/
|
IACR Crypt thank you.txt
|
1.8 KB
|
IACR logo.png
|
41.4 KB
|
RealWorldCrypto logo.jpg
|
3.3 KB
|
/Asiacrypt/Asiacrypt 2016/
|
A General Polynomial Selection Method and New Asymptotic Complexities for ....mp4
|
33.1 MB
|
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.mp4
|
30.7 MB
|
A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4
|
40.2 MB
|
A Shuffle Argument Secure in the Generic Model.mp4
|
35.1 MB
|
A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4
|
33.2 MB
|
Adaptive Oblivious Transfer and Generalization.mp4
|
10.4 MB
|
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ....mp4
|
26.9 MB
|
Asiacrypt 2016 Rump Session.mp4
|
81.3 MB
|
Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4
|
75.2 MB
|
Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4
|
29.7 MB
|
Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4
|
31.0 MB
|
Authenticated Encryption with Variable Stretch.mp4
|
28.5 MB
|
Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4
|
43.3 MB
|
Characterisation and Estimation of the Key Rank Distribution in the context of side channel ....mp4
|
30.0 MB
|
Cliptography Clipping the Power of Kleptographic Attacks.mp4
|
36.6 MB
|
Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4
|
38.2 MB
|
Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ....mp4
|
42.8 MB
|
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4
|
42.7 MB
|
Cryptography in Vietnam in the French and American Wars.mp4
|
76.0 MB
|
Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4
|
30.5 MB
|
Efficient and Provable White Box Primitives.mp4
|
26.4 MB
|
Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting - .mp4
|
18.6 MB
|
Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4
|
18.1 MB
|
Efficient Public Key Distance Bounding Protocol.mp4
|
37.2 MB
|
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4
|
33.9 MB
|
Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.mp4
|
49.7 MB
|
From 5 pass MQ based identification to MQ based signatures.mp4
|
29.2 MB
|
From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4
|
32.2 MB
|
General IACR Business Meeting.mp4
|
52.1 MB
|
How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4
|
32.4 MB
|
How to Generate and use Universal Samplers.mp4
|
22.6 MB
|
How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4
|
21.7 MB
|
Indistinguishable Proofs of Work or Knowledge.mp4
|
41.3 MB
|
Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4
|
39.3 MB
|
Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4
|
45.5 MB
|
MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4
|
36.7 MB
|
More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4
|
20.0 MB
|
Multi Input Functional Encryption with Unbounded Message Security.mp4
|
35.6 MB
|
Multi Key Homomorphic Authenticators.mp4
|
30.5 MB
|
Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4
|
110.3 MB
|
NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4
|
25.8 MB
|
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4
|
38.8 MB
|
On the Security of Supersingular Isogeny Cryptosystems.mp4
|
30.9 MB
|
Optimization of LPN Solving Algorithms.mp4
|
35.6 MB
|
Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4
|
32.0 MB
|
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4
|
34.2 MB
|
Reactive Garbling Foundation, Instantiation, Application.mp4
|
23.6 MB
|
Reverse Cycle Walking and Its Applications.mp4
|
35.1 MB
|
Selective Opening Security from Simulatable Data Encapsulation.mp4
|
28.5 MB
|
Selective Opening Security in the Presence of Randomness Failures.mp4
|
28.6 MB
|
Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4
|
65.6 MB
|
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4
|
30.1 MB
|
Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4
|
45.1 MB
|
Size-Hiding Computation for Multiple Parties.mp4
|
36.4 MB
|
Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4
|
23.2 MB
|
Structure Preserving Smooth Projective Hashing.mp4
|
3.9 MB
|
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4
|
31.2 MB
|
The Kernel Matrix Diffie Hellman Assumption.mp4
|
43.7 MB
|
The Reality of Cryptographic Deployments on the Internet.mp4
|
10.2 MB
|
Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4
|
38.0 MB
|
Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4
|
36.5 MB
|
Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4
|
29.2 MB
|
Universal Composition with Responsive Environments.mp4
|
26.3 MB
|
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4
|
24.5 MB
|
Unknown-Input Attacks in the Parallel Setting - Improving the Security of the ....mp4
|
24.9 MB
|
Verifiable Functional Encryption.mp4
|
32.6 MB
|
Welcome to Asiacrypt.mp4
|
21.1 MB
|
When are Fuzzy Extractors Possible.mp4
|
31.2 MB
|
Zero Knowledge Accumulators and Set Algebra.mp4
|
20.5 MB
|
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4
|
35.4 MB
|
/Asiacrypt/Asiacrypt 2017/
|
A simple and compact algorithm for SIDH with arbitrary degree isogenies.mp4
|
36.0 MB
|
A Subversion-Resistant SNARK.mp4
|
25.0 MB
|
ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.mp4
|
850.4 KB
|
Access Control Encryption for General Policies from Standard Assumptions.mp4
|
29.1 MB
|
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.mp4
|
24.6 MB
|
Amortizing Randomness Complexity in Private Circuits.mp4
|
32.0 MB
|
An Efficient Pairing Based Shuffle Argument.mp4
|
22.2 MB
|
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.mp4
|
29.4 MB
|
An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.mp4
|
27.6 MB
|
Analyzing Multi Key Security Degradation.mp4
|
44.2 MB
|
Authenticated Encryption in the Face of Protocol and Side Channel Leakage.mp4
|
45.4 MB
|
Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.mp4
|
31.5 MB
|
Blockcipher based MACs Beyond the Birthday Bound without Message Length.mp4
|
41.5 MB
|
Coded BKW with Sieving.mp4
|
23.7 MB
|
Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.mp4
|
29.3 MB
|
Combinatorics in Information theoretic cryptography.mp4
|
36.0 MB
|
Consolidating Inner product Masking.mp4
|
40.9 MB
|
Cycle slicer An algorithm for building permutations on special domains.mp4
|
46.2 MB
|
Efficient Ring Signatures in the Standard Model.mp4
|
23.2 MB
|
Efficient Scalable Constant Round MPC via Garbled Circuits.mp4
|
19.6 MB
|
Faster Algorithms for Isogeny Problems using Torsion Point Images.mp4
|
25.4 MB
|
Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.mp4
|
28.9 MB
|
Full state keyed duplex with built in multi user support.mp4
|
31.1 MB
|
Grover Meets Simon - Quantumly Attacking the FX construction.mp4
|
36.2 MB
|
Homomorphic Encryption for Arithmetic of Approximate Numbers.mp4
|
22.6 MB
|
How to use Metaheuristics for Design of Symmetric Key primitives.mp4
|
46.0 MB
|
IACR Business Meeting.mp4
|
80.9 MB
|
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.mp4
|
17.2 MB
|
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.mp4
|
26.9 MB
|
Improved Security for OCB3.mp4
|
30.4 MB
|
Instantaneous Decentralized Poker.mp4
|
42.1 MB
|
JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes - YouTube.mp4
|
26.9 MB
|
Kummer for Genus One over Prime Order Fields.mp4
|
19.3 MB
|
Linear Cryptanalysis of DES with Asymmetries.mp4
|
23.0 MB
|
Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.mp4
|
17.7 MB
|
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.mp4
|
18.8 MB
|
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.mp4
|
23.6 MB
|
More Efficient Universal Circuit Constructions.mp4
|
25.1 MB
|
New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.mp4
|
24.4 MB
|
Non interactive multiparty computation without correlated randomness.mp4
|
39.9 MB
|
On the Depth of Oblivious Parallel RAM.mp4
|
23.2 MB
|
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.mp4
|
25.0 MB
|
Opening remarks at Asiacrypt 2017.mp4
|
29.0 MB
|
Optimal rate non committing encryption.mp4
|
38.8 MB
|
Overlaying Conditional Circuit Clauses for Secure Computation.mp4
|
33.4 MB
|
Post Quantum Security of Fiat Shamir.mp4
|
38.1 MB
|
Preventing CLT Attacks on Obfuscation with Linear Overhead.mp4
|
29.2 MB
|
qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.mp4
|
22.3 MB
|
Quantum Fully Homomorphic Encryption with Verification.mp4
|
35.4 MB
|
Quantum Multicollision Finding Algorithm.mp4
|
31.2 MB
|
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.mp4
|
40.2 MB
|
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.mp4
|
22.0 MB
|
Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.mp4
|
34.9 MB
|
Strengthening Access Control Encryption.mp4
|
30.3 MB
|
Succinct Spooky Free Compilers Are Not Black Box Sound.mp4
|
33.9 MB
|
Symmetrically and Asymmetrically Hard Cryptography.mp4
|
44.8 MB
|
The first thorough side channel hardware trojan.mp4
|
44.6 MB
|
The Iterated Random Function Problem.mp4
|
46.3 MB
|
The Minimum Number of Cards in Practical Card based Protocols (2).mp4
|
20.0 MB
|
The Minimum Number of Cards in Practical Card based Protocols.mp4
|
29.3 MB
|
The ship has sailed - the NIST Post-Quantum Cryptography - competition.mp4
|
53.2 MB
|
The Sleepy Model of Consensus.mp4
|
43.5 MB
|
Tightly secure signatures from five move identification protocols.mp4
|
22.8 MB
|
Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.mp4
|
32.7 MB
|
Two Round PAKE from Approximate SPH and Instantiations from Lattices.mp4
|
22.8 MB
|
White-box Cryptomania, Pascal Paillier.mp4
|
45.3 MB
|
Yoyo Tricks with AES.mp4
|
29.9 MB
|
Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.mp4
|
33.6 MB
|
/Asiacrypt/Asiacrypt 2021/
|
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.eng.srt
|
57.0 KB
|
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.mp4
|
21.9 MB
|
A formula for disaster a unified approach to elliptic curve special-point-based attacks.eng.srt
|
25.1 KB
|
A formula for disaster a unified approach to elliptic curve special-point-based attacks.mp4
|
9.3 MB
|
A Geometric Approach to Linear Cryptanalysis.mp4
|
20.0 MB
|
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.mp4
|
12.0 MB
|
A Practical Key-Recovery Attack on 805-Round Trivium.eng.srt
|
28.6 KB
|
A Practical Key-Recovery Attack on 805-Round Trivium.mp4
|
14.9 MB
|
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.eng.srt
|
34.2 KB
|
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.mp4
|
14.1 MB
|
Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.eng.srt
|
40.8 KB
|
Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.mp4
|
11.8 MB
|
Algebraic Adversaries in the Universal Composability Framework.eng.srt
|
32.0 KB
|
Algebraic Adversaries in the Universal Composability Framework.mp4
|
11.4 MB
|
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.eng.srt
|
33.9 KB
|
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.mp4
|
16.9 MB
|
Asiacrypt 2021 closing remarks.eng.srt
|
6.1 KB
|
Asiacrypt 2021 closing remarks.mp4
|
6.1 MB
|
Astrolabous A Universally Composable Time Lock Encryption Scheme.mp4
|
22.3 MB
|
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.eng.srt
|
15.5 KB
|
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.mp4
|
9.0 MB
|
Balanced Non-Adjacent Forms.eng.srt
|
26.9 KB
|
Balanced Non-Adjacent Forms.mp4
|
9.3 MB
|
Batching Base Oblivious Transfers.eng.srt
|
67.1 KB
|
Batching Base Oblivious Transfers.mp4
|
22.1 MB
|
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.eng.srt
|
37.3 KB
|
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.mp4
|
13.2 MB
|
Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.eng.srt
|
54.4 KB
|
Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.mp4
|
20.9 MB
|
Bit Security as Computational Cost for Winning Games with High Probability.eng.srt
