eraser.mp4 107.5 MB
TheIACR/Crypto 2016/A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded En.mp4 78.6 MB
TheIACR/Crypto 2016/Adaptively Secure Garbled Circuits from One Way Functions.mp4 128.9 MB
TheIACR/Crypto 2016/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.mp4 43.1 MB
TheIACR/Crypto 2016/Akamai Faster Forward Crypto at Scale.mp4 103.2 MB
TheIACR/Crypto 2016/Annihilation Attacks for Multilinear Maps Cryptanalysis of Indistinguishability Obfuscation over GG.mp4 156.3 MB
TheIACR/Crypto 2016/Another View of the Division Property.mp4 50.9 MB
TheIACR/Crypto 2016/Automatic Search of Meet in the Middle and Impossible Differential Attacks.mp4 80.6 MB
TheIACR/Crypto 2016/Backdoors in Pseudorandom Number Generators Possibility and Impossibility Results.mp4 116 MB
TheIACR/Crypto 2016/Big Key Symmetric Encryption Resisting Key Exfiltration.mp4 55.7 MB
TheIACR/Crypto 2016/Bounded Indistinguishability and the Complexity of Recovering Secrets.mp4 151.7 MB
TheIACR/Crypto 2016/Breaking Symmetric Cryptosystems using Quantum Period Finding.mp4 145.5 MB
TheIACR/Crypto 2016/Breaking the Circuit Size Barrier for Secure Computation Under DDH.mp4 114.6 MB
TheIACR/Crypto 2016/Concurrent Non Malleable Commitments and More in 3 Rounds.mp4 118.3 MB
TheIACR/Crypto 2016/Counter in Tweak Authenticated Encryption Modes for Tweakable Block Ciphers.mp4 159.6 MB
TheIACR/Crypto 2016/Cryptanalysis of GGH15 Multilinear Maps.mp4 176.8 MB
TheIACR/Crypto 2016/Cryptanalysis of a Theorem Decomposing the Only Known Solution to the Big APN Problem.mp4 105.1 MB
TheIACR/Crypto 2016/Cryptanalysis of the FLIP Family of Stream Ciphers.mp4 25.5 MB
TheIACR/Crypto 2016/Crypto 2016 Rump Session Part 1.mp4 333.3 MB
TheIACR/Crypto 2016/Crypto 2016 Rump session part 2..mp4 360.3 MB
TheIACR/Crypto 2016/Crypto 2016 Rump session part 3..mp4 155.1 MB
TheIACR/Crypto 2016/Design in Type I, Run in Type III Fast and Scalable Bilinear Type Conversion using Integer Programm.mp4 158.1 MB
TheIACR/Crypto 2016/EWCDM An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.mp4 160.7 MB
TheIACR/Crypto 2016/Efficient Algorithms for Supersingular Isogeny Diffie Hellman.mp4 95.7 MB
TheIACR/Crypto 2016/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.mp4 125.4 MB
TheIACR/Crypto 2016/Efficiently Computing Data Independent Memory Hard Functions.mp4 113.2 MB
TheIACR/Crypto 2016/Encryption Switching Protocols.mp4 111.9 MB
TheIACR/Crypto 2016/Extended Tower Number Field Sieve A New Complexity for the Medium Prime Case.mp4 165 MB
TheIACR/Crypto 2016/FHE Circuit Privacy Almost For Free.mp4 94.5 MB
TheIACR/Crypto 2016/Fine grained Cryptography.mp4 124 MB
TheIACR/Crypto 2016/How to Prove Knowledge of Small Secrets.mp4 157.7 MB
TheIACR/Crypto 2016/Indifferentiability of 8 Round Feistel Networks.mp4 143.4 MB
TheIACR/Crypto 2016/Key Wrapping for Cryptographic APIs.mp4 180.5 MB
TheIACR/Crypto 2016/Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.mp4 104.6 MB
TheIACR/Crypto 2016/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.mp4 79.8 MB
TheIACR/Crypto 2016/Lightweight Multiplication in GF2n with Applications to MDS Matrices.mp4 124.5 MB
TheIACR/Crypto 2016/Linicrypt A Model for Practical Cryptography.mp4 157.3 MB
TheIACR/Crypto 2016/Memory Efficient Algorithms for Finding Needles in Haystacks.mp4 98.8 MB
TheIACR/Crypto 2016/Network Hiding Communication and Applications to Multi Party Protocols.mp4 129.2 MB
TheIACR/Crypto 2016/Network Oblivious Transfer.mp4 149 MB
TheIACR/Crypto 2016/New Insights on AES Like SPN Ciphers.mp4 39.1 MB
TheIACR/Crypto 2016/Obfuscation Combiners.mp4 145.1 MB
TheIACR/Crypto 2016/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4 305.4 MB
TheIACR/Crypto 2016/On the Communication required for Unconditionally Secure Multiplication.mp4 153.2 MB
TheIACR/Crypto 2016/On the Power of Secure Two Party Computation.mp4 160.5 MB
TheIACR/Crypto 2016/On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings - YouTube.mp4 153 MB
TheIACR/Crypto 2016/Optimal Security Proofs for Signatures from Identification Schemes.mp4 130 MB
TheIACR/Crypto 2016/ParTI Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.mp4 33.3 MB
TheIACR/Crypto 2016/Probabilistic Termination and Composability of Cryptographic Protocols.mp4 178.2 MB
TheIACR/Crypto 2016/Programmable Hash Functions from Lattices.mp4 174.7 MB
TheIACR/Crypto 2016/Quantum Homomorphic Encryption for Polynomial sized Circuits.mp4 147.4 MB
TheIACR/Crypto 2016/Rate 1, Linear Time and Additively Homomorphic UC Commitments.mp4 158.1 MB
TheIACR/Crypto 2016/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.mp4 210.6 MB
TheIACR/Crypto 2016/Secure Protocol Transformations.mp4 91.5 MB
TheIACR/Crypto 2016/Semantic Security and Indistinguishability in the Quantum World.mp4 170.6 MB
TheIACR/Crypto 2016/Separate Separations of CPA and Circular Security for Any Cycle Length.mp4 144.8 MB
TheIACR/Crypto 2016/TWORAM Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.mp4 173.3 MB
TheIACR/Crypto 2016/The Magic of ELFs.mp4 125.9 MB
TheIACR/Crypto 2016/The Multi User Security of Authenticated Encryption AES GCM in TLS 1 3.mp4 110.8 MB
TheIACR/Crypto 2016/Towards Sound Fresh Re Keying with Hard Physical Learning Problems.mp4 87.5 MB
TheIACR/Crypto 2016/Two Message Oblivious Evaluation of Cryptographic Functionalities.mp4 159.6 MB
TheIACR/Crypto 2016/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.mp4 163.4 MB
TheIACR/Crypto 2016/Universal Obfuscation and Witness Encryption Boosting Correctness and Combining Security.mp4 171.7 MB
TheIACR/Crypto 2016/XPX Generalized Tweakable Even Mansour with Improved Security Guarantees.mp4 117.4 MB
TheIACR/Crypto 2017 Rump Session/Blockchains and consensus protocols Snake oil warning.mp4 8.9 MB
TheIACR/Crypto 2017 Rump Session/Browser Security with a Grain of Salt.mp4 6.9 MB
TheIACR/Crypto 2017 Rump Session/Constraint Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.mp4 16.1 MB
TheIACR/Crypto 2017 Rump Session/Delegatable Anonymous Credentials from Mercurial Signatures.mp4 15.5 MB
TheIACR/Crypto 2017 Rump Session/Forty years and still running.mp4 15 MB
TheIACR/Crypto 2017 Rump Session/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.mp4 10.4 MB
TheIACR/Crypto 2017 Rump Session/How not to pay with Bitcoin.mp4 13.5 MB
TheIACR/Crypto 2017 Rump Session/IACR Award Ceremony.mp4 33 MB
TheIACR/Crypto 2017 Rump Session/Implementing Provably Secure Detection of Direct Injection Attacks.mp4 18.2 MB
TheIACR/Crypto 2017 Rump Session/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.mp4 3.7 MB
TheIACR/Crypto 2017 Rump Session/Learning the One Time Pad algorithm with Chosen Plaintext Attack Adversarial Neural Cryptography.mp4 3.2 MB
TheIACR/Crypto 2017 Rump Session/Lockable Obfuscation.mp4 20 MB
TheIACR/Crypto 2017 Rump Session/Magallanes.mp4 15.4 MB
TheIACR/Crypto 2017 Rump Session/Make Crypto Not Maps!.mp4 11.3 MB
TheIACR/Crypto 2017 Rump Session/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.mp4 21.9 MB
TheIACR/Crypto 2017 Rump Session/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.mp4 18.7 MB
TheIACR/Crypto 2017 Rump Session/Notes on ``Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.mp4 12.9 MB
TheIACR/Crypto 2017 Rump Session/Program Chair's Report by Jonathan Katz.mp4 8.5 MB
TheIACR/Crypto 2017 Rump Session/Proofs of Work for Blockchain Protocols.mp4 3.5 MB
TheIACR/Crypto 2017 Rump Session/Quantum Computing Threat or Menace.mp4 4.2 MB
TheIACR/Crypto 2017 Rump Session/Real world zkSNARKs updates on Zcash, libsnark.mp4 10 MB
TheIACR/Crypto 2017 Rump Session/Report from ECC 2017.mp4 4.6 MB
TheIACR/Crypto 2017 Rump Session/Security and Composition of Rational Cryptographic Protocols.mp4 12.2 MB
TheIACR/Crypto 2017 Rump Session/Self Correcting Random Oracles and Its Cliptographic Applications.mp4 8 MB
TheIACR/Crypto 2017 Rump Session/Separable Statistics, New Extension to Linear Cryptanalysis.mp4 5.3 MB