|
31.0 KB
|
Bit Security as Computational Cost for Winning Games with High Probability.mp4
|
11.2 MB
|
Boosting the Security of Blind Signature Schemes.eng.srt
|
21.7 KB
|
Boosting the Security of Blind Signature Schemes.mp4
|
6.9 MB
|
Bounded Collusion ABE for TMs from IBE.eng.srt
|
30.8 KB
|
Bounded Collusion ABE for TMs from IBE.mp4
|
9.9 MB
|
Categorization of Faulty Nonce Misuse Resistant Message Authentication.eng.srt
|
28.2 KB
|
Categorization of Faulty Nonce Misuse Resistant Message Authentication.mp4
|
10.2 MB
|
Chain Reductions for Multi-Signatures and the HBMS Scheme.eng.srt
|
50.7 KB
|
Chain Reductions for Multi-Signatures and the HBMS Scheme.mp4
|
23.7 MB
|
Clustering Effect in Simon and Simeck.eng.srt
|
41.8 KB
|
Clustering Effect in Simon and Simeck.mp4
|
17.4 MB
|
Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.mp4
|
16.9 MB
|
ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.eng.srt
|
34.1 KB
|
ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.mp4
|
20.4 MB
|
Convexity of division property transitions theory, algorithms and compact models.eng.srt
|
41.4 KB
|
Convexity of division property transitions theory, algorithms and compact models.mp4
|
13.1 MB
|
Cryptanalysis of an oblivious PRF from supersingular isogenies.eng.srt
|
45.6 KB
|
Cryptanalysis of an oblivious PRF from supersingular isogenies.mp4
|
14.3 MB
|
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.eng.srt
|
25.4 KB
|
Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.mp4
|
7.2 MB
|
DEFAULT Cipher Level Resistance Against Differential Fault Attack.eng.srt
|
32.6 KB
|
DEFAULT Cipher Level Resistance Against Differential Fault Attack.mp4
|
12.1 MB
|
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.eng.srt
|
43.4 KB
|
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.mp4
|
18.6 MB
|
Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.eng.srt
|
42.2 KB
|
Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.mp4
|
19.6 MB
|
Double-Block-Length Hash Function for Minimum Memory Size.eng.srt
|
23.4 KB
|
Double-Block-Length Hash Function for Minimum Memory Size.mp4
|
10.2 MB
|
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.eng.srt
|
64.5 KB
|
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.mp4
|
23.4 MB
|
Efficient Boolean Search over Encrypted Data with Reduced Leakage.eng.srt
|
39.8 KB
|
Efficient Boolean Search over Encrypted Data with Reduced Leakage.mp4
|
14.7 MB
|
Efficient Leakage-Resilient MACs without Idealized Assumptions.mp4
|
15.7 MB
|
Efficient NIZKs for Algebraic Sets.mp4
|
23.9 MB
|
FAST Secure and High Performance Format-Preserving Encryption and Tokenization.mp4
|
14.0 MB
|
Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.eng.srt
|
34.8 KB
|
Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.mp4
|
11.7 MB
|
Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.mp4
|
26.4 MB
|
Fine-tuning the ISO IEC Standard LightMAC.mp4
|
11.8 MB
|
Franchised Quantum Money.eng.srt
|
24.0 KB
|
Franchised Quantum Money.mp4
|
8.4 MB
|
Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.eng.srt
|
42.3 KB
|
Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.mp4
|
15.3 MB
|
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.eng.srt
|
60.4 KB
|
Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.mp4
|
20.3 MB
|
Generic Framework for Key-Guessing Improvements.mp4
|
6.4 MB
|
Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.eng.srt
|
55.5 KB
|
Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.mp4
|
25.4 MB
|
Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.eng.srt
|
53.2 KB
|
Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.mp4
|
17.4 MB
|
Gladius LWR based efficient hybrid public key encryption with distributed decryption.eng.srt
|
40.1 KB
|
Gladius LWR based efficient hybrid public key encryption with distributed decryption.mp4
|
19.8 MB
|
Hierarchical Integrated Signature and Encryption.eng.srt
|
33.4 KB
|
Hierarchical Integrated Signature and Encryption.mp4
|
17.0 MB
|
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.eng.srt
|
37.6 KB
|
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.mp4
|
18.4 MB
|
How to Build a Trapdoor Function from an Encryption Scheme.eng.srt
|
37.3 KB
|
How to Build a Trapdoor Function from an Encryption Scheme.mp4
|
14.7 MB
|
IACR Distinguished Lecture by Professor Andrew Yao.eng.srt
|
82.7 KB
|
IACR Distinguished Lecture by Professor Andrew Yao.mp4
|
37.0 MB
|
Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.eng.srt
|
24.4 KB
|
Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.mp4
|
9.6 MB
|
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.eng.srt
|
54.7 KB
|
Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.mp4
|
17.2 MB
|
Improved single-round secure multiplication using regenerating codes.eng.srt
|
99.5 KB
|
Improved single-round secure multiplication using regenerating codes.mp4
|
38.0 MB
|
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.eng.srt
|
41.2 KB
|
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.mp4
|
18.0 MB
|
Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.eng.srt
|
40.9 KB
|
Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.mp4
|
16.4 MB
|
Lattice sieving via quantum random walks.eng.srt
|
39.2 KB
|
Lattice sieving via quantum random walks.mp4
|
17.4 MB
|
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.mp4
|
14.9 MB
|
Luby-Rackoff Backwards with More Users and More Security.eng.srt
|
62.0 KB
|
Luby-Rackoff Backwards with More Users and More Security.mp4
|
22.2 MB
|
Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.eng.srt
|
42.0 KB
|
Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.mp4
|
17.9 MB
|
Massive Superpoly Recovery with Nested Monomial Predictions.eng.srt
|
24.0 KB
|
Massive Superpoly Recovery with Nested Monomial Predictions.mp4
|
10.6 MB
|
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.eng.srt
|
30.2 KB
|
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.mp4
|
17.3 MB
|
New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.eng.srt
|
50.0 KB
|
New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.mp4
|
20.1 MB
|
NTRU Fatigue How Stretched is Overstretched.eng.srt
|
38.0 KB
|
NTRU Fatigue How Stretched is Overstretched.mp4
|
11.8 MB
|
On the hardness of the NTRU problem.eng.srt
|
58.5 KB
|
On the hardness of the NTRU problem.mp4
|
19.0 MB
|
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.eng.srt
|
40.6 KB
|
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.mp4
|
16.3 MB
|
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.eng.srt
|
85.2 KB
|
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.mp4
|
35.8 MB
|
Onion Routing with Replies.eng.srt
|
40.0 KB
|
Onion Routing with Replies.mp4
|
12.1 MB
|
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.mp4
|
16.4 MB
|
Private Join and Compute from PIR with Default.eng.srt
|
54.9 KB
|
Private Join and Compute from PIR with Default.mp4
|
17.4 MB
|
Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.eng.srt
|
32.0 KB
|
Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.mp4
|
16.2 MB
|
Proofs for Inner Pairing Products and Applications.eng.srt
|
47.0 KB
|
Proofs for Inner Pairing Products and Applications.mp4
|
23.3 MB
|
PrORAM Fast O(log n) Authenticated Shares ZK ORAM.eng.srt
|
44.8 KB
|
PrORAM Fast O(log n) Authenticated Shares ZK ORAM.mp4
|
12.4 MB
|
Public Key Encryption with Flexible Pattern Matching.eng.srt
|
30.8 KB
|
Public Key Encryption with Flexible Pattern Matching.mp4
|
12.9 MB
|
QCB Efficient Quantum-secure Authenticated Encryption.eng.srt
|
41.3 KB
|
QCB Efficient Quantum-secure Authenticated Encryption.mp4
|
17.1 MB
|
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.eng.srt
|
36.0 KB
|
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.mp4
|
20.8 MB
|
Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.eng.srt
|
35.8 KB
|
Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.mp4
|
13.8 MB
|
Quantum Linearization Attacks.eng.srt
|
45.4 KB
|
Quantum Linearization Attacks.mp4
|
17.5 MB
|
Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.eng.srt
|
46.6 KB
|
Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.mp4
|
14.0 MB
|
Reverse Firewalls for Adaptively Secure MPC without Setup.eng.srt
|
38.1 KB
|
Reverse Firewalls for Adaptively Secure MPC without Setup.mp4
|
11.8 MB
|
Revisiting Homomorphic Encryption Schemes for Finite Fields.mp4
|
14.0 MB
|
Secure and Efficient Software Masking on Superscalar Pipelined Processors.eng.srt
|
52.4 KB
|
Secure and Efficient Software Masking on Superscalar Pipelined Processors.mp4
|
23.7 MB
|
Security Analysis of CPace.eng.srt
|
28.5 KB
|
Security Analysis of CPace.mp4
|
31.3 MB
|
Session on Enhanced PKE and Time-Lock Puzzles.eng.srt
|
105.4 KB
|
Session on Enhanced PKE and Time-Lock Puzzles.mp4
|
44.8 MB
|
Session on Homomorphic Encryption and Encrypted Search.eng.srt
|
80.7 KB
|
Session on Homomorphic Encryption and Encrypted Search.mp4
|
31.9 MB
|
Session on Lattice Cryptanalysis.eng.srt
|
73.4 KB
|
Session on Lattice Cryptanalysis.mp4
|
37.5 MB
|
Session on NIZK and SNARKs.eng.srt
|
72.5 KB
|
Session on NIZK and SNARKs.mp4
|
38.4 MB
|
Session on Quantum Security.eng.srt
|
109.4 KB
|
Session on Quantum Security.mp4
|
50.6 MB
|
Session on Real World Protocols.eng.srt
|
119.2 KB
|
Session on Real World Protocols.mp4
|
52.7 MB
|
Session on Symmetric Cryptanalysis (I).eng.srt
|
97.0 KB
|
Session on Symmetric Cryptanalysis (I).mp4
|
45.2 MB
|
Session on Symmetric Cryptanalysis (II).eng.srt
|
96.4 KB
|
Session on Symmetric Cryptanalysis (II).mp4
|
37.4 MB
|
Session on Symmetric-Key constructions.eng.srt
|
118.5 KB
|
Session on Symmetric-Key constructions.mp4
|
50.0 MB
|
Session on Zero-Knowledge Proofs, Threshold and Multi-Signatures.eng.srt
|
98.0 KB
|
Session on Zero-Knowledge Proofs, Threshold and Multi-Signatures.mp4
|
34.1 MB
|
session-1 Opening Remarks.eng.srt
|
9.3 KB
|
session-1 Opening Remarks.mp4
|
7.0 MB
|
session-5 Post-Quantum Cryptography.eng.srt
|
96.3 KB
|
session-5 Post-Quantum Cryptography.mp4
|
43.7 MB
|
session-6 Multiparty Computation.eng.srt
|
101.8 KB
|
session-6 Multiparty Computation.mp4
|
39.6 MB
|
session-13 Physical Attacks, Leakage and Countermeasures.eng.srt
|
107.4 KB
|
session-13 Physical Attacks, Leakage and Countermeasures.mp4
|
42.4 MB
|
session-14 Theory.eng.srt
|
115.0 KB
|
session-14 Theory.mp4
|
38.5 MB
|
session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.eng.srt
|
96.0 KB
|
session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.mp4
|
48.6 MB
|
session-17 Advanced Encryption and Signatures.eng.srt
|
100.4 KB
|
session-17 Advanced Encryption and Signatures.mp4
|
44.1 MB
|
session-23 Rump Session.eng.srt
|
34.9 KB
|
session-23 Rump Session.mp4
|
24.6 MB
|
session-34 Award Papers.eng.srt
|
154.9 KB
|
session-34 Award Papers.mp4
|
72.7 MB
|
session-36 IACR Distinguished Lecture by Andrew Yao.eng.srt
|
82.3 KB
|
session-36 IACR Distinguished Lecture by Andrew Yao.mp4
|
42.7 MB
|
session-37 Invited Talk by Kazue Sako.eng.srt
|
100.7 KB
|
session-37 Invited Talk by Kazue Sako.mp4
|
66.3 MB
|
session-39 Invited Talk 2 by Yu Yu.eng.srt
|
102.1 KB
|
session-39 Invited Talk 2 by Yu Yu.mp4
|
48.9 MB
|
session-48 Closing Remarks.eng.srt
|
6.0 KB
|
session-48 Closing Remarks.mp4
|
6.5 MB
|
session-53 Test-of-Time Award Program Chair Address.eng.srt
|
31.9 KB
|
session-53 Test-of-Time Award Program Chair Address.mp4
|
26.0 MB
|
SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.mp4
|
27.8 MB
|
Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.eng.srt
|
40.9 KB
|
Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.mp4
|
17.6 MB
|
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.eng.srt
|
34.2 KB
|
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.mp4
|
13.4 MB
|
Snarky Ceremonies.eng.srt
|
54.3 KB
|
Snarky Ceremonies.mp4
|
22.2 MB
|
Strong and Tight Security Guarantees against Integral Distinguishers.eng.srt
|
45.6 KB
|
Strong and Tight Security Guarantees against Integral Distinguishers.mp4
|
16.2 MB
|
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.eng.srt
|
43.5 KB
|
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.mp4
|
14.6 MB
|
Séta Supersingular Encryption from Torsion Attacks.eng.srt
|
51.4 KB
|
Séta Supersingular Encryption from Torsion Attacks.mp4
|
22.7 MB
|
Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.eng.srt
|
26.4 KB
|
Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.mp4
|
7.2 MB
|
The One-More Discrete Logarithm Assumption in the Generic Group Model.mp4
|
19.3 MB
|
Tight adaptive reprogramming in the QROM.eng.srt
|
46.2 KB
|
Tight adaptive reprogramming in the QROM.mp4
|
14.4 MB
|
Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.eng.srt
|
32.7 KB
|
Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.mp4
|
14.0 MB
|
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.eng.srt
|
21.6 KB
|
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.mp4
|
9.4 MB
|
Transciphering Framework for Approximate Homomorphic Encryption.eng.srt
|
28.9 KB
|
Transciphering Framework for Approximate Homomorphic Encryption.mp4
|
14.7 MB
|
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.eng.srt
|
41.5 KB
|
Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.mp4
|
16.0 MB
|
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.eng.srt
|
27.6 KB
|
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.mp4
|
9.5 MB
|
/Asiacrypt/Asiacrypt 2022/
|
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.eng.srt
|
8.6 KB
|
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.mp4
|
4.3 MB
|
A Modular Approach to the Security Analysis of Two-Permutation Constructions.eng.srt
|
11.2 KB
|
A Modular Approach to the Security Analysis of Two-Permutation Constructions.mp4
|
4.3 MB
|
A New Isogeny Representation and Applications to Cryptography.eng.srt
|
6.6 KB
|
A New Isogeny Representation and Applications to Cryptography.mp4
|
2.0 MB
|
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.eng.srt
|
8.0 KB
|
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.mp4
|
4.4 MB
|
A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.eng.srt
|
5.4 KB
|
A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.mp4
|
2.9 MB
|
A Universally Composable Non-Interactive Aggregate Cash System.eng.srt
|
7.4 KB
|
A Universally Composable Non-Interactive Aggregate Cash System.mp4
|
4.4 MB
|
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.eng.srt
|
7.5 KB
|
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.mp4
|
3.0 MB
|
Algebraic Meet-in-the-Middle Attack on LowMC.eng.srt
|
8.2 KB
|
Algebraic Meet-in-the-Middle Attack on LowMC.mp4
|
4.1 MB
|
An Analysis of the Algebraic Group Model.eng.srt
|
2.8 KB
|
An Analysis of the Algebraic Group Model.mp4
|
1.4 MB
|
Anonymous Public Key Encryption under Corruptions.eng.srt
|
7.5 KB
|
Anonymous Public Key Encryption under Corruptions.mp4
|
3.2 MB
|
Attaining GOD Beyond Honest Majority With Friends and Foes.eng.srt
|
10.0 KB
|
Attaining GOD Beyond Honest Majority With Friends and Foes.mp4
|
3.6 MB
|
Authenticated Encryption with Key Identification.eng.srt
|
8.3 KB
|
Authenticated Encryption with Key Identification.mp4
|
2.9 MB
|
BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.eng.srt
|
3.9 KB
|
BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.mp4
|
12.6 MB
|
Classically Verifiable NIZK for QMA with Preprocessing.eng.srt
|
6.9 KB
|
Classically Verifiable NIZK for QMA with Preprocessing.mp4
|
3.3 MB
|
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.eng.srt
|
8.4 KB
|
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.mp4
|
3.1 MB
|
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.eng.srt
|
7.6 KB
|
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.mp4
|
3.0 MB
|
Concurrently Composable Non-Interactive Secure Computation.eng.srt
|
9.4 KB
|
Concurrently Composable Non-Interactive Secure Computation.mp4
|
3.2 MB
|
Continuously Non-Malleable Codes against Bounded-Depth Tampering.eng.srt
|
8.8 KB
|
Continuously Non-Malleable Codes against Bounded-Depth Tampering.mp4
|
2.9 MB
|
Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.eng.srt
|
8.0 KB
|
Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.mp4
|
3.1 MB
|
Cryptographic Primitives with Hinting Property.eng.srt
|
10.8 KB
|
Cryptographic Primitives with Hinting Property.mp4
|
4.4 MB
|
DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.eng.srt
|
7.3 KB
|
DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.mp4
|
4.0 MB
|
Efficient Adaptively-Secure Byzantine Agreement for Long Messages.eng.srt
|
9.1 KB
|
Efficient Adaptively-Secure Byzantine Agreement for Long Messages.mp4
|
4.0 MB
|
Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.eng.srt
|
7.8 KB
|
Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.mp4
|
3.3 MB
|
Efficient Searchable Symmetric Encryption for Join Queries.eng.srt
|
5.9 KB
|
Efficient Searchable Symmetric Encryption for Join Queries.mp4
|
2.3 MB
|
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.eng.srt
|
4.2 KB
|
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.mp4
|
2.2 MB
|
Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.eng.srt
|
9.9 KB
|
Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.mp4
|
3.2 MB
|
Enhancing Differential-Neural Cryptanalysis.eng.srt
|
7.2 KB
|
Enhancing Differential-Neural Cryptanalysis.mp4
|
4.1 MB
|
EvalRound Algorithm in CKKS Bootstrapping.eng.srt
|
10.4 KB
|
EvalRound Algorithm in CKKS Bootstrapping.mp4
|
3.1 MB
|
Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.eng.srt
|
5.3 KB
|
Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.mp4
|
4.2 MB
|
Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.eng.srt
|
8.3 KB
|
Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.mp4
|
3.6 MB
|
FINAL Faster FHE instantiated with NTRU and LWE.eng.srt
|
8.7 KB
|
FINAL Faster FHE instantiated with NTRU and LWE.mp4
|
3.5 MB
|
Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.eng.srt
|
4.6 KB
|
Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.mp4
|
2.4 MB
|
Full Quantum Equivalence of Group Action DLog and CDH, and More.eng.srt
|
8.4 KB
|
Full Quantum Equivalence of Group Action DLog and CDH, and More.mp4
|
3.7 MB
|
Functional Encryption with Secure Key Leasing.eng.srt
|
4.9 KB
|
Functional Encryption with Secure Key Leasing.mp4
|
2.1 MB
|
General Properties of Quantum Bit Commitments (Extended Abstract).eng.srt
|
7.5 KB
|
General Properties of Quantum Bit Commitments (Extended Abstract).mp4
|
4.6 MB
|
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.eng.srt
|
7.1 KB
|
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.mp4
|
2.0 MB
|
GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.mp4
|
3.5 MB
|
Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.eng.srt
|
5.9 KB
|
Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.mp4
|
2.3 MB
|
Horizontal racewalking using radical isogenies.eng.srt
|
7.3 KB
|
Horizontal racewalking using radical isogenies.mp4
|
2.2 MB
|
Identity-Based Matchmaking Encryption from Standard Assumptions.eng.srt
|
5.7 KB
|
Identity-Based Matchmaking Encryption from Standard Assumptions.mp4
|
1.8 MB
|
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.eng.srt
|
7.4 KB
|
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.mp4
|
2.3 MB
|
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.eng.srt
|
3.9 KB
|
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.mp4
|
2.7 MB
|
invited talk by Damien Stehlé.eng.srt
|
75.4 KB
|
invited talk by Damien Stehlé.mp4
|
39.9 MB
|
Invited talk by Jian Guo.eng.srt
|
66.5 KB
|
Invited talk by Jian Guo.mp4
|
36.8 MB
|
Jammin' on the deck.eng.srt
|
8.8 KB
|
Jammin' on the deck.mp4
|
3.8 MB
|
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.eng.srt
|
6.4 KB
|
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.mp4
|
3.0 MB
|
Key-schedule Security for the TLS 1.3 Standard.eng.srt
|
9.0 KB
|
Key-schedule Security for the TLS 1.3 Standard.mp4
|
3.6 MB
|
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.eng.srt
|
9.0 KB
|
Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.mp4
|
4.5 MB
|
Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.eng.srt
|
7.3 KB
|
Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.mp4
|
2.6 MB
|
Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.eng.srt
|
3.4 KB
|
Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.mp4
|
1.6 MB
|
Linear-map Vector Commitments and their Practical Applications.eng.srt
|
9.0 KB
|
Linear-map Vector Commitments and their Practical Applications.mp4
|
3.0 MB
|
Memory-Tight Multi-Challenge Security of Public-Key Encryption.eng.srt
|
7.5 KB
|
Memory-Tight Multi-Challenge Security of Public-Key Encryption.mp4
|
3.3 MB
|
Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.mp4
|
3.9 MB
|
Multi-Client Functional Encryption with Fine-Grained Access Control.eng.srt
|
7.8 KB
|
Multi-Client Functional Encryption with Fine-Grained Access Control.mp4
|
2.4 MB
|
Multi-User Security of the Sum of Truncated Random Permutations.eng.srt
|
5.4 KB
|
Multi-User Security of the Sum of Truncated Random Permutations.mp4
|
3.3 MB
|
New Algorithms and Analyses for Sum-Preserving Encryption.eng.srt
|
7.3 KB
|
New Algorithms and Analyses for Sum-Preserving Encryption.mp4
|
2.9 MB
|
Non-interactive Mimblewimble transactions, revisited.eng.srt
|
12.2 KB
|
Non-interactive Mimblewimble transactions, revisited.mp4
|
5.1 MB
|
Non-Interactive Secure Computation of Inner-Product from LPN and LWE.eng.srt
|
9.5 KB
|
Non-Interactive Secure Computation of Inner-Product from LPN and LWE.mp4
|
4.6 MB
|
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.eng.srt
|
7.1 KB
|
Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.mp4
|
3.9 MB
|
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.eng.srt
|
8.3 KB
|
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.mp4
|
3.2 MB
|
Nostradamus goes Quantum.eng.srt
|
7.3 KB
|
Nostradamus goes Quantum.mp4
|
3.2 MB
|
On Module Unique-SVP and NTRU.eng.srt
|
4.9 KB
|
On Module Unique-SVP and NTRU.mp4
|
1.4 MB
|
On Rejection Sampling in Lyubashevsky's Signature Scheme.eng.srt
|
3.4 KB
|
On Rejection Sampling in Lyubashevsky's Signature Scheme.mp4
|
5.1 MB
|
On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.eng.srt
|
6.3 KB
|
On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.mp4
|
3.4 MB
|
Opening remarks.eng.srt
|
4.3 KB
|
Opening remarks.mp4
|
4.9 MB
|
Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.eng.srt
|
7.6 KB
|
Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.mp4
|
3.6 MB
|
Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.eng.srt
|
5.5 KB
|
Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.mp4
|
2.3 MB
|
Practical Provably Secure Flooding for Blockchains.eng.srt
|
6.7 KB
|
Practical Provably Secure Flooding for Blockchains.mp4
|
2.8 MB
|
Privacy-Preserving Authenticated Key Exchange in the Standard Model.eng.srt
|
8.6 KB
|
Privacy-Preserving Authenticated Key Exchange in the Standard Model.mp4
|
4.0 MB
|
Puncturable Key Wrapping and Its Applications.eng.srt
|
8.8 KB
|
Puncturable Key Wrapping and Its Applications.mp4
|
5.4 MB
|
Random Sources in Private Computation.eng.srt
|
10.5 KB
|
Random Sources in Private Computation.mp4
|
4.9 MB
|
Recovering the tight security proof of SPHINCS.eng.srt
|
7.5 KB
|
Recovering the tight security proof of SPHINCS.mp4