TheIACR/Crypto 2017 Rump Session/Test of Time Award for the best Rump Session Presentation!.mp4 17.3 MB
TheIACR/Crypto 2017 Rump Session/The JMAC MAC.mp4 6.3 MB
TheIACR/Crypto 2017 Rump Session/The Sound of Quantum.mp4 4.9 MB
TheIACR/Crypto 2017 Rump Session/The early history of blockchains.mp4 7.1 MB
TheIACR/Crypto 2017 Rump Session/Top secret! A world of codes and ciphers an exhibition.mp4 3.2 MB
TheIACR/Crypto 2017/A Formal Treatment of Multi key Channels - YouTube.mp4 62.9 MB
TheIACR/Crypto 2017/A New Approach to Round Optimal Secure Multiparty Computation.mp4 27 MB
TheIACR/Crypto 2017/A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.mp4 86.2 MB
TheIACR/Crypto 2017/Amortization with Fewer Equations for Proving Knowledge of Small Secrets.mp4 58.2 MB
TheIACR/Crypto 2017/Anonymous Attestation with Subverted TPMs.mp4 85.6 MB
TheIACR/Crypto 2017/Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.mp4 103.9 MB
TheIACR/Crypto 2017/Be Adaptive, Avoid Overcommitting.mp4 75.6 MB
TheIACR/Crypto 2017/Bitcoin as a Transaction Ledger A Composable Treatment.mp4 24.8 MB
TheIACR/Crypto 2017/Black Box Parallel Garbled RAM.mp4 66 MB
TheIACR/Crypto 2017/Boosting Authenticated Encryption Robustness With Minimal Modifications.mp4 156.9 MB
TheIACR/Crypto 2017/Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.mp4 37.1 MB
TheIACR/Crypto 2017/Compact Structure Preserving Signatures with Almost Tight Security - YouTube.mp4 109.2 MB
TheIACR/Crypto 2017/Conditional Disclosure of Secrets Amplification, Closure, Amortization, Lower bounds, and Separatio.mp4 98.3 MB
TheIACR/Crypto 2017/Conditional Disclosure of Secrets via Non Linear Reconstruction.mp4 83.2 MB
TheIACR/Crypto 2017/Cube Attacks on Non Blackbox Polynomials Based on Division Property.mp4 98.2 MB
TheIACR/Crypto 2017/Degree Evaluation of NFSR Based Cryptosystems.mp4 64.5 MB
TheIACR/Crypto 2017/Distinguisher Dependent Simulation in Two Rounds and Its Applications.mp4 81.3 MB
TheIACR/Crypto 2017/Encrypted Davies Meyer and Its Dual Towards Optimal Security Using Mirror Theory.mp4 88.4 MB
TheIACR/Crypto 2017/Encryption switching protocols revisited switching modulo p.mp4 34.4 MB
TheIACR/Crypto 2017/Fast Secure Two Party ECDSA Signing.mp4 141.2 MB
TheIACR/Crypto 2017/Four Round Concurrent Non Malleable Commitments from One Way Functions.mp4 103.4 MB
TheIACR/Crypto 2017/From Obfuscation to the Security of Fiat Shamir for Proofs.mp4 161.8 MB
TheIACR/Crypto 2017/Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners.mp4 90.6 MB
TheIACR/Crypto 2017/Gaussian Sampling over the Integers Efficient, Generic, Constant Time.mp4 135.7 MB
TheIACR/Crypto 2017/Generic Transformations of Predicate Encodings Constructions and Applications.mp4 68.7 MB
TheIACR/Crypto 2017/Hedging Public Key Encryption in the Real World.mp4 24.7 MB
TheIACR/Crypto 2017/Identity Based Encryption from the Diffie Hellman Assumption.mp4 31.7 MB
TheIACR/Crypto 2017/Identity based Encryption from Codes with Rank Metric.mp4 68.7 MB
TheIACR/Crypto 2017/Incremental Program Obfuscation.mp4 93.5 MB
TheIACR/Crypto 2017/Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.mp4 68.8 MB
TheIACR/Crypto 2017/Indistinguishability Obfuscation for Turing Machines Constant Overhead and Amortization.mp4 120.8 MB
TheIACR/Crypto 2017/Information theoretic Indistinguishability via the Chi squared Method.mp4 144.1 MB
TheIACR/Crypto 2017/Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.mp4 151.3 MB
TheIACR/Crypto 2017/Joint presentation.mp4 93.1 MB
TheIACR/Crypto 2017/Key Rotation for Authenticated Encryption.mp4 86.1 MB
TheIACR/Crypto 2017/Kurosawa Desmedt Meets Tight Security.mp4 81.7 MB
TheIACR/Crypto 2017/LPN Decoded.mp4 74.3 MB
TheIACR/Crypto 2017/Laconic Oblivious Transfer and its Applications.mp4 90.4 MB
TheIACR/Crypto 2017/Lower Bounds on Obfuscation from All or Nothing Encryption.mp4 54 MB
TheIACR/Crypto 2017/Memory Tight Reductions.mp4 68.8 MB
TheIACR/Crypto 2017/Message Franking via Committing Authenticated Encryption.mp4 104.8 MB
TheIACR/Crypto 2017/Middle Product Learning With Errors.mp4 61.7 MB
TheIACR/Crypto 2017/New security notions and feasibility results for authentication of quantum data.mp4 71.6 MB
TheIACR/Crypto 2017/Non Full Sbox Linearization Applications to Collision Attacks on Round Reduced Keccak.mp4 79.7 MB
TheIACR/Crypto 2017/Non Malleable Codes for Space Bounded Tampering.mp4 75.9 MB
TheIACR/Crypto 2017/Optimal Security Reductions for Unique Signatures Bypassing Impossibilities with A Counterexample.mp4 161.8 MB
TheIACR/Crypto 2017/Ouroboros A Provably Secure Proof of Stake Protocol.mp4 42.6 MB
TheIACR/Crypto 2017/PRF ODH Relations, Instantiations, and Impossibility Results.mp4 67.1 MB
TheIACR/Crypto 2017/Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.mp4 26.1 MB
TheIACR/Crypto 2017/Privacy Free Garbled Circuits for Formulas Size Zero and Information Theoretic.mp4 18.6 MB
TheIACR/Crypto 2017/Private Multiplication over Finite Fields.mp4 70.6 MB
TheIACR/Crypto 2017/Prospects for a Quantum Factoring Machine.mp4 235.4 MB
TheIACR/Crypto 2017/Proving Resistance against Invariant Attacks How to Choose the Round Constants.mp4 114.6 MB
TheIACR/Crypto 2017/Quantum Security of NMAC and Related Constructions.mp4 161 MB
TheIACR/Crypto 2017/Quantum non malleability and authentication.mp4 99.2 MB
TheIACR/Crypto 2017/Ratcheted Encryption and Key Exchange The Security of Messaging.mp4 78.7 MB
TheIACR/Crypto 2017/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.mp4 62.9 MB
TheIACR/Crypto 2017/Secure Computation based on Leaky Correlations High Resilience Setting.mp4 58.7 MB
TheIACR/Crypto 2017/Snarky Signatures Minimal Signatures of Knowledge from Simulation Extractable SNARKs.mp4 117.4 MB
TheIACR/Crypto 2017/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.mp4 64.6 MB
TheIACR/Crypto 2017/Structure vs Hardness through the Obfuscation Lens.mp4 88.4 MB
TheIACR/Crypto 2017/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.mp4 41.4 MB
TheIACR/Crypto 2017/The Price of Low Communication in Secure Multi Party Computation.mp4 77.4 MB
TheIACR/Crypto 2017/The TinyTable protocol or Gate scrambling Revisited.mp4 21.1 MB
TheIACR/Crypto 2017/The first collision for full SHA 1.mp4 39.4 MB
TheIACR/Crypto 2017/Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.mp4 155.7 MB
TheIACR/Crypto 2017/Topology Hiding Computation on All Graphs.mp4 67.5 MB
TheIACR/Crypto 2017/Two papers on Indistinguishability Obfuscation (soft merge).mp4 85.6 MB
TheIACR/Crypto 2017/Verified Drop in Replacements for TLS&HTTPS.mp4 66.4 MB
TheIACR/Crypto 2017/Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.mp4 88.8 MB
TheIACR/Crypto 2017/ZMAC A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.mp4 37.1 MB
TheIACR/Crypto 2018 Rump Session/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.en.transcribed.srt 6 KB
TheIACR/Crypto 2018 Rump Session/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.mp4 4.6 MB
TheIACR/Crypto 2018 Rump Session/A small problem Regarding permutations.mp4 5.9 MB
TheIACR/Crypto 2018 Rump Session/Account Management and Stake Pools in Proof of Stake Ledgers.en.transcribed.srt 11 KB
TheIACR/Crypto 2018 Rump Session/Account Management and Stake Pools in Proof of Stake Ledgers.mp4 10.5 MB
TheIACR/Crypto 2018 Rump Session/Adversarial Correctness Favors Laziness.mp4 6.9 MB
TheIACR/Crypto 2018 Rump Session/Attestation as a Service (AaaS).en.transcribed.srt 21 KB
TheIACR/Crypto 2018 Rump Session/Attestation as a Service (AaaS).mp4 21.2 MB
TheIACR/Crypto 2018 Rump Session/Blockchain and the Identity Problem.en.transcribed.srt 4 KB
TheIACR/Crypto 2018 Rump Session/Blockchain and the Identity Problem.mp4 6.8 MB
TheIACR/Crypto 2018 Rump Session/Blockchain!.en.transcribed.srt 6 KB
TheIACR/Crypto 2018 Rump Session/Blockchain!.mp4 11 MB
TheIACR/Crypto 2018 Rump Session/Bodka Not V, But B.en.transcribed.srt 6 KB
TheIACR/Crypto 2018 Rump Session/Bodka Not V, But B.mp4 7.7 MB
TheIACR/Crypto 2018 Rump Session/Computational Ring LWR problem.mp4 5.1 MB
TheIACR/Crypto 2018 Rump Session/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.en.transcribed.srt 5 KB
TheIACR/Crypto 2018 Rump Session/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.mp4 6.5 MB
TheIACR/Crypto 2018 Rump Session/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.en.transcribed.srt 12 KB
TheIACR/Crypto 2018 Rump Session/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.mp4 15 MB
TheIACR/Crypto 2018 Rump Session/How to Mimic Nakamoto's Design via Proof of stake and more.en.transcribed.srt 11 KB
TheIACR/Crypto 2018 Rump Session/How to Mimic Nakamoto's Design via Proof of stake and more.mp4 11.5 MB
TheIACR/Crypto 2018 Rump Session/IACR Award Ceremony.en.transcribed.srt 44 KB
TheIACR/Crypto 2018 Rump Session/IACR Award Ceremony.mp4 126.9 MB
TheIACR/Crypto 2018 Rump Session/In memory attacks at crypto currency wallets.en.transcribed.srt 8 KB
TheIACR/Crypto 2018 Rump Session/In memory attacks at crypto currency wallets.mp4 7.1 MB
TheIACR/Crypto 2018 Rump Session/Kahn Ni Melm - John Steinbeck's Secret Language.en.transcribed.srt 19 KB
TheIACR/Crypto 2018 Rump Session/Kahn Ni Melm - John Steinbeck's Secret Language.mp4 17 MB
TheIACR/Crypto 2018 Rump Session/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.mp4 12.8 MB
TheIACR/Crypto 2018 Rump Session/Laconic Function Evaluation.en.transcribed.srt 10 KB
TheIACR/Crypto 2018 Rump Session/Laconic Function Evaluation.mp4 9 MB
TheIACR/Crypto 2018 Rump Session/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.en.transcribed.srt 10 KB
TheIACR/Crypto 2018 Rump Session/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.mp4 11.8 MB
TheIACR/Crypto 2018 Rump Session/NIST Update.en.transcribed.srt 23 KB
TheIACR/Crypto 2018 Rump Session/NIST Update.mp4 18 MB
TheIACR/Crypto 2018 Rump Session/Obfuscation Using Tensor Products.en.transcribed.srt 12 KB
TheIACR/Crypto 2018 Rump Session/Obfuscation Using Tensor Products.mp4 17.6 MB
TheIACR/Crypto 2018 Rump Session/PQCzoo Post Quantum Beasts and Where to Find Them.en.transcribed.srt 5 KB
TheIACR/Crypto 2018 Rump Session/PQCzoo Post Quantum Beasts and Where to Find Them.mp4 4.6 MB
TheIACR/Crypto 2018 Rump Session/Prime and Prejudice Primality Testing Under Adversarial Conditions.en.transcribed.srt 12 KB
TheIACR/Crypto 2018 Rump Session/Prime and Prejudice Primality Testing Under Adversarial Conditions.mp4 12.4 MB
TheIACR/Crypto 2018 Rump Session/RISC V Foundation Security Standing Committee Call to action!!.en.transcribed.srt 7 KB
TheIACR/Crypto 2018 Rump Session/RISC V Foundation Security Standing Committee Call to action!!.mp4 6.8 MB
TheIACR/Crypto 2018 Rump Session/RSA-OAEP without Random Oracles, Featuring Eminem.en.transcribed.srt 15 KB
TheIACR/Crypto 2018 Rump Session/RSA-OAEP without Random Oracles, Featuring Eminem.mp4 11.1 MB
TheIACR/Crypto 2018 Rump Session/Robust Property Preserving Hashes.en.transcribed.srt 8 KB
TheIACR/Crypto 2018 Rump Session/Robust Property Preserving Hashes.mp4 7 MB
TheIACR/Crypto 2018 Rump Session/Secure MPC Laziness Leads to GOD.en.transcribed.srt 10 KB
TheIACR/Crypto 2018 Rump Session/Secure MPC Laziness Leads to GOD.mp4 9.7 MB
TheIACR/Crypto 2018 Rump Session/Setup Free SNARKs from Hidden Order Groups.en.transcribed.srt 9 KB
TheIACR/Crypto 2018 Rump Session/Setup Free SNARKs from Hidden Order Groups.mp4 9 MB
TheIACR/Crypto 2018 Rump Session/SoK A Consensus Taxonomy in the Blockchain Era.en.transcribed.srt 20 KB
TheIACR/Crypto 2018 Rump Session/SoK A Consensus Taxonomy in the Blockchain Era.mp4 16.4 MB
TheIACR/Crypto 2018 Rump Session/Stand up Crypto Comedy.en.transcribed.srt 8 KB
TheIACR/Crypto 2018 Rump Session/Stand up Crypto Comedy.mp4 9.8 MB
TheIACR/Crypto 2018 Rump Session/Statistical Ineffective Fault Attacks.mp4 5.5 MB
TheIACR/Crypto 2018 Rump Session/Surveillance from Brussels Privacy at UCSB CAM for fun.en.transcribed.srt 7 KB
TheIACR/Crypto 2018 Rump Session/Surveillance from Brussels Privacy at UCSB CAM for fun.mp4 9.5 MB
TheIACR/Crypto 2018 Rump Session/Synesthesia.en.transcribed.srt 10 KB
TheIACR/Crypto 2018 Rump Session/Synesthesia.mp4 9.6 MB
TheIACR/Crypto 2018 Rump Session/The CERES Project Campaign to Enhance Research Experience.en.transcribed.srt 7 KB
TheIACR/Crypto 2018 Rump Session/The CERES Project Campaign to Enhance Research Experience.mp4 6.4 MB
TheIACR/Crypto 2018 Rump Session/The Collector Gigabit True Random Number Generator Using Image Sensor Noise.en.transcribed.srt 7 KB
TheIACR/Crypto 2018 Rump Session/The Collector Gigabit True Random Number Generator Using Image Sensor Noise.mp4 7.6 MB
TheIACR/Crypto 2018 Rump Session/The Danish Crypto Choir Don't Worry, Be Happy!.en.transcribed.srt 5 KB
TheIACR/Crypto 2018 Rump Session/The Danish Crypto Choir Don't Worry, Be Happy!.mp4 24.8 MB
TheIACR/Crypto 2018 Rump Session/Theory of Cryptography Conference Test-of-Time Award Recipients.mp4 5.5 MB
TheIACR/Crypto 2018 Rump Session/Towards a general classification framework for cryptocurrency.mp4 21.7 MB
TheIACR/Crypto 2018 Rump Session/What does the SHARK say.en.transcribed.srt 12 KB
TheIACR/Crypto 2018 Rump Session/What does the SHARK say.mp4 18 MB
TheIACR/Crypto 2018 Rump Session/Zero Knowledge Standardization.en.transcribed.srt 6 KB
TheIACR/Crypto 2018 Rump Session/Zero Knowledge Standardization.mp4 5.8 MB
TheIACR/Crypto 2018 Rump Session/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.en.transcribed.srt 8 KB
TheIACR/Crypto 2018 Rump Session/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.mp4 8 MB
TheIACR/Crypto 2018/A Key recovery Attack on 855 round Trivium.en.transcribed.srt 19 KB
TheIACR/Crypto 2018/A Key recovery Attack on 855 round Trivium.mp4 17.9 MB
TheIACR/Crypto 2018/A New Public Key Cryptosystem via Mersenne Numbers.en.transcribed.srt 46 KB
TheIACR/Crypto 2018/A New Public Key Cryptosystem via Mersenne Numbers.mp4 47.7 MB
TheIACR/Crypto 2018/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.en.transcribed.srt 64 KB
TheIACR/Crypto 2018/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.mp4 66.3 MB
TheIACR/Crypto 2018/Amortized Complexity of Information Theoretically Secure MPC Revisted.en.transcribed.srt 55 KB
TheIACR/Crypto 2018/Amortized Complexity of Information Theoretically Secure MPC Revisted.mp4 71.6 MB
TheIACR/Crypto 2018/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.en.transcribed.srt 49 KB
TheIACR/Crypto 2018/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.mp4 62.5 MB
TheIACR/Crypto 2018/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.en.transcribed.srt 64 KB
TheIACR/Crypto 2018/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.mp4 76.1 MB
TheIACR/Crypto 2018/CAPA The Spirit of Beaver Against Physical Attacks.en.transcribed.srt 58 KB
TheIACR/Crypto 2018/CAPA The Spirit of Beaver Against Physical Attacks.mp4 119.6 MB
TheIACR/Crypto 2018/Combiners for Backdoored Random Oracles.en.transcribed.srt 43 KB
TheIACR/Crypto 2018/Combiners for Backdoored Random Oracles.mp4 37.9 MB
TheIACR/Crypto 2018/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.mp4 85.3 MB
TheIACR/Crypto 2018/Contrained PRFs for NC1 in Traditional Groups.en.transcribed.srt 58 KB
TheIACR/Crypto 2018/Contrained PRFs for NC1 in Traditional Groups.mp4 50.8 MB
TheIACR/Crypto 2018/Correcting Subverted Random Oracles.en.transcribed.srt 63 KB
TheIACR/Crypto 2018/Correcting Subverted Random Oracles.mp4 111.6 MB
TheIACR/Crypto 2018/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.mp4 80.9 MB
TheIACR/Crypto 2018/Cryptanalysis via Algebraic Spans.en.transcribed.srt 56 KB
TheIACR/Crypto 2018/Cryptanalysis via Algebraic Spans.mp4 98.1 MB
TheIACR/Crypto 2018/Crypto A Key Ingredient to Building Respectful Products.en.transcribed.srt 129 KB