|
3.3 MB
|
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.eng.srt
|
4.9 KB
|
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.mp4
|
3.7 MB
|
Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.eng.srt
|
7.4 KB
|
Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.mp4
|
1.6 MB
|
rump session 1.eng.srt
|
51.9 KB
|
rump session 1.mp4
|
25.9 MB
|
rump session 2.eng.srt
|
26.2 KB
|
rump session 2.mp4
|
13.7 MB
|
rump session 3.eng.srt
|
22.6 KB
|
rump session 3.mp4
|
24.2 MB
|
Security of Truncated Permutation Without Initial Value.eng.srt
|
9.4 KB
|
Security of Truncated Permutation Without Initial Value.mp4
|
4.2 MB
|
Session for award papers.eng.srt
|
122.8 KB
|
Session for award papers.mp4
|
44.7 MB
|
Session on advanced encryption 1.eng.srt
|
114.0 KB
|
Session on advanced encryption 1.mp4
|
39.4 MB
|
Session on Advanced Encryption 2.eng.srt
|
136.4 KB
|
Session on Advanced Encryption 2.mp4
|
52.4 MB
|
Session on Blockchains and Cryptocurrencies.eng.srt
|
101.5 KB
|
Session on Blockchains and Cryptocurrencies.mp4
|
33.2 MB
|
Session on Commitments.eng.srt
|
152.9 KB
|
Session on Commitments.mp4
|
55.6 MB
|
Session on Cryptanalysis.eng.srt
|
136.8 KB
|
Session on Cryptanalysis.mp4
|
59.2 MB
|
Session on Functional and Witness Encryption.eng.srt
|
140.3 KB
|
Session on Functional and Witness Encryption.mp4
|
59.1 MB
|
Session on Homomorphic Encryption.eng.srt
|
146.0 KB
|
Session on Homomorphic Encryption.mp4
|
52.6 MB
|
Session on Isogeny Based Cryptography.eng.srt
|
93.4 KB
|
Session on Isogeny Based Cryptography.mp4
|
33.2 MB
|
Session on Lattice Algorithms and Cryptanalysis.eng.srt
|
106.6 KB
|
Session on Lattice Algorithms and Cryptanalysis.mp4
|
54.4 MB
|
Session on Multiparty Computation 1.eng.srt
|
138.6 KB
|
Session on Multiparty Computation 1.mp4
|
59.4 MB
|
Session on multiparty computation 2.eng.srt
|
106.4 KB
|
Session on multiparty computation 2.mp4
|
40.0 MB
|
Session on non interactive zero knowledge.eng.srt
|
101.3 KB
|
Session on non interactive zero knowledge.mp4
|
36.7 MB
|
Session on practical cryptography 1.eng.srt
|
92.3 KB
|
Session on practical cryptography 1.mp4
|
35.8 MB
|
Session on Practical Cryptography 2.eng.srt
|
102.4 KB
|
Session on Practical Cryptography 2.mp4
|
45.3 MB
|
Session on Practical Cryptography 3 and Closing Remarks.eng.srt
|
99.0 KB
|
Session on Practical Cryptography 3 and Closing Remarks.mp4
|
36.8 MB
|
Session on Proofs and SNARKs.eng.srt
|
148.2 KB
|
Session on Proofs and SNARKs.mp4
|
53.4 MB
|
Session on quantum algorithms.eng.srt
|
90.9 KB
|
Session on quantum algorithms.mp4
|
42.1 MB
|
Session on Quantum Cryptography.eng.srt
|
95.1 KB
|
Session on Quantum Cryptography.mp4
|
50.8 MB
|
Session on Real World Protocols.eng.srt
|
133.9 KB
|
Session on Real World Protocols.mp4
|
49.1 MB
|
Session on Signatures.eng.srt
|
122.3 KB
|
Session on Signatures.mp4
|
55.1 MB
|
Session on symmetric cryptography 1.eng.srt
|
105.0 KB
|
Session on symmetric cryptography 1.mp4
|
41.3 MB
|
Session on symmetric cryptography 2.eng.srt
|
87.2 KB
|
Session on symmetric cryptography 2.mp4
|
29.3 MB
|
Session on symmetric key cryptanalysis 2.eng.srt
|
101.1 KB
|
Session on symmetric key cryptanalysis 2.mp4
|
38.5 MB
|
Session on Symmetric Key Cryptanalysis I.eng.srt
|
128.8 KB
|
Session on Symmetric Key Cryptanalysis I.mp4
|
56.5 MB
|
Session on Theory 1.eng.srt
|
156.7 KB
|
Session on Theory 1.mp4
|
51.5 MB
|
Session on Theory 2.eng.srt
|
107.0 KB
|
Session on Theory 2.mp4
|
39.5 MB
|
Session on zero knowledge 1.eng.srt
|
98.1 KB
|
Session on zero knowledge 1.mp4
|
40.1 MB
|
Session on zero knowledge 2.eng.srt
|
72.7 KB
|
Session on zero knowledge 2.mp4
|
41.1 MB
|
Short-lived zero-knowledge proofs and signatures.eng.srt
|
8.8 KB
|
Short-lived zero-knowledge proofs and signatures.mp4
|
3.1 MB
|
SIDH Proof of Knowledge.eng.srt
|
9.1 KB
|
SIDH Proof of Knowledge.mp4
|
2.9 MB
|
SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.eng.srt
|
9.1 KB
|
SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.mp4
|
2.9 MB
|
State Machine Replication under Changing Network Conditions.eng.srt
|
10.7 KB
|
State Machine Replication under Changing Network Conditions.mp4
|
3.5 MB
|
Statistical Decoding 2.0 Reducing Decoding to LPN.mp4
|
2.9 MB
|
Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.eng.srt
|
7.3 KB
|
Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.mp4
|
3.8 MB
|
SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.eng.srt
|
10.7 KB
|
SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.mp4
|
3.7 MB
|
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.eng.srt
|
7.9 KB
|
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.mp4
|
4.5 MB
|
The Abe-Okamoto Partially Blind Signature Scheme Revisited.eng.srt
|
7.6 KB
|
The Abe-Okamoto Partially Blind Signature Scheme Revisited.mp4
|
2.4 MB
|
Threshold Linearly Homomorphic Encryption on Z 2kZ.eng.srt
|
5.2 KB
|
Threshold Linearly Homomorphic Encryption on Z 2kZ.mp4
|
1.7 MB
|
Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.eng.srt
|
3.5 KB
|
Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.mp4
|
1.1 MB
|
Towards Practical Topology-Hiding Computation.mp4
|
4.5 MB
|
Towards Tight Security Bounds for OMAC, XCBC and TMAC.eng.srt
|
4.1 KB
|
Towards Tight Security Bounds for OMAC, XCBC and TMAC.mp4
|
1.6 MB
|
Triply Adaptive UC NIZK.eng.srt
|
13.7 KB
|
Triply Adaptive UC NIZK.mp4
|
4.8 MB
|
Unconditionally Secure NIZK in the Fine-Grained Setting.eng.srt
|
8.1 KB
|
Unconditionally Secure NIZK in the Fine-Grained Setting.mp4
|
3.0 MB
|
Universal Ring Signatures in the Standard Model.eng.srt
|
7.1 KB
|
Universal Ring Signatures in the Standard Model.mp4
|
2.3 MB
|
YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.eng.srt
|
14.9 KB
|
YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.mp4
|
4.7 MB
|
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.eng.srt
|
6.8 KB
|
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.mp4
|
3.1 MB
|
/Crypto/Crypto 2011/
|
1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).mp4
|
15.9 MB
|
A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.mp4
|
16.2 MB
|
A New Variant of PMAC - Beyond the Birthday Bound.mp4
|
36.4 MB
|
Analyzing Blockwise Lattice Algorithms using Dynamical Systems.mp4
|
16.6 MB
|
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.mp4
|
15.6 MB
|
Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).mp4
|
18.4 MB
|
Bi-Deniable Public-Key Encryption.mp4
|
21.1 MB
|
Classical Cryptographic Protocols in a Quantum World.mp4
|
16.8 MB
|
Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).mp4
|
23.9 MB
|
Constant-Rate Oblivious Transfer from Noisy Channels.mp4
|
17.6 MB
|
Cryptanalysis of PrintCIPHER.mp4
|
15.7 MB
|
Cryptography with Tamperable and Leaky Memory (Crypto 2011).mp4
|
17.9 MB
|
Fully Homomorphic Encryption over the Integers with Shorter Public Keys.mp4
|
19.6 MB
|
Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).mp4
|
17.7 MB
|
Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4
|
53.7 MB
|
Inverting HFE Systems is Quasi-Polynomial for All Fields.mp4
|
21.0 MB
|
Leakage-Resilient Zero Knowledge (Crypto 2011).mp4
|
17.6 MB
|
Leftover Hash Lemma, Revisited (Crypto 2011).mp4
|
24.4 MB
|
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.mp4
|
16.5 MB
|
Memory Delegation (Crypto 2011).mp4
|
17.5 MB
|
Merkle Puzzles in a Quantum World.mp4
|
18.1 MB
|
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.mp4
|
19.4 MB
|
Optimal Verification of Operations on Dynamic Sets (Crypto 2011).mp4
|
18.5 MB
|
Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.mp4
|
19.0 MB
|
Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).mp4
|
18.3 MB
|
Physically Uncloneable Functions in the Universal Composition Framework.mp4
|
18.5 MB
|
Position-Based Quantum Cryptography - Impossibility and Constructions.mp4
|
22.4 MB
|
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.mp4
|
34.5 MB
|
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.mp4
|
19.9 MB
|
Random Oracle Reducibility (Crypto 2011).mp4
|
13.7 MB
|
Round Optimal Blind Signatures in the Standard Model.mp4
|
18.1 MB
|
Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).mp4
|
20.7 MB
|
Smaller Decoding Exponents - Ball-Collision Decoding.mp4
|
20.9 MB
|
The Collision Security of Tandem-DM in the Ideal Cipher Model.mp4
|
18.0 MB
|
The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).mp4
|
21.6 MB
|
The PHOTON Family of Lightweight Hash Functions (Crypto 2011).mp4
|
17.5 MB
|
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.mp4
|
19.2 MB
|
Time-Lock Puzzles in the Random Oracle Model.mp4
|
19.1 MB
|
Tor and Circumvention - Lessons Learned, by Roger Dingledine.mp4
|
64.4 MB
|
Verifiable Delegation of Computation over Large Datasets (Crypto 2011).mp4
|
18.9 MB
|
/.../Crypto 2011 Rump Sessions/
|
(More) Efficient Secure Computation from Garbled Circuits.mp4
|
5.1 MB
|
A brief chat about approximate GCDs.mp4
|
4.3 MB
|
A silent competition for ultra-fast public key cryptography.mp4
|
3.2 MB
|
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.mp4
|
4.7 MB
|
An Application Of Frequency Shift Keying To Communication Resynchronisation.mp4
|
1.6 MB
|
An historical call for papers.mp4
|
5.2 MB
|
An update about HiDalgo.mp4
|
4.3 MB
|
Biclique cryptanalysis of the full AES.mp4
|
7.0 MB
|
Blinding ballot copying in Helios - from Condorcet to IACR.mp4
|
4.2 MB
|
Bounds on Cloud File Retrievability.mp4
|
3.2 MB
|
Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.mp4
|
6.4 MB
|
Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.mp4
|
5.8 MB
|
Extreme Threshold Cryptosystems.mp4
|
5.3 MB
|
FlipIt and the Cramér-Rao bound.mp4
|
3.7 MB
|
HBN - An HB-like protocol secure against Man-in-the-Middle attacks.mp4
|
5.3 MB
|
Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).mp4
|
5.8 MB
|
Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.mp4
|
4.8 MB
|
NIST Announcements.mp4
|
5.0 MB
|
Non-Malleable Codes in the Split-State Model.mp4
|
4.0 MB
|
Observations on H-PRESENT-128.mp4
|
3.8 MB
|
Panel discussion on leakage.mp4
|
2.2 MB
|
Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.mp4
|
2.4 MB
|
Predicate Encryption for Inner Products from LWE.mp4
|
3.3 MB
|
Pseudorandom Functions and Lattices.mp4
|
4.8 MB
|
Remotegrity.mp4
|
5.2 MB
|
Rethinking IDEA.mp4
|
4.0 MB
|
Robust Coin Flipping.mp4
|
5.9 MB
|
Secure Computation with Sublinear Amortized Work.mp4
|
4.7 MB
|
Secure Verification of Delegated Presentation Delivery.mp4
|
3.1 MB
|
The 2011 IACR Fellowship Induction Ceremony.mp4
|
13.1 MB
|
The Garden-Hose Model.mp4
|
4.8 MB
|
The Hunting of the SNARK.mp4
|
4.8 MB
|
Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.mp4
|
4.8 MB
|
Variants of Sponge-like Construction.mp4
|
3.3 MB
|
/Crypto/Crypto 2012/
|
A New Approach to Practical Active-Secure Two-Party Comp.mp4
|
10.5 MB
|
Actively Secure Two-Party Evaluation of Any Quantum Oper.mp4
|
19.1 MB
|
Adaptively Secure Multi-Party Computation with Dishonest.mp4
|
14.5 MB
|
An Enciphering Scheme Based on a Card Shuffle.mp4
|
17.8 MB
|
Black-Box Constructions of Composable Protocols without.mp4
|
15.4 MB
|
Breaking and Repairing GCM Security Proofs.mp4
|
18.5 MB
|
Collusion-Preserving Computation.mp4
|
22.7 MB
|
Crowd-Blending Privacy.mp4
|
12.6 MB
|
Differential Privacy with Imperfect Randomness.mp4
|
19.5 MB
|
Dynamic Credentials and Ciphertext Delegation for Attrib.mp4
|
14.6 MB
|
Efficient Dissection of Composite Problems, with Applica.mp4
|
29.2 MB
|
Efficient Padding Oracle Attacks on Cryptographic Hardware.mp4
|
19.1 MB
|
Fully Homomorphic Encryption without Modulus Switching f.mp4