TheIACR/Crypto 2018/Crypto A Key Ingredient to Building Respectful Products.mp4 165.4 MB
TheIACR/Crypto 2018/Dissection BKW.en.transcribed.srt 54 KB
TheIACR/Crypto 2018/Dissection BKW.mp4 55 MB
TheIACR/Crypto 2018/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.en.transcribed.srt 55 KB
TheIACR/Crypto 2018/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.mp4 52.1 MB
TheIACR/Crypto 2018/Fast Correlation Attack Revisted.en.transcribed.srt 45 KB
TheIACR/Crypto 2018/Fast Correlation Attack Revisted.mp4 37.2 MB
TheIACR/Crypto 2018/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.mp4 61.3 MB
TheIACR/Crypto 2018/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.en.transcribed.srt 60 KB
TheIACR/Crypto 2018/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.mp4 67.8 MB
TheIACR/Crypto 2018/Fast Large Scale Honest Majority MPC for Malicious Adversaries.en.transcribed.srt 60 KB
TheIACR/Crypto 2018/Fast Large Scale Honest Majority MPC for Malicious Adversaries.mp4 64.8 MB
TheIACR/Crypto 2018/Fast Message Franking From Invisible Salamanders to Encryptment.en.transcribed.srt 62 KB
TheIACR/Crypto 2018/Fast Message Franking From Invisible Salamanders to Encryptment.mp4 83.9 MB
TheIACR/Crypto 2018/Faster Homomorphic Linear Transformations in HElib.en.transcribed.srt 62 KB
TheIACR/Crypto 2018/Faster Homomorphic Linear Transformations in HElib.mp4 84.5 MB
TheIACR/Crypto 2018/From Idea to Impact, the Crypto Story What's Next.en.transcribed.srt 202 KB
TheIACR/Crypto 2018/From Idea to Impact, the Crypto Story What's Next.mp4 183.4 MB
TheIACR/Crypto 2018/From Laconic Zero Knowledge to Public Key Cryptography.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/From Laconic Zero Knowledge to Public Key Cryptography.mp4 71.9 MB
TheIACR/Crypto 2018/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.en.transcribed.srt 64 KB
TheIACR/Crypto 2018/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.mp4 53.2 MB
TheIACR/Crypto 2018/Generic Attacks Against Beyond Birthday Bound MACs.mp4 81.5 MB
TheIACR/Crypto 2018/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.en.transcribed.srt 82 KB
TheIACR/Crypto 2018/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.mp4 59 MB
TheIACR/Crypto 2018/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.en.transcribed.srt 34 KB
TheIACR/Crypto 2018/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.mp4 35.9 MB
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.986be025-7357-4c41-a308-671cf2fbedf2.part 94.5 MB
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.en.transcribed.srt 51 KB
TheIACR/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.mp4 17 MB
TheIACR/Crypto 2018/Indifferentiable Authenticated Encryption.en.transcribed.srt 47 KB
TheIACR/Crypto 2018/Indifferentiable Authenticated Encryption.mp4 48.1 MB
TheIACR/Crypto 2018/Lattice Based Zero Knowledge Arguments for Integer Relations.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/Lattice Based Zero Knowledge Arguments for Integer Relations.mp4 114.4 MB
TheIACR/Crypto 2018/Limits of Practical Sublinear Secure Computation.en.transcribed.srt 63 KB
TheIACR/Crypto 2018/Limits of Practical Sublinear Secure Computation.mp4 41.3 MB
TheIACR/Crypto 2018/Limits on the Power of Garbling Techniques for Public Key Encryption.en.transcribed.srt 59 KB
TheIACR/Crypto 2018/Limits on the Power of Garbling Techniques for Public Key Encryption.mp4 69.9 MB
TheIACR/Crypto 2018/Lower Bounds on Lattice Enumeration with Extreme Pruning.mp4 54.5 MB
TheIACR/Crypto 2018/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.en.transcribed.srt 54 KB
TheIACR/Crypto 2018/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.mp4 58.3 MB
TheIACR/Crypto 2018/Multi Theorem Preprocessing NIZKs from Lattices.en.transcribed.srt 69 KB
TheIACR/Crypto 2018/Multi Theorem Preprocessing NIZKs from Lattices.mp4 54.8 MB
TheIACR/Crypto 2018/Must the Communication Graph of MPC Protocols be an Expander.en.transcribed.srt 45 KB
TheIACR/Crypto 2018/Must the Communication Graph of MPC Protocols be an Expander.mp4 65.8 MB
TheIACR/Crypto 2018/Non Interactive Zero Knowledge Proofs for Composite Statements.en.transcribed.srt 56 KB
TheIACR/Crypto 2018/Non Interactive Zero Knowledge Proofs for Composite Statements.mp4 45.2 MB
TheIACR/Crypto 2018/Non Malleable Codes for Partial Functions with Manipulation Detection.en.transcribed.srt 54 KB
TheIACR/Crypto 2018/Non Malleable Codes for Partial Functions with Manipulation Detection.mp4 64.1 MB
TheIACR/Crypto 2018/Non Malleable Secret Sharing for General Access Structures.mp4 110.4 MB
TheIACR/Crypto 2018/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.en.transcribed.srt 53 KB
TheIACR/Crypto 2018/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.mp4 48.9 MB
TheIACR/Crypto 2018/On Distributional Collision Resistant Hashing.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/On Distributional Collision Resistant Hashing.mp4 65.3 MB
TheIACR/Crypto 2018/On Tightly Secure Non Interactive Key Exchange.en.transcribed.srt 55 KB
TheIACR/Crypto 2018/On Tightly Secure Non Interactive Key Exchange.mp4 98.5 MB
TheIACR/Crypto 2018/On the Complexity of Compressing Obfuscation.en.transcribed.srt 59 KB
TheIACR/Crypto 2018/On the Complexity of Compressing Obfuscation.mp4 71.6 MB
TheIACR/Crypto 2018/On the Exact Round Complexity of Secure Three Party Computation.en.transcribed.srt 62 KB
TheIACR/Crypto 2018/On the Exact Round Complexity of Secure Three Party Computation.mp4 50.5 MB
TheIACR/Crypto 2018/On the Local Leakage Resilience of Linear Secret Sharing Schemes.en.transcribed.srt 60 KB
TheIACR/Crypto 2018/On the Local Leakage Resilience of Linear Secret Sharing Schemes.mp4 55.9 MB
TheIACR/Crypto 2018/On the Round Complexity of OT Extension.en.transcribed.srt 56 KB
TheIACR/Crypto 2018/On the Round Complexity of OT Extension.mp4 58.8 MB
TheIACR/Crypto 2018/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.en.transcribed.srt 46 KB
TheIACR/Crypto 2018/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.mp4 91.8 MB
TheIACR/Crypto 2018/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.en.transcribed.srt 68 KB
TheIACR/Crypto 2018/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.mp4 53 MB
TheIACR/Crypto 2018/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.en.transcribed.srt 65 KB
TheIACR/Crypto 2018/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.mp4 35.3 MB
TheIACR/Crypto 2018/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.en.transcribed.srt 50 KB
TheIACR/Crypto 2018/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.mp4 89.4 MB
TheIACR/Crypto 2018/Private Circuits A Modular Approach.en.transcribed.srt 56 KB
TheIACR/Crypto 2018/Private Circuits A Modular Approach.mp4 51.5 MB
TheIACR/Crypto 2018/Promise Zero Knowledge and its Applications to Round Optimal MPC.mp4 27.9 MB
TheIACR/Crypto 2018/Proofs of Work from Worst Case Assumptions.en.transcribed.srt 62 KB
TheIACR/Crypto 2018/Proofs of Work from Worst Case Assumptions.mp4 68.6 MB
TheIACR/Crypto 2018/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.en.transcribed.srt 50 KB
TheIACR/Crypto 2018/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.mp4 33.2 MB
TheIACR/Crypto 2018/Pseudorandom Quantum States.en.transcribed.srt 49 KB
TheIACR/Crypto 2018/Pseudorandom Quantum States.mp4 59 MB
TheIACR/Crypto 2018/Quantum FHE Almost As Secure As Classical.en.transcribed.srt 80 KB
TheIACR/Crypto 2018/Quantum FHE Almost As Secure As Classical.mp4 67.6 MB
TheIACR/Crypto 2018/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.en.transcribed.srt 42 KB
TheIACR/Crypto 2018/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.mp4 45.6 MB
TheIACR/Crypto 2018/Round Optimal Secure Multi Party Computation.en.transcribed.srt 29 KB
TheIACR/Crypto 2018/Round Optimal Secure Multi Party Computation.mp4 37.4 MB