|
21.2 MB
|
Functional Encryption for Regular Languages.mp4
|
12.1 MB
|
Functional Encryption with Bounded Collusions via Multi-.mp4
|
17.5 MB
|
Hardness of Computing Individual Bits for One-Way Functi.mp4
|
17.0 MB
|
Hash Functions Based on Three Permutations - A Generic Se.mp4
|
16.4 MB
|
Homomorphic Evaluation of the AES Circuit.mp4
|
22.0 MB
|
Multi-instance Security and Its Application to Password-.mp4
|
14.3 MB
|
Multiparty Computation from Somewhat Homomorphic Encryption.mp4
|
12.3 MB
|
Must You Know the Code of f to Securely Compute f.mp4
|
19.1 MB
|
Near-Linear Unconditionally-Secure Multiparty Computatio.mp4
|
19.5 MB
|
New Impossibility Results for Concurrent Composition and.mp4
|
10.4 MB
|
New Preimage Attacks against Reduced SHA-1.mp4
|
7.9 MB
|
On the Distribution of Linear Biases - Three Instructive.mp4
|
15.8 MB
|
On the Impossibility of Constructing Efficient Key Encap.mp4
|
17.4 MB
|
On the Security of TLS-DHE in the Standard Model.mp4
|
16.5 MB
|
Pinning Down - Privacy - in Statistical Databases.mp4
|
87.4 MB
|
Public Keys.mp4
|
17.2 MB
|
Quantum to Classical Randomness Extractors.mp4
|
16.5 MB
|
Resistance against Iterated Attacks by Decorrelation Rev.mp4
|
16.2 MB
|
Secret Sharing Schemes for Very Dense Graphs.mp4
|
18.6 MB
|
Secure Identity-Based Encryption in the Quantum Random O.mp4
|
16.4 MB
|
Securing Circuits against Constant-Rate Tampering.mp4
|
15.7 MB
|
Semantic Security for the Wiretap Channel.mp4
|
12.9 MB
|
Stam's Conjecture and Threshold Phenomena in Collision R.mp4
|
12.6 MB
|
Substitution-Permutation Networks, Pseudorandom Function.mp4
|
25.4 MB
|
Succinct Arguments from Multi-prover Interactive Proofs.mp4
|
17.8 MB
|
Tamper and Leakage Resilience in the Split-State Model.mp4
|
14.9 MB
|
The Curious Case of Non-Interactive Commitments - On the.mp4
|
18.4 MB
|
The End of Crypto.mp4
|
72.4 MB
|
Tightly Secure Signatures and Public-Key Encryption.mp4
|
13.8 MB
|
To Hash or Not to Hash Again (In)Differentiability Resu.mp4
|
15.8 MB
|
Tweakable Blockciphers with Beyond Birthday-Bound Security.mp4
|
15.9 MB
|
Universal Composability from Essentially Any Trusted Setup.mp4
|
16.5 MB
|
Welcome to Crypto 2012.mp4
|
5.0 MB
|
/Crypto/Crypto 2013/
|
A Uniform Min-Max Theorem with Applications in Cryptography.mp4
|
22.9 MB
|
Accuracy-Privacy Tradeoffs for Two-Party Differentially.mp4
|
14.2 MB
|
Achieving the Limits of the Noisy-Storage Model Using En.mp4
|
25.9 MB
|
An Algebraic Framework for Diffie-Hellman Assumptions.mp4
|
28.1 MB
|
Attribute-Based Encryption for Circuits from Multilinear.mp4
|
24.3 MB
|
Construction of Differential Characteristics in ARX Desi.mp4
|
26.6 MB
|
Counter-Cryptanalysis.mp4
|
36.5 MB
|
Digital Signatures with Minimal Overhead from Indifferen.mp4
|
28.5 MB
|
Efficient Multiparty Protocols via Log-Depth Threshold F.mp4
|
26.2 MB
|
Encoding Functions with Constant Online Rate or How to C.mp4
|
30.7 MB
|
Everlasting Multi-party Computation.mp4
|
31.2 MB
|
Fast Cut-and-Choose Based Protocols for Malicious and Co.mp4
|
15.6 MB
|
Full Domain Hash from (Leveled) Multilinear Maps and Ide.mp4
|
21.0 MB
|
Functional Encryption - New Perspectives and Lower Bounds.mp4
|
22.4 MB
|
Hard-Core Predicates for a Diffie-Hellman Problem over F.mp4
|
27.7 MB
|
Hardness of SIS and LWE with Small Parameters.mp4
|
27.4 MB
|
Highly-Scalable Searchable Symmetric Encryption with Sup.mp4
|
35.7 MB
|
Homomorphic Encryption from Learning with Errors - Concep.mp4
|
28.2 MB
|
How to Run Turing Machines on Encrypted Data.mp4
|
26.9 MB
|
Improved OT Extension for Transferring Short Secrets.mp4
|
18.0 MB
|
Instantiating Random Oracles via UCEs.mp4
|
24.2 MB
|
Leakage-Resilient Symmetric Cryptography under Empirical.mp4
|
30.2 MB
|
Learning with Rounding, Revisited - New Reduction, Prope.mp4
|
20.8 MB
|
Limits of Provable Security for Homomorphic Encryption.mp4
|
25.0 MB
|
Limits on the Power of Cryptographic Cheap Talk.mp4
|
19.3 MB
|
New Techniques for SPHFs and Efficient One-Round PAKE Pr.mp4
|
28.7 MB
|
Non-malleable Codes from Two-Source Extractors.mp4
|
21.1 MB
|
On Fair Exchange, Fair Coins and Fair Sampling - YouTube.mp4
|
15.2 MB
|
On the Achievability of Simulation-Based Security for Fu.mp4
|
22.7 MB
|
On the Indifferentiability of Key-Alternating Ciphers.mp4
|
27.0 MB
|
Optimal Coding for Streaming Authentication and Interact.mp4
|
19.5 MB
|
Plain versus Randomized Cascading-Based Key-Length Exten.mp4
|
25.7 MB
|
Practical Bootstrapping in Quasilinear Time.mp4
|
22.3 MB
|
Practical Multilinear Maps over the Integers.mp4
|
25.5 MB
|
Programmable Hash Functions in the Multilinear Setting.mp4
|
23.7 MB
|
Quantum One-Time Programs - (Extended Abstract).mp4
|
26.2 MB
|
Real Time Cryptanalysis of Bluetooth Encryption with Con.mp4
|
36.2 MB
|
Secret Sharing, Rank Inequalities and Information Inequa.mp4
|
26.5 MB
|
Secure Computation against Adaptive Auxiliary Information.mp4
|
26.7 MB
|
Secure Signatures and Chosen Ciphertext Security in a Qu.mp4
|
21.7 MB
|
Sieve-in-the-Middle - Improved MITM Attacks.mp4
|
29.3 MB
|
SNARKs for C - Verifying Program Executions Succinctly an.mp4
|
27.8 MB
|
The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.mp4
|
28.6 MB
|
Time-Optimal Interactive Proofs for Circuit Evaluation.mp4
|
28.6 MB
|
What Information Is Leaked under Concurrent Composition.mp4
|
22.7 MB
|
/.../Crypto 2013 Rump Session/
|
Spying NSA (reprise)..mp4
|
8.7 MB
|
Spying NSA.mp4
|
8.6 MB
|
Under Surveillance.mp4
|
7.0 MB
|
/Crypto/Crypto 2014/
|
Algorithms in HElib.mp4
|
11.6 MB
|
Amplifying Privacy in Privacy Amplification.mp4
|
16.2 MB
|
Automated Analysis of Cryptographic Assumptions in Generic Group Models.mp4
|
16.4 MB
|
Block Ciphers - Focus on the Linear Layer (feat. PRIDE).mp4
|
13.6 MB
|
Breaking '128-bit Secure' Supersingular Binary Curves.mp4
|
15.3 MB
|
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.mp4
|
12.6 MB
|
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.mp4
|
17.7 MB
|
Cryptography from Compression Functions - The UCE Bridge to the ROM.mp4
|
18.0 MB
|
Cryptography with Streaming Algorithms.mp4
|
13.6 MB
|
Dishonest Majority Multi-Party Computation for Binary Circuits.mp4
|
11.1 MB
|
Faster Bootstrapping with Polynomial Error.mp4
|
12.7 MB
|
FleXOR - Flexible garbling for XOR gates that beats free-XOR.mp4
|
14.4 MB
|
Hardness of k-LWE and Applications in Traitor Tracing.mp4
|
17.3 MB
|
Hierarchical Identity Based Encryption from Affine Messafe Authentication.mp4
|
10.4 MB
|
Homomorphic Signatures with Efficient Verification for Polynomial Functions.mp4
|
17.5 MB
|
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.mp4
|
10.4 MB
|
How to Use Bitcoin to Design Fair Protocols.mp4
|
19.5 MB
|
IACR Distinguished Lecture - Caught in Between Theory and Practice.mp4
|
65.6 MB
|
Improved Generic Attacks against Hash-Based MACs and HAIFA.mp4
|
17.5 MB
|
Improved Short Lattice Signatures in the Standard Model.mp4
|
13.7 MB
|
Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.mp4
|
18.3 MB
|
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.mp4
|
6.7 MB
|
Interactive Proofs under Continual Memory Leakage.mp4
|
15.7 MB
|
Invited Talk - How to delegate computations - the power of no-signaling proofs.mp4
|
38.1 MB
|
Leakage-Tolerant Computation with Input-Independent Preprocessing.mp4
|
15.4 MB
|
Low Overhead Broadcast Encryption from Multilinear Maps.mp4
|
19.8 MB
|
Maliciously Circuit-Private FHE.mp4
|
10.8 MB
|
Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.mp4
|
13.4 MB
|
Minimizing the Two-Round Even-Mansour Cipher.mp4
|
16.8 MB
|
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.mp4
|
5.7 MB
|
New and Improved Key-Homomorphic Pseudorandom Functions.mp4
|
15.5 MB
|
Non-Interactive Secure Multiparty Computation.mp4
|
15.2 MB
|
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.mp4
|
8.9 MB
|
On Virtual Grey Box Obfuscation for General Circuits.mp4
|
13.7 MB
|
Optimal Non-perfect Uniform Secret Sharing Schemes.mp4
|
15.8 MB
|
Physical Zero-Knowledge Proofs of Physical Properties.mp4
|
15.8 MB
|
Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.mp4
|
19.6 MB
|
Proving the TLS Handshake Secure (As It Is).mp4
|
15.7 MB
|
Quantum Position Verification in the Random Oracle Model.mp4
|
10.3 MB
|
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.mp4
|
9.0 MB
|
Round-Efficient Black-Box Construction of Composable Multi-Party Computation.mp4
|
15.0 MB
|
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.mp4
|
20.0 MB
|
Scalable Zero Knowledge via Cycles of Elliptic Curves.mp4
|
15.0 MB
|
Secure Multi-Party Computation with Identifiable Abort.mp4
|
17.6 MB
|
Security Analysis of Multilinear Maps over the Integers.mp4
|
19.2 MB
|
Security of Symmetric Encryption against Mass Surveillance.mp4
|
16.9 MB
|
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.mp4
|
13.0 MB
|
Single-Shot Security for One-Time Memories in the Isolated Qubits Model.mp4
|
13.6 MB
|
Structure-Preserving Signatures from Type II Pairings.mp4
|
13.6 MB
|
The Exact PRF-Security of NMAC and HMAC.mp4
|
19.3 MB
|
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.mp4
|
15.8 MB
|
The Security of Multiple Encryption in the Ideal Cipher Model.mp4
|
12.5 MB
|
Updates on Generic Attacks against HMAC and NMAC.mp4
|
18.0 MB
|
/Crypto/Crypto 2015/
|
A Punctured Programming Approach to Adaptive Security in Functional Encryption.mp4
|
12.9 MB
|
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.mp4
|
19.7 MB
|
Algebriac Decomposition for Probing Security.mp4
|
20.1 MB
|
Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.mp4
|
22.1 MB
|
An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.mp4
|
9.9 MB
|
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.mp4
|
16.0 MB
|
Arguments of Proximity.mp4
|
16.0 MB
|
Bilinear Entropy Expansion from the Decisional Linear Assumption.mp4
|
11.8 MB
|
Bit Commitment schemes with Non Signaling Adversaries.mp4
|
11.4 MB
|
Bloom Filters in Adversarial Environments.mp4
|
15.7 MB
|
Capacity and Data Complexity in Multidimensional Linear Attack.mp4
|
16.9 MB
|
Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.mp4
|
10.8 MB
|
Concurrent Secure Computation via Non Black Box Simulation.mp4
|
15.6 MB
|
Concurrent Secure Computation with Optimal Query Complexity.mp4
|
18.7 MB
|
Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.mp4
|
11.7 MB
|
Constant Round MPC with Fairness and Guarantee of Output Delivery.mp4
|
14.2 MB
|
Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.mp4
|
22.9 MB
|
Cryptanalysis of the Co ACD Assumption.mp4
|
16.1 MB
|
Cryptography with One Way Communication.mp4
|
14.3 MB
|
Cryptography, Security, and Public Safety A Policy Perspective.mp4
|
24.2 MB
|
Data Is a Stream Security of Stream Based Channels.mp4
|
18.1 MB
|
Decaf Eliminating Cofactors Through Quotients and Isogenies.mp4
|
14.6 MB
|
Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.mp4
|
17.0 MB
|
Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.mp4
|
18.6 MB
|
Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.mp4
|
16.3 MB
|
Efficient Pseudorandom Functions via On the Fly Adaptation.mp4
|
10.7 MB
|
Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.mp4
|
13.2 MB
|
Explicit Non malleable Codes against Bit wise Tampering adn Permutations.mp4
|
12.8 MB
|
Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.mp4
|
20.9 MB
|
From Selective to Adaptive Security in Functional Encryption.mp4
|
14.1 MB
|
Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.mp4
|
9.9 MB
|
Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.mp4
|
13.9 MB
|
Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.mp4
|
18.7 MB
|