TheIACR/Crypto 2018/Round Optimal Secure Multiparty Computation with Honest Majority.en.transcribed.srt 49 KB
TheIACR/Crypto 2018/Round Optimal Secure Multiparty Computation with Honest Majority.mp4 41.3 MB
TheIACR/Crypto 2018/SPDZ2k Efficient MPC mod 2^k for Dishonest Majority.en.transcribed.srt 82 KB
TheIACR/Crypto 2018/SPDZ2k Efficient MPC mod 2^k for Dishonest Majority.mp4 68.4 MB
TheIACR/Crypto 2018/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.mp4 60.6 MB
TheIACR/Crypto 2018/Simplifying Game Based Definitions.en.transcribed.srt 47 KB
TheIACR/Crypto 2018/Simplifying Game Based Definitions.mp4 72.1 MB
TheIACR/Crypto 2018/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.en.transcribed.srt 54 KB
TheIACR/Crypto 2018/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.mp4 40.1 MB
TheIACR/Crypto 2018/The Algebraic Group Model and its Applications.mp4 57.9 MB
TheIACR/Crypto 2018/The Curse of Small Domains New Attacks on Format Preserving Encryption.en.transcribed.srt 42 KB
TheIACR/Crypto 2018/The Curse of Small Domains New Attacks on Format Preserving Encryption.mp4 91.5 MB
TheIACR/Crypto 2018/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.en.transcribed.srt 55 KB
TheIACR/Crypto 2018/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.mp4 26.7 MB
TheIACR/Crypto 2018/Tight Tradeoffs in Searchable Symmetric Encryption.en.transcribed.srt 24 KB
TheIACR/Crypto 2018/Tight Tradeoffs in Searchable Symmetric Encryption.mp4 32.4 MB
TheIACR/Crypto 2018/TinyKeys A New Approach to Efficient Multi Party Computation.en.transcribed.srt 56 KB
TheIACR/Crypto 2018/TinyKeys A New Approach to Efficient Multi Party Computation.mp4 84.1 MB
TheIACR/Crypto 2018/Towards Bidirectional Ratcheted Key Exchange.en.transcribed.srt 57 KB
TheIACR/Crypto 2018/Towards Bidirectional Ratcheted Key Exchange.mp4 95.6 MB
TheIACR/Crypto 2018/Trapdoor Functions from the Computational Diffie Hellman Assumption.en.transcribed.srt 50 KB
TheIACR/Crypto 2018/Trapdoor Functions from the Computational Diffie Hellman Assumption.mp4 30.2 MB
TheIACR/Crypto 2018/Two Round Multiparty Secure Computation Minimizing Public Key Operations.en.transcribed.srt 54 KB
TheIACR/Crypto 2018/Two Round Multiparty Secure Computation Minimizing Public Key Operations.mp4 97.3 MB
TheIACR/Crypto 2018/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.en.transcribed.srt 46 KB
TheIACR/Crypto 2018/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.mp4 53.9 MB
TheIACR/Crypto 2018/Verifiable Delay Functions.en.transcribed.srt 55 KB
TheIACR/Crypto 2018/Verifiable Delay Functions.mp4 43.8 MB
TheIACR/Crypto 2018/Yes, There is an Oblivious RAM Lower Bound!.mp4 56.9 MB
TheIACR/Crypto 2018/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.en.transcribed.srt 43 KB
TheIACR/Crypto 2018/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.mp4 37.1 MB
TheIACR/Eurocrypt 2012/A Tutorial on High Performance Computing Applied to Cryp ....mp4 36.1 MB
TheIACR/Eurocrypt 2012/Adaptively Attribute-Hiding (Hierarchical) Inner Product ....mp4 14 MB
TheIACR/Eurocrypt 2012/All-But-Many Lossy Trapdoor Functions..mp4 20.2 MB
TheIACR/Eurocrypt 2012/Another Look at Provable Security..mp4 71.7 MB
TheIACR/Eurocrypt 2012/Concurrently Secure Computation in Constant Rounds..mp4 12.4 MB
TheIACR/Eurocrypt 2012/Cover and Decomposition Index Calculus on Elliptic Curve ....mp4 32.8 MB
TheIACR/Eurocrypt 2012/Cryptanalyses on a Merkle-Damg&aring_rd Based MAC - Almo ....mp4 13.7 MB
TheIACR/Eurocrypt 2012/Decoding Random Binary Linear Codes in 2 n 20 How 1 + 1 ....mp4 26.6 MB
TheIACR/Eurocrypt 2012/Detecting Dangerous Queries A New Approach for Chosen C ....mp4 12.2 MB
TheIACR/Eurocrypt 2012/Efficient Zero-Knowledge Argument for Correctness of a S ....mp4 12.3 MB
TheIACR/Eurocrypt 2012/Efficient and Optimally Secure Key-Length Extension for ....mp4 25.9 MB
TheIACR/Eurocrypt 2012/Fair Computation with Rational Players..mp4 20.3 MB
TheIACR/Eurocrypt 2012/Faster Algorithms for Approximate Common Divisors Break ....mp4 14.8 MB
TheIACR/Eurocrypt 2012/Fully Homomorphic Encryption with Polylog Overhead..mp4 21.8 MB
TheIACR/Eurocrypt 2012/Identity-Based (Lossy) Trapdoor Functions and Applications..mp4 35.7 MB
TheIACR/Eurocrypt 2012/Identity-Based Encryption Resilient to Continual Auxilia ....mp4 12.8 MB
TheIACR/Eurocrypt 2012/Incremental Deterministic Public-Key Encryption..mp4 13.8 MB
TheIACR/Eurocrypt 2012/Key-Alternating Ciphers in a Provable Setting Encryptio ....mp4 12.8 MB
TheIACR/Eurocrypt 2012/Lattice Signatures without Trapdoors..mp4 12.3 MB
TheIACR/Eurocrypt 2012/Message Authentication, Revisited..mp4 12.4 MB
TheIACR/Eurocrypt 2012/Multiparty Computation with Low Communication, Computati ....mp4 33.9 MB
TheIACR/Eurocrypt 2012/Narrow-Bicliques Cryptanalysis of Full IDEA..mp4 24.4 MB
TheIACR/Eurocrypt 2012/On the Exact Security of Schnorr-Type Signatures in the ....mp4 31.9 MB
TheIACR/Eurocrypt 2012/Optimal Security Proofs for Full Domain Hash, Revisited..mp4 12.2 MB
TheIACR/Eurocrypt 2012/Property Preserving Symmetric Encryption..mp4 14.7 MB
TheIACR/Eurocrypt 2012/Pseudorandom Functions and Lattices..mp4 15.8 MB
TheIACR/Eurocrypt 2012/Public Key Compression and Modulus Switching for Fully H ....mp4 16.5 MB
TheIACR/Eurocrypt 2012/Quantum Proofs of Knowledge..mp4 24.4 MB
TheIACR/Eurocrypt 2012/Robust Coin Flipping..mp4 11.9 MB
TheIACR/Eurocrypt 2012/Security of Symmetric Encryption in the Presence of Ciph ....mp4 10 MB
TheIACR/Eurocrypt 2012/Standard Security Does Not Imply Security against Select ....mp4 11.2 MB
TheIACR/Eurocrypt 2012/Statistical Tools Flavor Side-Channel Collision Attacks..mp4 13.4 MB
TheIACR/Eurocrypt 2012/Tightly-Secure Signatures from Lossy Identification Schemes..mp4 14.9 MB
TheIACR/Eurocrypt 2012/Trapdoors for Lattices Simpler, Tighter, Faster, Smaller..mp4 14.5 MB
TheIACR/Eurocrypt 2012/Unconditionally-Secure Robust Secret Sharing with Compac ....mp4 57 MB
TheIACR/Eurocrypt 2016/Adaptively Secure Identity-Based Encryption from Lattices with ....mp4 19.4 MB
TheIACR/Eurocrypt 2016/All Complete Functionalities are Reversible.mp4 17.1 MB
TheIACR/Eurocrypt 2016/Anonymous Traitor Tracing How to Embed Arbitrary Information in a Key.mp4 14.2 MB
TheIACR/Eurocrypt 2016/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.mp4 17 MB
TheIACR/Eurocrypt 2016/CFRG Meeting.mp4 69.5 MB
TheIACR/Eurocrypt 2016/Circuit Compilers with O(1 log (n)) Leakage Rate.mp4 14.6 MB
TheIACR/Eurocrypt 2016/Computationally Binding Quantum Commitments.mp4 18.7 MB
TheIACR/Eurocrypt 2016/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.mp4 16.2 MB
TheIACR/Eurocrypt 2016/Constrained Pseudorandom Functions for Unconstrained Inputs.mp4 11 MB
TheIACR/Eurocrypt 2016/Engineering Code Obfuscation - YouTube.mp4 40.4 MB
TheIACR/Eurocrypt 2016/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.mp4 14.8 MB
TheIACR/Eurocrypt 2016/Eurocrypt 2016 Rump Session.mp4 99.3 MB
TheIACR/Eurocrypt 2016/Fair and Robust MPC using a Global Transaction Ledger.mp4 15.8 MB
TheIACR/Eurocrypt 2016/Faster Algorithms for Solving LPN.mp4 18.3 MB
TheIACR/Eurocrypt 2016/Freestart Collision for Full SHA-1.mp4 13.4 MB
TheIACR/Eurocrypt 2016/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.mp4 15.3 MB
TheIACR/Eurocrypt 2016/IACR Business meeting, Eurocrypt 2016.mp4 27.4 MB
TheIACR/Eurocrypt 2016/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.mp4 15.3 MB
TheIACR/Eurocrypt 2016/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.mp4 14.3 MB
TheIACR/Eurocrypt 2016/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.mp4 13.6 MB
TheIACR/Eurocrypt 2016/Indifferentiability of Confusion-Diffusion Networks.mp4 15.1 MB
TheIACR/Eurocrypt 2016/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.mp4 16 MB
TheIACR/Eurocrypt 2016/Multi-input Functional Encryption in the Private-Key Setting ....mp4 14.4 MB
TheIACR/Eurocrypt 2016/New Attacks on the Concatenation and XOR Hash Combiners.mp4 13.8 MB