Indistinguishability Obfuscation from Compact Functional Encryption.mp4
|
12.7 MB
|
Integral Cryptanalysis on Full MISTY1.mp4
|
21.6 MB
|
Known key Distinguisher on Full PRESENT.mp4
|
15.3 MB
|
Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.mp4
|
16.1 MB
|
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.mp4
|
13.7 MB
|
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.mp4
|
17.4 MB
|
Malicious for free OT Extension The Pipe is the Limit.mp4
|
13.9 MB
|
Multi Identity and Multi Key Leveled FHE from Learning with Errors.mp4
|
25.4 MB
|
Multi Key Security The Even Mansour Construction Revisted.mp4
|
12.1 MB
|
New Attacks on Feistel Structures with Improved Memory Complexities.mp4
|
26.3 MB
|
Observations on the SIMON Block Cipher Family.mp4
|
10.1 MB
|
Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.mp4
|
21.5 MB
|
Parallel Hashing via List Recoverability.mp4
|
15.2 MB
|
PoW Based Distributed Cryptography with no Trusted Setup.mp4
|
16.2 MB
|
Practical Free Start Collision Attacks on the 76 Step SHA 1.mp4
|
16.6 MB
|
Practical Round Optimal Blind Signatures in the Standard Model.mp4
|
13.2 MB
|
Predicate Encryption for Circuits from LWE.mp4
|
15.7 MB
|
Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.mp4
|
17.4 MB
|
Proofs of Space.mp4
|
17.4 MB
|
Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.mp4
|
15.1 MB
|
Secure Computation from Leaky Correlated Randomness.mp4
|
14.3 MB
|
Secure Computation with Minimal Interaction, Revisited.mp4
|
23.9 MB
|
Statistical Concurrent Non malleable Zero knowledfe from One way Functions.mp4
|
20.3 MB
|
The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.mp4
|
17.4 MB
|
The Iterated Random Permutation Problem with Applications to Cascade Encryption.mp4
|
12.6 MB
|
The State of Cryptographic Multilinear Maps.mp4
|
36.8 MB
|
Tweaking Even Mansour Ciphers.mp4
|
15.7 MB
|
Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.mp4
|
15.1 MB
|
/Crypto/Crypto 2016/
|
A 270 Attack on the Full MISTY1.eng.srt
|
16.5 KB
|
A 270 Attack on the Full MISTY1.mp4
|
22.2 MB
|
A Practical Cryptanalysis of the Algebraic Eraser.eng.srt
|
38.8 KB
|
A Practical Cryptanalysis of the Algebraic Eraser.mp4
|
29.6 MB
|
A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.mp4
|
35.1 MB
|
Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.mp4
|
35.3 MB
|
Adaptively Secure Garbled Circuits from One Way Functions.eng.srt
|
39.0 KB
|
Adaptively Secure Garbled Circuits from One Way Functions.mp4
|
44.3 MB
|
Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.mp4
|
28.3 MB
|
Akamai Faster Forward - Crypto at Scale.eng.srt
|
93.9 KB
|
Akamai Faster Forward - Crypto at Scale.mp4
|
57.4 MB
|
Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.eng.srt
|
42.1 KB
|
Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.mp4
|
43.2 MB
|
Another View of the Division Property.eng.srt
|
38.8 KB
|
Another View of the Division Property.mp4
|
34.4 MB
|
Automatic Search of Meet in the Middle and Impossible Differential Attacks.eng.srt
|
28.3 KB
|
Automatic Search of Meet in the Middle and Impossible Differential Attacks.mp4
|
33.0 MB
|
Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.eng.srt
|
39.1 KB
|
Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.mp4
|
24.9 MB
|
Big Key Symmetric Encryption - Resisting Key Exfiltration.eng.srt
|
39.6 KB
|
Big Key Symmetric Encryption - Resisting Key Exfiltration.mp4
|
22.0 MB
|
Bounded Indistinguishability and the Complexity of Recovering Secrets.eng.srt
|
38.8 KB
|
Bounded Indistinguishability and the Complexity of Recovering Secrets.mp4
|
42.3 MB
|
Breaking Symmetric Cryptosystems using Quantum Period Finding.eng.srt
|
42.2 KB
|
Breaking Symmetric Cryptosystems using Quantum Period Finding.mp4
|
37.9 MB
|
Breaking the Circuit Size Barrier for Secure Computation Under DDH.eng.srt
|
47.2 KB
|
Breaking the Circuit Size Barrier for Secure Computation Under DDH.mp4
|
29.9 MB
|
Concurrent Non Malleable Commitments and More in 3 Rounds.mp4
|
33.5 MB
|
Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.eng.srt
|
38.4 KB
|
Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.mp4
|
42.7 MB
|
Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.eng.srt
|
26.4 KB
|
Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.mp4
|
36.7 MB
|
Cryptanalysis of GGH15 Multilinear Maps.eng.srt
|
38.6 KB
|
Cryptanalysis of GGH15 Multilinear Maps.mp4
|
48.4 MB
|
Cryptanalysis of the FLIP Family of Stream Ciphers.eng.srt
|
30.0 KB
|
Cryptanalysis of the FLIP Family of Stream Ciphers.mp4
|
19.2 MB
|
Crypto 2016 Rump Session Part 1.eng.srt
|
79.7 KB
|
Crypto 2016 Rump Session Part 1.mp4
|
74.9 MB
|
Crypto 2016 Rump session part 2..eng.srt
|
75.9 KB
|
Crypto 2016 Rump session part 2.mp4
|
78.1 MB
|
Crypto 2016 Rump session part 3..eng.srt
|
88.1 KB
|
Crypto 2016 Rump session part 3.mp4
|
83.1 MB
|
Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.mp4
|
22.4 MB
|
Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.mp4
|
36.4 MB
|
Efficient Algorithms for Supersingular Isogeny Diffie Hellman.eng.srt
|
52.6 KB
|
Efficient Algorithms for Supersingular Isogeny Diffie Hellman.mp4
|
49.9 MB
|
Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.mp4
|
27.9 MB
|
Efficiently Computing Data Independent Memory Hard Functions.eng.srt
|
41.5 KB
|
Efficiently Computing Data Independent Memory Hard Functions.mp4
|
35.9 MB
|
Encryption Switching Protocols.eng.srt
|
39.6 KB
|
Encryption Switching Protocols.mp4
|
32.6 MB
|
EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.eng.srt
|
26.3 KB
|
EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.mp4
|
37.7 MB
|
Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.mp4
|
44.8 MB
|
FHE Circuit Privacy Almost For Free.eng.srt
|
24.5 KB
|
FHE Circuit Privacy Almost For Free.mp4
|
23.1 MB
|
Fine grained Cryptography.mp4
|
27.5 MB
|
How to Prove Knowledge of Small Secrets.eng.srt
|
34.6 KB
|
How to Prove Knowledge of Small Secrets.mp4
|
42.3 MB
|
Indifferentiability of 8 Round Feistel Networks.eng.srt
|
30.3 KB
|
Indifferentiability of 8 Round Feistel Networks.mp4
|
27.2 MB
|
Key Wrapping for Cryptographic APIs.mp4
|
48.4 MB
|
Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.eng.srt
|
25.1 KB
|
Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.mp4
|
29.1 MB
|
Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.mp4
|
21.9 MB
|
Lightweight Multiplication in GF2n with Applications to MDS Matrices.eng.srt
|
27.8 KB
|
Lightweight Multiplication in GF2n with Applications to MDS Matrices.mp4
|
26.8 MB
|
Linicrypt - A Model for Practical Cryptography.eng.srt
|
35.7 KB
|
Linicrypt - A Model for Practical Cryptography.mp4
|
43.2 MB
|
Memory Efficient Algorithms for Finding Needles in Haystacks.mp4
|
31.2 MB
|
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.eng.srt
|
45.8 KB
|
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.mp4
|
24.1 MB
|
Network Hiding Communication and Applications to Multi Party Protocols.eng.srt
|
33.7 KB
|
Network Hiding Communication and Applications to Multi Party Protocols.mp4
|
39.6 MB
|
Network Oblivious Transfer.eng.srt
|
35.9 KB
|
Network Oblivious Transfer.mp4
|
40.3 MB
|
New Insights on AES Like SPN Ciphers.eng.srt
|
21.9 KB
|
New Insights on AES Like SPN Ciphers.mp4
|
25.7 MB
|
Obfuscation Combiners.eng.srt
|
35.7 KB
|
Obfuscation Combiners.mp4
|
38.9 MB
|
Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.eng.srt
|
125.5 KB
|
Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.mp4
|
122.0 MB
|
On Statistically Secure Obfuscation with Approximate Correctness.eng.srt
|
32.0 KB
|
On Statistically Secure Obfuscation with Approximate Correctness.mp4
|
34.4 MB
|
On the Communication required for Unconditionally Secure Multiplication.mp4
|
42.9 MB
|
On the Power of Secure Two Party Computation.eng.srt
|
40.5 KB
|
On the Power of Secure Two Party Computation.mp4
|
45.3 MB
|
On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.eng.srt
|
43.9 KB
|
On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.mp4
|
37.9 MB
|
Optimal Security Proofs for Signatures from Identification Schemes.eng.srt
|
32.2 KB
|
Optimal Security Proofs for Signatures from Identification Schemes.mp4
|
29.7 MB
|
ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.eng.srt
|
11.0 KB
|
ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.mp4
|
21.5 MB
|
Probabilistic Termination and Composability of Cryptographic Protocols.mp4
|
52.7 MB
|
Programmable Hash Functions from Lattices.mp4
|
45.6 MB
|
Quantum Homomorphic Encryption for Polynomial sized Circuits.eng.srt
|
39.5 KB
|
Quantum Homomorphic Encryption for Polynomial sized Circuits.mp4
|
36.7 MB
|
Rate 1, Linear Time and Additively Homomorphic UC Commitments.eng.srt
|
38.2 KB
|
Rate 1, Linear Time and Additively Homomorphic UC Commitments.mp4
|
44.5 MB
|
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.mp4
|
41.7 MB
|
Secure Protocol Transformations.eng.srt
|
19.8 KB
|
Secure Protocol Transformations.mp4
|
31.2 MB
|
Semantic Security and Indistinguishability in the Quantum World.eng.srt
|
37.3 KB
|
Semantic Security and Indistinguishability in the Quantum World.mp4
|
47.8 MB
|
Separate Separations of CPA and Circular Security for Any Cycle Length.eng.srt
|
34.2 KB
|
Separate Separations of CPA and Circular Security for Any Cycle Length.mp4
|
33.6 MB
|
The Magic of ELFs.eng.srt
|
37.2 KB
|
The Magic of ELFs.mp4
|
27.9 MB
|
The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.eng.srt
|
45.6 KB
|
The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.mp4
|
31.9 MB
|
The SKINNY Family of Lightweight Tweakable Block Ciphers.eng.srt
|
32.4 KB
|
The SKINNY Family of Lightweight Tweakable Block Ciphers.mp4
|
34.9 MB
|
Towards Sound Fresh Re Keying with Hard Physical Learning Problems.eng.srt
|
28.6 KB
|
Towards Sound Fresh Re Keying with Hard Physical Learning Problems.mp4
|
23.7 MB
|
Two Message Oblivious Evaluation of Cryptographic Functionalities.eng.srt
|
29.8 KB
|
Two Message Oblivious Evaluation of Cryptographic Functionalities.mp4
|
46.9 MB
|
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.eng.srt
|
39.7 KB
|
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.mp4
|
44.2 MB
|
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.mp4
|
44.0 MB
|
Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.eng.srt
|
37.3 KB
|
Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.mp4
|
43.3 MB
|
XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.eng.srt
|
41.1 KB
|
XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.mp4
|
30.2 MB
|
/.../Crypto 2016 Rump Session/
|
Crypto 2016 Rump Session Part 1.mp4
|
74.9 MB
|
Crypto 2016 Rump session part 2..mp4
|
76.8 MB
|
Crypto 2016 Rump session part 3..mp4
|
81.5 MB
|
/Crypto/Crypto 2017/
|
A Formal Treatment of Multi key Channels.eng.srt
|
31.5 KB
|
A Formal Treatment of Multi key Channels.mp4
|
31.4 MB
|
A New Approach to Round Optimal Secure Multiparty Computation.eng.srt
|
34.7 KB
|
A New Approach to Round Optimal Secure Multiparty Computation.mp4
|
27.4 MB
|
A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.eng.srt
|
45.8 KB
|
A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.mp4
|
41.6 MB
|
Amortization with Fewer Equations for Proving Knowledge of Small Secrets.eng.srt
|
30.6 KB
|
Amortization with Fewer Equations for Proving Knowledge of Small Secrets.mp4
|
29.2 MB
|
Anonymous Attestation with Subverted TPMs.eng.srt
|
34.1 KB
|
Anonymous Attestation with Subverted TPMs.mp4
|
39.0 MB
|
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.eng.srt
|
30.2 KB
|
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.mp4
|
46.5 MB
|
Be Adaptive, Avoid Overcommitting.eng.srt
|
38.6 KB
|
Be Adaptive, Avoid Overcommitting.mp4
|
41.6 MB
|
Bitcoin as a Transaction Ledger - A Composable Treatment.eng.srt
|
30.8 KB
|
Bitcoin as a Transaction Ledger - A Composable Treatment.mp4
|
26.3 MB
|
Black Box Parallel Garbled RAM.eng.srt
|
47.8 KB
|
Black Box Parallel Garbled RAM.mp4
|
39.9 MB
|
Boosting Authenticated Encryption Robustness With Minimal Modifications.eng.srt
|
41.0 KB
|
Boosting Authenticated Encryption Robustness With Minimal Modifications.mp4
|
52.8 MB
|
Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.eng.srt
|
41.0 KB
|
Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.mp4
|
41.8 MB
|
Compact Structure Preserving Signatures with Almost Tight Security.eng.srt
|
30.6 KB
|
Compact Structure Preserving Signatures with Almost Tight Security.mp4
|
41.9 MB
|
Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.eng.srt
|
44.9 KB
|
Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.mp4
|
42.3 MB
|
Conditional Disclosure of Secrets via Non Linear Reconstruction.eng.srt
|
26.4 KB
|
Conditional Disclosure of Secrets via Non Linear Reconstruction.mp4
|
35.3 MB
|
Cube Attacks on Non Blackbox Polynomials Based on Division Property.eng.srt
|
29.7 KB
|
Cube Attacks on Non Blackbox Polynomials Based on Division Property.mp4
|
44.0 MB
|
Degree Evaluation of NFSR Based Cryptosystems.eng (2).eng.srt
|
22.0 KB
|
Degree Evaluation of NFSR Based Cryptosystems.mp4
|
34.6 MB
|
Distinguisher Dependent Simulation in Two Rounds and Its Applications.mp4
|
45.5 MB
|
Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.eng.srt
|
42.5 KB
|
Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.mp4
|
42.1 MB
|
Encryption switching protocols revisited - switching modulo p.eng.srt
|
28.3 KB
|
Encryption switching protocols revisited - switching modulo p.mp4
|
36.2 MB
|
Fast Secure Two Party ECDSA Signing.eng.srt
|
43.0 KB
|
Fast Secure Two Party ECDSA Signing.mp4
|
45.8 MB
|
Four Round Concurrent Non Malleable Commitments from One Way Functions.eng.srt
|
46.6 KB
|
Four Round Concurrent Non Malleable Commitments from One Way Functions.mp4
|
47.0 MB
|
From Obfuscation to the Security of Fiat Shamir for Proofs.eng.srt
|
44.6 KB
|
From Obfuscation to the Security of Fiat Shamir for Proofs.mp4
|
57.5 MB
|
Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.eng.srt
|
26.9 KB
|
Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.mp4
|
37.1 MB
|
Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.eng.srt
|
37.4 KB
|
Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.mp4
|
40.1 MB
|
Generic Transformations of Predicate Encodings - Constructions and Applications.eng.srt
|
36.7 KB
|
Generic Transformations of Predicate Encodings - Constructions and Applications.mp4
|
39.1 MB
|
Hedging Public Key Encryption in the Real World.eng.srt
|
38.3 KB
|
Hedging Public Key Encryption in the Real World.mp4
|
28.0 MB
|
Identity based Encryption from Codes with Rank Metric.eng.srt
|
27.4 KB
|
Identity based Encryption from Codes with Rank Metric.mp4
|
33.0 MB
|
Identity Based Encryption from the Diffie Hellman Assumption.eng.srt
|
38.3 KB
|
Identity Based Encryption from the Diffie Hellman Assumption.mp4
|
29.1 MB
|
Incremental Program Obfuscation.eng.srt
|
44.2 KB
|
Incremental Program Obfuscation.mp4
|
43.9 MB
|
Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.eng.srt
|
40.9 KB
|
Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.mp4
|
34.3 MB
|
Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.eng.srt
|
48.2 KB
|
Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.mp4
|
54.8 MB
|
Information theoretic Indistinguishability via the Chi squared Method.eng.srt
|
47.8 KB
|
Information theoretic Indistinguishability via the Chi squared Method.mp4
|
48.0 MB
|
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.eng.srt
|
45.5 KB
|
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.mp4
|
48.2 MB
|
Joint presentation.eng.srt
|
32.1 KB
|
Joint presentation.mp4
|
48.4 MB
|
Key Rotation for Authenticated Encryption.eng.srt
|
43.4 KB
|
Key Rotation for Authenticated Encryption.mp4
|
41.7 MB
|
Kurosawa Desmedt Meets Tight Security.eng.srt
|
36.0 KB
|
Kurosawa Desmedt Meets Tight Security.mp4
|
37.7 MB
|
Laconic Oblivious Transfer and its Applications.eng.srt
|
37.1 KB
|
Laconic Oblivious Transfer and its Applications.mp4
|
39.1 MB
|
Lower Bounds on Obfuscation from All or Nothing Encryption.eng.srt
|
37.6 KB
|
Lower Bounds on Obfuscation from All or Nothing Encryption.mp4
|
32.9 MB
|
LPN Decoded.eng.srt
|
38.3 KB
|
LPN Decoded.mp4
|
35.9 MB
|
Memory Tight Reductions.eng.srt
|
34.1 KB
|
Memory Tight Reductions.mp4
|
32.4 MB
|
Message Franking via Committing Authenticated Encryption.eng.srt
|
42.3 KB
|
Message Franking via Committing Authenticated Encryption.mp4
|
41.0 MB
|
Middle Product Learning With Errors.mp4
|
30.2 MB
|
New security notions and feasibility results for authentication of quantum data.eng.srt
|
41.0 KB
|
New security notions and feasibility results for authentication of quantum data.mp4
|
41.1 MB
|
Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.eng.srt
|
22.0 KB
|
Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.mp4
|
32.4 MB
|
Non Malleable Codes for Space Bounded Tampering.eng.srt
|
32.3 KB
|
Non Malleable Codes for Space Bounded Tampering.mp4
|
31.7 MB
|
Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.eng.srt
|
38.1 KB
|
Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.mp4
|
48.5 MB
|
Ouroboros - A Provably Secure Proof of Stake Protocol.eng.srt
|
45.8 KB
|
Ouroboros - A Provably Secure Proof of Stake Protocol.mp4
|
35.1 MB
|
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.eng.srt
|
33.4 KB
|
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.mp4
|
27.0 MB
|
PRF ODH - Relations, Instantiations, and Impossibility Results.eng.srt
|
31.1 KB
|
PRF ODH - Relations, Instantiations, and Impossibility Results.mp4
|
28.9 MB
|
Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.eng.srt
|
25.8 KB
|
Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.mp4
|
20.3 MB
|
Private Multiplication over Finite Fields.eng.srt
|
40.2 KB
|
Private Multiplication over Finite Fields.mp4
|
31.8 MB
|
Prospects for a Quantum Factoring Machine.eng.srt
|
79.2 KB
|
Prospects for a Quantum Factoring Machine.mp4
|
65.0 MB
|
Proving Resistance against Invariant Attacks - How to Choose the Round Constants.mp4
|
43.7 MB
|
Quantum non malleability and authentication.eng.srt
|
37.9 KB
|
Quantum non malleability and authentication.mp4
|
47.8 MB
|
Quantum Security of NMAC and Related Constructions.eng.srt
|
41.9 KB
|
Quantum Security of NMAC and Related Constructions.mp4
|
51.5 MB
|
Ratcheted Encryption and Key Exchange - The Security of Messaging.eng.srt
|
36.4 KB
|
Ratcheted Encryption and Key Exchange - The Security of Messaging.mp4
|
41.0 MB
|
Robust Non Interactive Multiparty Computation Against Constant Size Collusion.mp4
|
32.5 MB
|
Secure Computation based on Leaky Correlations - High Resilience Setting.eng.srt
|
24.3 KB
|
Secure Computation based on Leaky Correlations - High Resilience Setting.mp4
|
30.2 MB
|
Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.mp4
|
36.0 MB
|
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.mp4
|
34.9 MB
|
Structure vs Hardness through the Obfuscation Lens.eng.srt
|
34.0 KB
|
Structure vs Hardness through the Obfuscation Lens.mp4
|
33.4 MB
|
The Bitcoin Backbone Protocol with Chains of Variable Difficulty.mp4
|
41.3 MB
|
The first collision for full SHA 1.eng.srt
|
52.1 KB
|
The first collision for full SHA 1.mp4
|
40.5 MB
|
The Price of Low Communication in Secure Multi Party Computation.eng.srt
|
50.4 KB
|
The Price of Low Communication in Secure Multi Party Computation.mp4
|
45.8 MB
|
The TinyTable protocol or - Gate scrambling Revisited.eng.srt
|
26.0 KB
|
The TinyTable protocol or - Gate scrambling Revisited.mp4
|
23.4 MB
|
Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.eng.srt
|
37.0 KB
|
Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.mp4
|
46.4 MB
|
Topology Hiding Computation on All Graphs.eng.srt
|
34.5 KB
|
Topology Hiding Computation on All Graphs.mp4
|
30.9 MB
|
Two papers on Indistinguishability Obfuscation (soft merge).eng.srt
|
42.2 KB
|
Two papers on Indistinguishability Obfuscation (soft merge).mp4
|
44.5 MB
|
Verified Drop in Replacements for TLS&HTTPS.mp4
|
77.5 MB
|
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.eng.srt
|
60.4 KB
|
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.mp4
|
43.0 MB
|
ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.eng.srt
|
32.0 KB
|
ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.mp4
|
43.3 MB
|
/.../Crypto 2017 Rump Session/
|
Blockchains and consensus protocols Snake oil warning.mp4
|
8.9 MB
|
Browser Security with a Grain of Salt.mp4
|
7.9 MB
|
Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.mp4
|
7.5 MB
|
Delegatable Anonymous Credentials from Mercurial Signatures.mp4
|
7.6 MB
|
Forty years and still running.mp4
|
14.5 MB
|
From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.mp4
|
6.6 MB
|
How not to pay with Bitcoin.mp4
|
8.3 MB
|
IACR Award Ceremony.mp4
|
14.7 MB
|
Implementing Provably Secure Detection of Direct Injection Attacks.mp4
|
8.1 MB
|
Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.mp4
|
3.9 MB
|
Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.mp4
|
3.5 MB
|
Lockable Obfuscation.mp4
|
9.1 MB
|
Magallanes.mp4
|
7.7 MB
|
Make Crypto Not Maps.mp4
|
5.8 MB
|
May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.mp4
|
10.8 MB
|
NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.mp4
|
9.5 MB
|
Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.mp4
|
7.1 MB
|
Program Chair's Report by Jonathan Katz.mp4
|
8.6 MB
|
Proofs of Work for Blockchain Protocols.mp4
|
3.0 MB
|
Quantum Computing Threat or Menace.mp4
|
3.8 MB
|
Real world zkSNARKs updates on Zcash, libsnark.mp4
|
11.6 MB
|
Report from ECC 2017.mp4
|
5.0 MB
|
Security and Composition of Rational Cryptographic Protocols.mp4
|
5.7 MB
|
Self Correcting Random Oracles and Its Cliptographic Applications.mp4
|
7.9 MB
|
Separable Statistics, New Extension to Linear Cryptanalysis.mp4
|
5.7 MB
|
Test of Time Award for the best Rump Session Presentation.mp4
|
9.3 MB
|
The early history of blockchains.mp4
|
8.2 MB
|
The JMAC MAC.mp4
|
5.4 MB
|
The Sound of Quantum.mp4
|
2.9 MB
|
Top secret A world of codes and ciphers an exhibition.mp4
|
3.1 MB
|
/Crypto/Crypto 2018/
|
A Key recovery Attack on 855 round Trivium.eng.srt
|
19.1 KB
|
A Key recovery Attack on 855 round Trivium.mp4
|
15.8 MB
|
A New Public Key Cryptosystem via Mersenne Numbers.eng.srt
|
47.2 KB
|
A New Public Key Cryptosystem via Mersenne Numbers.mp4
|
28.9 MB
|
A Simple Obfuscation Scheme for Pattern Matching with Wildcards.eng.srt
|
65.1 KB
|
A Simple Obfuscation Scheme for Pattern Matching with Wildcards.mp4
|
31.5 MB
|
Amortized Complexity of Information Theoretically Secure MPC Revisted.eng.srt
|
55.8 KB
|
Amortized Complexity of Information Theoretically Secure MPC Revisted.mp4
|
37.1 MB
|
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.eng.srt
|
50.2 KB
|
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.mp4
|
38.2 MB
|
Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.eng.srt
|
65.6 KB
|
Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.mp4
|
34.8 MB
|
CAPA The Spirit of Beaver Against Physical Attacks.eng.srt
|
59.5 KB
|
CAPA The Spirit of Beaver Against Physical Attacks.mp4
|
54.3 MB
|
Combiners for Backdoored Random Oracles.eng.srt
|
43.7 KB
|
Combiners for Backdoored Random Oracles.mp4
|
19.7 MB
|
Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.mp4
|
42.5 MB
|