TheIACR/Eurocrypt 2016/New negative results on differing-inputs obfuscation.mp4 10.4 MB
TheIACR/Eurocrypt 2016/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.mp4 14.8 MB
TheIACR/Eurocrypt 2016/On the Impossibility of Tight Cryptographic Reductions.mp4 14.7 MB
TheIACR/Eurocrypt 2016/On the Power of Hierarchical Identity-Based Encryption.mp4 14.8 MB
TheIACR/Eurocrypt 2016/On the Size of Pairing-Based Non-interactive Arguments.mp4 18.9 MB
TheIACR/Eurocrypt 2016/Online Offline OR Composition of Sigma Protocols.mp4 15.8 MB
TheIACR/Eurocrypt 2016/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.mp4 42.8 MB
TheIACR/Eurocrypt 2016/Provably Robust Sponge-Based PRNGs and KDFs.mp4 16.3 MB
TheIACR/Eurocrypt 2016/Provably Weak Instances of Ring-LWE Revisited.mp4 14.6 MB
TheIACR/Eurocrypt 2016/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.mp4 15.5 MB
TheIACR/Eurocrypt 2016/Randomness Complexity of Private Circuits for Multiplication.mp4 11.4 MB
TheIACR/Eurocrypt 2016/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.mp4 16.4 MB
TheIACR/Eurocrypt 2016/Sanitization of FHE Ciphertexts.mp4 13.3 MB
TheIACR/Eurocrypt 2016/Secure Computation from Elastic Noisy Channels.mp4 29.7 MB
TheIACR/Eurocrypt 2016/Securing Cryptography Implementations in Embedded Systems, part I.mp4 34.8 MB
TheIACR/Eurocrypt 2016/Security Cryptography Implementations in Embedded Systems, Part 2..mp4 36.2 MB
TheIACR/Eurocrypt 2016/Structural Lattice Reduction Generalized Worst-Case to Average-case Reductions and ....mp4 12.2 MB
TheIACR/Eurocrypt 2016/The Exact Round Complexity of Secure Computation.mp4 14.2 MB
TheIACR/Eurocrypt 2016/The future of cryptography - YouTube.mp4 42.5 MB
TheIACR/Eurocrypt 2016/Tightly CCA-Secure Encryption Without Pairings.mp4 14.6 MB
TheIACR/Eurocrypt 2016/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.mp4 17.7 MB
TheIACR/Eurocrypt 2016/Two Round Multiparty Computation via Multi-key FHE.mp4 14.9 MB
TheIACR/Eurocrypt 2016/Unconditionally Secure Computation with Reduced Interaction.mp4 13.2 MB
TheIACR/Eurocrypt 2016/Zero-Knowledge Arguments for Lattice-Based Accumulators.mp4 15 MB
TheIACR/Eurocrypt 2017/0 RTT Key Exchange with Full Forward Secrecy.mp4 109.8 MB
TheIACR/Eurocrypt 2017/0 RTT Key Exchange with Full Forward Secrecy.srt 48 KB
TheIACR/Eurocrypt 2017/A New Structural Differential Property of 5 Round AES.mp4 12.5 MB
TheIACR/Eurocrypt 2017/A New Structural Differential Property of 5 Round AES.srt 47 KB
TheIACR/Eurocrypt 2017/A Note on Perfect Correctness by Derandomization.mp4 137.6 MB
TheIACR/Eurocrypt 2017/A Note on Perfect Correctness by Derandomization.srt 50 KB
TheIACR/Eurocrypt 2017/A kilobit hidden SNFS discrete logarithm computation.mp4 19.8 MB
TheIACR/Eurocrypt 2017/A kilobit hidden SNFS discrete logarithm computation.srt 59 KB
TheIACR/Eurocrypt 2017/Ad Hoc PSM Protocols Secure Computation without Coordination.mp4 99.4 MB
TheIACR/Eurocrypt 2017/Adaptive partitioning.mp4 178.3 MB
TheIACR/Eurocrypt 2017/Adaptive partitioning.srt 75 KB
TheIACR/Eurocrypt 2017/Amortized Complexity of Zero-Knowledge Proofs Revisited Achieving Linear Soundness Slack.mp4 17 MB
TheIACR/Eurocrypt 2017/Amortized Complexity of Zero-Knowledge Proofs Revisited Achieving Linear Soundness Slack.srt 56 KB
TheIACR/Eurocrypt 2017/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.mp4 20.2 MB
TheIACR/Eurocrypt 2017/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.srt 65 KB
TheIACR/Eurocrypt 2017/Breaking the Sub Exponential Barrier in Obfustopia.mp4 159.7 MB
TheIACR/Eurocrypt 2017/Breaking the Sub Exponential Barrier in Obfustopia.srt 58 KB
TheIACR/Eurocrypt 2017/Computational integrity with a public random string from quasi linear PCPs.mp4 134.5 MB
TheIACR/Eurocrypt 2017/Computational integrity with a public random string from quasi linear PCPs.srt 42 KB
TheIACR/Eurocrypt 2017/Computing generator in cyclotomic integer rings.mp4 19.9 MB
TheIACR/Eurocrypt 2017/Computing generator in cyclotomic integer rings.srt 42 KB
TheIACR/Eurocrypt 2017/Concurrently composable security with shielded super polynomial simulators.mp4 16.3 MB
TheIACR/Eurocrypt 2017/Concurrently composable security with shielded super polynomial simulators.srt 44 KB
TheIACR/Eurocrypt 2017/Conditional Cube Attack on Reduced Round Keccak Sponge Function.mp4 23.2 MB
TheIACR/Eurocrypt 2017/Conditional Cube Attack on Reduced Round Keccak Sponge Function.srt 43 KB
TheIACR/Eurocrypt 2017/Constraint hiding constrained PRFs for NC1 from LWE.mp4 20.6 MB
TheIACR/Eurocrypt 2017/Constraint hiding constrained PRFs for NC1 from LWE.srt 57 KB
TheIACR/Eurocrypt 2017/Cryptanalyses of Candidate Branching Program Obfuscators.mp4 73.8 MB
TheIACR/Eurocrypt 2017/Cryptanalyses of Candidate Branching Program Obfuscators.srt 55 KB
TheIACR/Eurocrypt 2017/Cryptography with Updates.mp4 158.8 MB
TheIACR/Eurocrypt 2017/Cryptography with Updates.srt 65 KB
TheIACR/Eurocrypt 2017/Decentralized Anonymous Micropayments.mp4 18.3 MB
TheIACR/Eurocrypt 2017/Decentralized Anonymous Micropayments.srt 51 KB
TheIACR/Eurocrypt 2017/Depth Robust Graphs and Their Cumulative Memory Complexity.mp4 155.2 MB
TheIACR/Eurocrypt 2017/Depth Robust Graphs and Their Cumulative Memory Complexity.srt 63 KB
TheIACR/Eurocrypt 2017/Faster Secure Two Party Computation in the Single Execution Setting - YouTube.mp4 140.9 MB
TheIACR/Eurocrypt 2017/Faster Secure Two Party Computation in the Single Execution Setting - YouTube.srt 59 KB
TheIACR/Eurocrypt 2017/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.mp4 169.8 MB
TheIACR/Eurocrypt 2017/Formal Abstractions for Attested Execution Secure Processors.mp4 41.3 MB
TheIACR/Eurocrypt 2017/Formal Abstractions for Attested Execution Secure Processors.srt 65 KB
TheIACR/Eurocrypt 2017/From Minicrypt to Obfustopia via Private Key Functional Encryption.mp4 19 MB
TheIACR/Eurocrypt 2017/From Minicrypt to Obfustopia via Private Key Functional Encryption.srt 48 KB
TheIACR/Eurocrypt 2017/Functional Encryption Deterministic to Randomized Functions from Simple Assumptions.mp4 33.4 MB
TheIACR/Eurocrypt 2017/Functional Encryption Deterministic to Randomized Functions from Simple Assumptions.srt 72 KB
TheIACR/Eurocrypt 2017/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.mp4 153.5 MB
TheIACR/Eurocrypt 2017/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.srt 75 KB
TheIACR/Eurocrypt 2017/Hashing Garbled Circuits for Free.mp4 62.6 MB
TheIACR/Eurocrypt 2017/Hashing Garbled Circuits for Free.srt 50 KB
TheIACR/Eurocrypt 2017/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.mp4 97.5 MB
TheIACR/Eurocrypt 2017/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.srt 43 KB
TheIACR/Eurocrypt 2017/How Fast Can Higher Order Masking Be in Software.mp4 22.5 MB
TheIACR/Eurocrypt 2017/Improved Private Set Intersection against Malicious Adversaries.mp4 37.2 MB
TheIACR/Eurocrypt 2017/Improved Private Set Intersection against Malicious Adversaries.srt 59 KB
TheIACR/Eurocrypt 2017/Invited talk Advances in computer aided cryptography.mp4 63.3 MB
TheIACR/Eurocrypt 2017/Invited talk Advances in computer aided cryptography.srt 153 KB
TheIACR/Eurocrypt 2017/Invited talk Living Between the Ideal and Real Worlds.mp4 48.3 MB
TheIACR/Eurocrypt 2017/Invited talk Living Between the Ideal and Real Worlds.srt 181 KB
TheIACR/Eurocrypt 2017/Lattice Based SNARGs and Their Application to More Efficient Obfuscation.srt 77 KB
TheIACR/Eurocrypt 2017/Modifying an Enciphering Scheme after Deployment.mp4 13.2 MB
TheIACR/Eurocrypt 2017/Modifying an Enciphering Scheme after Deployment.srt 38 KB
TheIACR/Eurocrypt 2017/Multi Input Inner Product Functional Encryption from Pairings.mp4 14.4 MB
TheIACR/Eurocrypt 2017/Multi Input Inner Product Functional Encryption from Pairings.srt 44 KB
TheIACR/Eurocrypt 2017/New Collision Attacks on Round Reduced Keccak.mp4 13.7 MB
TheIACR/Eurocrypt 2017/New Collision Attacks on Round Reduced Keccak.srt 35 KB
TheIACR/Eurocrypt 2017/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.mp4 22.3 MB
TheIACR/Eurocrypt 2017/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.srt 50 KB
TheIACR/Eurocrypt 2017/Non Interactive Secure 2PC in the Offline Online and Batch Settings.mp4 190.2 MB
TheIACR/Eurocrypt 2017/Non Interactive Secure 2PC in the Offline Online and Batch Settings.srt 79 KB
TheIACR/Eurocrypt 2017/On Removing Graded Encodings from Functional Encryption.mp4 18.7 MB
TheIACR/Eurocrypt 2017/On Removing Graded Encodings from Functional Encryption.srt 46 KB
TheIACR/Eurocrypt 2017/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.mp4 18.1 MB
TheIACR/Eurocrypt 2017/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.srt 58 KB
TheIACR/Eurocrypt 2017/On the Exact Round Complexity of Self Composable Two Party Computation.mp4 121.6 MB
TheIACR/Eurocrypt 2017/On the Exact Round Complexity of Self Composable Two Party Computation.srt 51 KB
TheIACR/Eurocrypt 2017/One Shot Verifiable Encryption from Lattices.mp4 30.5 MB
TheIACR/Eurocrypt 2017/One Shot Verifiable Encryption from Lattices.srt 73 KB
TheIACR/Eurocrypt 2017/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.mp4 21.8 MB
TheIACR/Eurocrypt 2017/Private Puncturable PRFs From Standard Lattice Assumptions.mp4 24.5 MB
TheIACR/Eurocrypt 2017/Private Puncturable PRFs From Standard Lattice Assumptions.srt 61 KB
TheIACR/Eurocrypt 2017/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.mp4 20 MB
TheIACR/Eurocrypt 2017/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.srt 54 KB
TheIACR/Eurocrypt 2017/Public Seed Pseudorandom Permutations.mp4 20.9 MB
TheIACR/Eurocrypt 2017/Quantum Authentication and Encryption with Key Recycling.mp4 159.7 MB
TheIACR/Eurocrypt 2017/Quantum Authentication and Encryption with Key Recycling.srt 59 KB
TheIACR/Eurocrypt 2017/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.mp4 19.9 MB
TheIACR/Eurocrypt 2017/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.srt 63 KB
TheIACR/Eurocrypt 2017/Quantum authentication with key recycling.mp4 199 MB
TheIACR/Eurocrypt 2017/Quantum authentication with key recycling.srt 74 KB
TheIACR/Eurocrypt 2017/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.mp4 21.1 MB
TheIACR/Eurocrypt 2017/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.srt 55 KB
TheIACR/Eurocrypt 2017/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.mp4 156.7 MB
TheIACR/Eurocrypt 2017/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.srt 60 KB
TheIACR/Eurocrypt 2017/Removing the Strong RSA Assumption from Arguments over the Integers.mp4 149 MB
TheIACR/Eurocrypt 2017/Removing the Strong RSA Assumption from Arguments over the Integers.srt 60 KB
TheIACR/Eurocrypt 2017/Revisiting Lattice Attacks on overstretched NTRU parameters.mp4 23.5 MB
TheIACR/Eurocrypt 2017/Revisiting Lattice Attacks on overstretched NTRU parameters.srt 39 KB
TheIACR/Eurocrypt 2017/Robust transforming combiners from indistinguishability obfuscation to functional encryption.mp4 19.6 MB
TheIACR/Eurocrypt 2017/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.mp4 21.8 MB
TheIACR/Eurocrypt 2017/Short Stickelberger Class Relations and application to Ideal SVP.mp4 22.6 MB
TheIACR/Eurocrypt 2017/Short Stickelberger Class Relations and application to Ideal SVP.srt 48 KB
TheIACR/Eurocrypt 2017/Short generators without quantum computers the case of multiquadratics.mp4 20.9 MB
TheIACR/Eurocrypt 2017/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.mp4 18.5 MB
TheIACR/Eurocrypt 2017/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.srt 50 KB
TheIACR/Eurocrypt 2017/Small CRT Exponent RSA Revisited.mp4 16.6 MB
TheIACR/Eurocrypt 2017/Small CRT Exponent RSA Revisited.srt 42 KB
TheIACR/Eurocrypt 2017/Sublinear Zero Knowledge Arguments for RAM Programs.mp4 19.7 MB
TheIACR/Eurocrypt 2017/The Multi User Security of Double Encryption.mp4 20.9 MB
TheIACR/Eurocrypt 2017/The Multi User Security of Double Encryption.srt 38 KB
TheIACR/Eurocrypt 2017/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.mp4 135 MB
TheIACR/Eurocrypt 2017/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.srt 43 KB
TheIACR/Eurocrypt 2017/Twisted u4 normal form for elliptic curves.mp4 17.6 MB
TheIACR/Eurocrypt 2017/Twisted u4 normal form for elliptic curves.srt 37 KB
TheIACR/Eurocrypt 2017/Unconditional UC Secure Computation with Stronger Malicious PUFs.mp4 19 MB
TheIACR/Eurocrypt 2018 Rump Session/3rd SKINNY Breaking Competition.mp4 5.6 MB
TheIACR/Eurocrypt 2018 Rump Session/A basketful of secret shares.mp4 6.4 MB
TheIACR/Eurocrypt 2018 Rump Session/Announcement Lightsec workshop.mp4 1.4 MB
TheIACR/Eurocrypt 2018 Rump Session/Another Application of Cryptocurrencies.en.transcribed.srt 14 KB
TheIACR/Eurocrypt 2018 Rump Session/Another Application of Cryptocurrencies.mp4 8.4 MB
TheIACR/Eurocrypt 2018 Rump Session/Bernstein Bound is Tight.mp4 7.2 MB
TheIACR/Eurocrypt 2018 Rump Session/CSIDH an efficient post-quantum commutative group action.mp4 12.3 MB
TheIACR/Eurocrypt 2018 Rump Session/Conditional Linear Cryptanalysis.mp4 5.7 MB
TheIACR/Eurocrypt 2018 Rump Session/Cryptography with Dispensable Backdoors.mp4 8.6 MB
TheIACR/Eurocrypt 2018 Rump Session/Decoding distortions using frequency analysis.en.transcribed.srt 11 KB
TheIACR/Eurocrypt 2018 Rump Session/Decoding distortions using frequency analysis.mp4 4.8 MB
TheIACR/Eurocrypt 2018 Rump Session/ElectroEuro.mp4 5.6 MB
TheIACR/Eurocrypt 2018 Rump Session/How to (not) share a password.mp4 7.8 MB
TheIACR/Eurocrypt 2018 Rump Session/How to synchronize efficiently.mp4 5.4 MB
TheIACR/Eurocrypt 2018 Rump Session/How we avoided a second Dual-EC-DRBG fiasco.en.transcribed.srt 15 KB
TheIACR/Eurocrypt 2018 Rump Session/How we avoided a second Dual-EC-DRBG fiasco.mp4 7.8 MB
TheIACR/Eurocrypt 2018 Rump Session/IACR Fellows nomination.mp4 5.2 MB
TheIACR/Eurocrypt 2018 Rump Session/Kittens, Models And Thieves.mp4 6.9 MB
TheIACR/Eurocrypt 2018 Rump Session/Make AES great again!.mp4 5 MB
TheIACR/Eurocrypt 2018 Rump Session/Must the Communication Graph of MPC Protocols be an Expander.mp4 4.4 MB
TheIACR/Eurocrypt 2018 Rump Session/NIST Update.mp4 8.3 MB
TheIACR/Eurocrypt 2018 Rump Session/P2P social networks why and how viable.en.transcribed.srt 7 KB
TheIACR/Eurocrypt 2018 Rump Session/P2P social networks why and how viable.mp4 4.2 MB
TheIACR/Eurocrypt 2018 Rump Session/PRG.mp4 5.1 MB
TheIACR/Eurocrypt 2018 Rump Session/QueerCrypt.mp4 3.8 MB
TheIACR/Eurocrypt 2018 Rump Session/Random Oracles in the Real World.mp4 8.5 MB
TheIACR/Eurocrypt 2018 Rump Session/Reverse Kuleshov effect in cryptography.mp4 4.6 MB
TheIACR/Eurocrypt 2018 Rump Session/Small-Box Cryptography, and the Provable Security of SPNs.mp4 7.6 MB
TheIACR/Eurocrypt 2018 Rump Session/State-Separating Proofs A Reduction Methodology for Real-World Protocols.mp4 8.1 MB
TheIACR/Eurocrypt 2018 Rump Session/TCC GOA.mp4 3.6 MB
TheIACR/Eurocrypt 2018 Rump Session/The Best of Both Worlds Byzantine Agreement Protocols for (but not limited to) Chickens.mp4 5.4 MB
TheIACR/Eurocrypt 2018 Rump Session/The ZUC-256 Stream Cipher.mp4 4.4 MB
TheIACR/Eurocrypt 2018 Rump Session/Unknown presentation.mp4 2.1 MB
TheIACR/Eurocrypt 2018 Rump Session/Workshops @ Crypto 2018.mp4 5 MB
TheIACR/Eurocrypt 2018 Rump Session/libpqcrypto.mp4 6.4 MB
TheIACR/Eurocrypt 2018/A New Approach to Black-Box Concurrent Secure Computation.en.transcribed.srt 40 KB
TheIACR/Eurocrypt 2018/A New Approach to Black-Box Concurrent Secure Computation.mp4 31.3 MB
TheIACR/Eurocrypt 2018/Adaptively Secure Garbling with Near Optimal Online Complexity.mp4 30.2 MB
TheIACR/Eurocrypt 2018/An Efficiency-Preserving Transformation from....mp4 33 MB
TheIACR/Eurocrypt 2018/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.mp4 31.2 MB
TheIACR/Eurocrypt 2018/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.mp4 29.6 MB
TheIACR/Eurocrypt 2018/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.en.transcribed.srt 57 KB
TheIACR/Eurocrypt 2018/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.mp4 44.7 MB
TheIACR/Eurocrypt 2018/Fuzzy Password-Authenticated Key Exchange.en.transcribed.srt 54 KB
TheIACR/Eurocrypt 2018/Fuzzy Password-Authenticated Key Exchange.mp4 26.7 MB
TheIACR/Eurocrypt 2018/Limits on Low-Degree Pseudorandom Generators (Or Sum-of-Squares Meets Program Obfuscation).en.transcribed.srt 54 KB
TheIACR/Eurocrypt 2018/Limits on Low-Degree Pseudorandom Generators (Or Sum-of-Squares Meets Program Obfuscation).mp4 34.6 MB
TheIACR/Eurocrypt 2018/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.en.transcribed.srt 79 KB
TheIACR/Eurocrypt 2018/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.mp4 51.5 MB
TheIACR/Eurocrypt 2018/Masking the GLP Lattice-Based Signature Scheme at Any Order.en.transcribed.srt 49 KB
TheIACR/Eurocrypt 2018/Masking the GLP Lattice-Based Signature Scheme at Any Order.mp4 39.3 MB
TheIACR/Eurocrypt 2018/Non-malleable Codes from Average-Case Hardness ....mp4 24.7 MB
TheIACR/Eurocrypt 2018/Non-malleable Randomness Encoders and Their Applications.mp4 28.3 MB
TheIACR/Eurocrypt 2018/OPAQUE An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.mp4 25.5 MB
TheIACR/Eurocrypt 2018/Obfustopia Built on Secret-Key Functional Encryption.en.transcribed.srt 46 KB
TheIACR/Eurocrypt 2018/Obfustopia Built on Secret-Key Functional Encryption.mp4 25.9 MB
TheIACR/Eurocrypt 2018/On the Existence of Three Round Zero-Knowledge Proofs.en.transcribed.srt 47 KB
TheIACR/Eurocrypt 2018/On the Existence of Three Round Zero-Knowledge Proofs.mp4 26.1 MB
TheIACR/Eurocrypt 2018/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.mp4 37.7 MB
TheIACR/Eurocrypt 2018/Simple Proofs of Sequential Work.mp4 42.5 MB
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.c94bded4-1590-43bf-ae94-37393effd4c1.part 15.9 MB
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.en.transcribed.srt 56 KB
TheIACR/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.mp4 33.3 MB
TheIACR/Eurocrypt 2018/Supersingular Isogeny Graphs and Endomorphism Rings Reductions and Solutions.mp4 32.6 MB
TheIACR/Eurocrypt 2018/The Discrete-Logarithm Problem with Preprocessing.mp4 44.4 MB
TheIACR/Eurocrypt 2018/Thirty Years of Digital Currency From Digicash to the Blockchain.en.transcribed.srt 151 KB
TheIACR/Eurocrypt 2018/Thirty Years of Digital Currency From Digicash to the Blockchain.mp4 79.3 MB
TheIACR/Eurocrypt 2018/Two-Round Multiparty Secure Computation from Minimal Assumptions.mp4 32.1 MB
TheIACR/Eurocrypt 2018/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.mp4 40.9 MB
TheIACR/Eurocrypt 2018/too short MTS.en.transcribed.srt 616 B
TheIACR/Eurocrypt 2018/too short MTS.mp4 929 KB
TheIACR/FSE 2013/A Framework for Automated Independent-Biclique Cryptanalysis.mp4 93.7 MB
TheIACR/FSE 2013/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.mp4 96.6 MB
TheIACR/FSE 2013/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.mp4 85.6 MB
TheIACR/FSE 2013/ALE AES-Based Lightweight Authenticated Encryption.mp4 83.4 MB
TheIACR/FSE 2013/Attacks and Security Proofs of EAX-Prime.mp4 96.9 MB
TheIACR/FSE 2013/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.mp4 109 MB
TheIACR/FSE 2013/Complementing Feistel Ciphers.mp4 86.1 MB
TheIACR/FSE 2013/Cryptanalysis of Round-Reduced LED.mp4 67.4 MB
TheIACR/FSE 2013/Cryptanalysis of WIDEA.mp4 82.2 MB
TheIACR/FSE 2013/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.mp4 96 MB
TheIACR/FSE 2013/FSE 2013 Rump Session.mp4 239.6 MB
TheIACR/FSE 2013/Full Plaintext Recovery Attack on Broadcast RC4.mp4 94.4 MB
TheIACR/FSE 2013/Higher-Order Side Channel Security and Mask Refreshing.mp4 95 MB
TheIACR/FSE 2013/Impossible plaintext cryptanalysis and probable plaintext collision attacks of 64 bit block ci.mp4 109.4 MB
TheIACR/FSE 2013/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.mp4 98 MB
TheIACR/FSE 2013/Invited Talk Failures of secret key cryptography.mp4 252.8 MB
TheIACR/FSE 2013/Masking Tables - An Underestimated Security Risk.mp4 83.5 MB
TheIACR/FSE 2013/Near Collision Attack on the Grain v1 Stream Cipher.mp4 92.6 MB
TheIACR/FSE 2013/On Symmetric Encryption with Distinguishable Decryption Failures.mp4 86 MB
TheIACR/FSE 2013/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.mp4 79 MB
TheIACR/FSE 2013/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.mp4 83.3 MB
TheIACR/FSE 2013/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.mp4 101.4 MB
TheIACR/FSE 2013/Program Chair' Opening Remarks.mp4 6.8 MB
TheIACR/FSE 2013/Reflection Cryptanalysis of PRINCE-Like Ciphers.mp4 94.1 MB
TheIACR/FSE 2013/Related-Key Attacks Against Full Hummingbird-2.mp4 99.8 MB
TheIACR/FSE 2013/Rotational Cryptanalysis of Round-Reduced Keccak.mp4 102.7 MB
TheIACR/FSE 2013/Secure Message Authentication Against Related-Key Attack.mp4 95.8 MB
TheIACR/FSE 2013/Security Analysis of PRINCE.mp4 87.8 MB
TheIACR/FSE 2013/Smashing WEP in a Passive Attack.mp4 96.3 MB
TheIACR/FSE 2013/Time-Memory Trade-Offs for Near-Collisions.mp4 100.8 MB
TheIACR/FSE 2013/Towards Secure Distance Bounding.mp4 243.4 MB
TheIACR/FSE 2013/Towards Understanding the Known-Key Security of Block Ciphers.mp4 106 MB
TheIACR/FSE 2013/Tweakable Blockciphers with Asymptotically Optimal Security.mp4 68.6 MB
TheIACR/IACR Crypt thank you.txt 745 B
TheIACR/PKC 2010/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem..mp4 24.8 MB
TheIACR/PKC 2010/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model..mp4 18.5 MB
TheIACR/PKC 2010/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions..mp4 25.9 MB
TheIACR/PKC 2010/Confidential Signatures and Deterministic Signcryption..mp4 18.4 MB
TheIACR/PKC 2010/Constant Size Ciphertexts in Threshold Attribute-Based Encryption..mp4 20.8 MB
TheIACR/PKC 2010/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments..mp4 23.4 MB
TheIACR/PKC 2010/Duality in Lattice Based Cryptography.mp4 72.7 MB
TheIACR/PKC 2010/Efficient Arithmetic on Hessian Curves..mp4 22.6 MB
TheIACR/PKC 2010/Efficient Set Operations in the Presence of Malicious Adversaries..mp4 25.6 MB
TheIACR/PKC 2010/Faster Pairing Computations on Curves with High-Degree Twists..mp4 30.1 MB
TheIACR/PKC 2010/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions..mp4 27.2 MB
TheIACR/PKC 2010/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes..mp4 27.3 MB
TheIACR/PKC 2010/Functional Encryption for Inner Product Achieving Const ....mp4 31 MB
TheIACR/PKC 2010/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA..mp4 30.5 MB
TheIACR/PKC 2010/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA..mp4 28.5 MB
TheIACR/PKC 2010/More Constructions of Lossy and Correlation-Secure Trapdoor Functions..mp4 22.3 MB
TheIACR/PKC 2010/On the Feasibility of Consistent Computations..mp4 25.9 MB
TheIACR/PKC 2010/Preventing Pollution Attacks in Multi-source Network Coding..mp4 29.6 MB
TheIACR/PKC 2010/Secure Network Coding over the Integers..mp4 34.5 MB
TheIACR/PKC 2010/Security of Encryption Schemes in Weakened Random Oracle Models..mp4 25.4 MB
TheIACR/PKC 2010/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model..mp4 24.2 MB
TheIACR/PKC 2010/Solving a 676-Bit Discrete Logarithm Problem in GF(3^6n)..mp4 20.9 MB
TheIACR/PKC 2010/Text Search Protocols with Simulation Based Security..mp4 25 MB
TheIACR/PKC 2010/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval..mp4 26.3 MB
TheIACR/Tutorial on Homomorphic Encryption by Shai Halevi/Tutorial on Homomorphic Encryption (part 1).mp4 67.2 MB
TheIACR/Tutorial on Homomorphic Encryption by Shai Halevi/Tutorial on Homomorphic Encryption (part 2).mp4 91.1 MB
TheIACR/iacr logo.png 40 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
TheIACR Video 70.5 GB 6
TheIACR Video 57.3 GB 2

Loading...