Contrained PRFs for NC1 in Traditional Groups.eng.srt
|
58.9 KB
|
Contrained PRFs for NC1 in Traditional Groups.mp4
|
34.6 MB
|
Correcting Subverted Random Oracles.eng.srt
|
65.0 KB
|
Correcting Subverted Random Oracles.mp4
|
42.1 MB
|
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.eng.srt
|
58.8 KB
|
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.mp4
|
39.8 MB
|
Cryptanalysis via Algebraic Spans.eng.srt
|
57.8 KB
|
Cryptanalysis via Algebraic Spans.mp4
|
35.3 MB
|
Crypto - A Key Ingredient to Building Respectful Products.eng.srt
|
131.8 KB
|
Crypto - A Key Ingredient to Building Respectful Products.mp4
|
70.9 MB
|
Dissection BKW.eng.srt
|
55.1 KB
|
Dissection BKW.mp4
|
29.2 MB
|
Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.eng.srt
|
56.0 KB
|
Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.mp4
|
29.3 MB
|
Fast Correlation Attack Revisted.eng.srt
|
46.3 KB
|
Fast Correlation Attack Revisted.mp4
|
28.1 MB
|
Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.eng.srt
|
58.0 KB
|
Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.mp4
|
32.1 MB
|
Fast Homomorphic Evaluation of Deep Discretized Neural Networks.eng.srt
|
61.9 KB
|
Fast Homomorphic Evaluation of Deep Discretized Neural Networks.mp4
|
35.1 MB
|
Fast Large Scale Honest Majority MPC for Malicious Adversaries.eng.srt
|
61.6 KB
|
Fast Large Scale Honest Majority MPC for Malicious Adversaries.mp4
|
36.6 MB
|
Fast Message Franking From Invisible Salamanders to Encryptment.eng.srt
|
63.5 KB
|
Fast Message Franking From Invisible Salamanders to Encryptment.mp4
|
40.9 MB
|
Faster Homomorphic Linear Transformations in HElib.eng.srt
|
63.4 KB
|
Faster Homomorphic Linear Transformations in HElib.mp4
|
42.7 MB
|
From Idea to Impact, the Crypto Story - What's Next.eng.srt
|
207.1 KB
|
From Idea to Impact, the Crypto Story - What's Next.mp4
|
109.5 MB
|
From Laconic Zero Knowledge to Public Key Cryptography.eng.srt
|
58.9 KB
|
From Laconic Zero Knowledge to Public Key Cryptography.mp4
|
33.7 MB
|
Generic Attacks Against Beyond Birthday Bound MACs.mp4
|
38.7 MB
|
GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.eng.srt
|
65.3 KB
|
GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.mp4
|
35.2 MB
|
Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.eng.srt
|
83.8 KB
|
Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.mp4
|
32.4 MB
|
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.eng.srt
|
52.2 KB
|
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.mp4
|
9.7 MB
|
IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.eng.srt
|
35.1 KB
|
IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.mp4
|
23.0 MB
|
Indifferentiable Authenticated Encryption.eng.srt
|
47.9 KB
|
Indifferentiable Authenticated Encryption.mp4
|
28.8 MB
|
Lattice Based Zero Knowledge Arguments for Integer Relations.eng.srt
|
58.6 KB
|
Lattice Based Zero Knowledge Arguments for Integer Relations.mp4
|
48.4 MB
|
Limits of Practical Sublinear Secure Computation.eng.srt
|
64.2 KB
|
Limits of Practical Sublinear Secure Computation.mp4
|
20.7 MB
|
Limits on the Power of Garbling Techniques for Public Key Encryption.eng.srt
|
60.4 KB
|
Limits on the Power of Garbling Techniques for Public Key Encryption.mp4
|
33.5 MB
|
Lower Bounds on Lattice Enumeration with Extreme Pruning.mp4
|
37.5 MB
|
Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.eng.srt
|
55.2 KB
|
Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.mp4
|
32.5 MB
|
Multi Theorem Preprocessing NIZKs from Lattices.eng.srt
|
70.6 KB
|
Multi Theorem Preprocessing NIZKs from Lattices.mp4
|
32.4 MB
|
Must the Communication Graph of MPC Protocols be an Expander.eng.srt
|
46.5 KB
|
Must the Communication Graph of MPC Protocols be an Expander.mp4
|
33.5 MB
|
Non Interactive Zero Knowledge Proofs for Composite Statements.eng.srt
|
57.1 KB
|
Non Interactive Zero Knowledge Proofs for Composite Statements.mp4
|
25.5 MB
|
Non Malleable Codes for Partial Functions with Manipulation Detection.eng.srt
|
55.1 KB
|
Non Malleable Codes for Partial Functions with Manipulation Detection.mp4
|
32.8 MB
|
Non Malleable Secret Sharing for General Access Structures.mp4
|
42.2 MB
|
Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.eng.srt
|
54.7 KB
|
Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.mp4
|
23.3 MB
|
On Distributional Collision Resistant Hashing.eng.srt
|
58.2 KB
|
On Distributional Collision Resistant Hashing.mp4
|
35.5 MB
|
On the Complexity of Compressing Obfuscation.eng.srt
|
60.9 KB
|
On the Complexity of Compressing Obfuscation.mp4
|
34.2 MB
|
On the Exact Round Complexity of Secure Three Party Computation.eng.srt
|
63.4 KB
|
On the Exact Round Complexity of Secure Three Party Computation.mp4
|
33.0 MB
|
On the Local Leakage Resilience of Linear Secret Sharing Schemes.eng.srt
|
61.5 KB
|
On the Local Leakage Resilience of Linear Secret Sharing Schemes.mp4
|
27.9 MB
|
On the Round Complexity of OT Extension.eng.srt
|
57.4 KB
|
On the Round Complexity of OT Extension.mp4
|
28.9 MB
|
On Tightly Secure Non Interactive Key Exchange.eng.srt
|
56.4 KB
|
On Tightly Secure Non Interactive Key Exchange.mp4
|
41.4 MB
|
Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.eng.srt
|
47.3 KB
|
Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.mp4
|
41.2 MB
|
Optimizing Authenticated Garbling for Faster Secure Two Party Computation.eng.srt
|
69.7 KB
|
Optimizing Authenticated Garbling for Faster Secure Two Party Computation.mp4
|
31.2 MB
|
Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.eng.srt
|
66.4 KB
|
Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.mp4
|
20.5 MB
|
Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.eng.srt
|
51.2 KB
|
Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.mp4
|
38.9 MB
|
Private Circuits A Modular Approach.eng.srt
|
57.3 KB
|
Private Circuits A Modular Approach.mp4
|
26.9 MB
|
Promise Zero Knowledge and its Applications to Round Optimal MPC.mp4
|
16.2 MB
|
Proofs of Work from Worst Case Assumptions.eng.srt
|
63.2 KB
|
Proofs of Work from Worst Case Assumptions.mp4
|
34.1 MB
|
Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.eng.srt
|
51.5 KB
|
Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.mp4
|
24.0 MB
|
Pseudorandom Quantum States.eng.srt
|
49.7 KB
|
Pseudorandom Quantum States.mp4
|
33.7 MB
|
Quantum FHE Almost As Secure As Classical.eng.srt
|
81.6 KB
|
Quantum FHE Almost As Secure As Classical.mp4
|
38.3 MB
|
Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.eng.srt
|
43.2 KB
|
Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.mp4
|
23.8 MB
|
Round Optimal Secure Multi Party Computation.eng.srt
|
30.0 KB
|
Round Optimal Secure Multi Party Computation.mp4
|
18.7 MB
|
Round Optimal Secure Multiparty Computation with Honest Majority.eng.srt
|
50.1 KB
|
Round Optimal Secure Multiparty Computation with Honest Majority.mp4
|
23.4 MB
|
Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.mp4
|
28.0 MB
|
Simplifying Game Based Definitions.eng.srt
|
48.6 KB
|
Simplifying Game Based Definitions.mp4
|
33.5 MB
|
SPDZ2k Efficient MPC mod 2k for Dishonest Majority.eng.srt
|
83.8 KB
|
SPDZ2k Efficient MPC mod 2k for Dishonest Majority.mp4
|
35.6 MB
|
Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.eng.srt
|
55.5 KB
|
Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.mp4
|
22.7 MB
|
The Algebraic Group Model and its Applications.mp4
|
24.2 MB
|
The Curse of Small Domains New Attacks on Format Preserving Encryption.eng.srt
|
42.8 KB
|
The Curse of Small Domains New Attacks on Format Preserving Encryption.mp4
|
41.2 MB
|
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.eng.srt
|
56.6 KB
|
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.mp4
|
15.2 MB
|
Tight Tradeoffs in Searchable Symmetric Encryption.eng.srt
|
24.5 KB
|
Tight Tradeoffs in Searchable Symmetric Encryption.mp4
|
17.9 MB
|
TinyKeys A New Approach to Efficient Multi Party Computation.eng.srt
|
57.8 KB
|
TinyKeys A New Approach to Efficient Multi Party Computation.mp4
|
36.8 MB
|
Towards Bidirectional Ratcheted Key Exchange.eng.srt
|
58.7 KB
|
Towards Bidirectional Ratcheted Key Exchange.mp4
|
40.5 MB
|
Trapdoor Functions from the Computational Diffie Hellman Assumption.eng.srt
|
50.8 KB
|
Trapdoor Functions from the Computational Diffie Hellman Assumption.mp4
|
19.0 MB
|
Two Round Multiparty Secure Computation Minimizing Public Key Operations.eng.srt
|
55.3 KB
|
Two Round Multiparty Secure Computation Minimizing Public Key Operations.mp4
|
36.9 MB
|
Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.eng.srt
|
47.5 KB
|
Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.mp4
|
27.1 MB
|
Verifiable Delay Functions.eng.srt
|
56.7 KB
|
Verifiable Delay Functions.mp4
|
30.0 MB
|
Yes, There is an Oblivious RAM Lower Bound.mp4
|
32.2 MB
|
Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.eng.srt
|
44.0 KB
|
Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.mp4
|
18.3 MB
|
/.../Crypto 2018 Rump Session/
|
A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.eng.srt
|
6.6 KB
|
A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.mp4
|
3.1 MB
|
A small problem Regarding permutations.mp4
|
3.3 MB
|
Account Management and Stake Pools in Proof of Stake Ledgers.eng.srt
|
11.5 KB
|
Account Management and Stake Pools in Proof of Stake Ledgers.mp4
|
7.6 MB
|
Adversarial Correctness Favors Laziness.mp4
|
4.2 MB
|
Attestation as a Service (AaaS).eng.srt
|
21.0 KB
|
Attestation as a Service (AaaS).mp4
|
11.6 MB
|
Blockchain and the Identity Problem.eng.srt
|
4.0 KB
|
Blockchain and the Identity Problem.mp4
|
4.2 MB
|
Blockchain.eng.srt
|
5.8 KB
|
Blockchain.mp4
|
6.3 MB
|
Bodka Not V, But B.eng.srt
|
5.9 KB
|
Bodka Not V, But B.mp4
|
3.9 MB
|
Computational Ring LWR problem.mp4
|
2.7 MB
|
Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.eng.srt
|
4.8 KB
|
Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.mp4
|
3.4 MB
|
Empowering Protocols Secure reporting of serial perpetrators of sexual assault.eng.srt
|
12.6 KB
|
Empowering Protocols Secure reporting of serial perpetrators of sexual assault.mp4
|
6.0 MB
|
How to Mimic Nakamoto's Design via Proof of stake and more.eng.srt
|
10.9 KB
|
How to Mimic Nakamoto's Design via Proof of stake and more.mp4
|
7.5 MB
|
IACR Award Ceremony.eng.srt
|
44.9 KB
|
IACR Award Ceremony.mp4
|
51.6 MB
|
In memory attacks at crypto currency wallets.eng.srt
|
8.6 KB
|
In memory attacks at crypto currency wallets.mp4
|
5.4 MB
|
Kahn Ni Melm - John Steinbeck's Secret Language.eng.srt
|
19.0 KB
|
Kahn Ni Melm - John Steinbeck's Secret Language.mp4
|
9.3 MB
|
Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.mp4
|
7.4 MB
|
Laconic Function Evaluation.eng.srt
|
10.2 KB
|
Laconic Function Evaluation.mp4
|
5.1 MB
|
Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.eng.srt
|
9.9 KB
|
Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.mp4
|
6.5 MB
|
NIST Update.eng.srt
|
23.3 KB
|
NIST Update.mp4
|
11.6 MB
|
nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.eng.srt
|
8.7 KB
|
nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.mp4
|
5.5 MB
|
Obfuscation Using Tensor Products.eng.srt
|
12.3 KB
|
Obfuscation Using Tensor Products.mp4
|
9.0 MB
|
PQCzoo Post Quantum Beasts and Where to Find Them.eng.srt
|
5.5 KB
|
PQCzoo Post Quantum Beasts and Where to Find Them.mp4
|
3.1 MB
|
Prime and Prejudice Primality Testing Under Adversarial Conditions.eng.srt
|
12.7 KB
|
Prime and Prejudice Primality Testing Under Adversarial Conditions.mp4
|
7.0 MB
|
RISC V Foundation Security Standing Committee Call to action.eng.srt
|
7.6 KB
|
RISC V Foundation Security Standing Committee Call to action.mp4
|
4.8 MB
|
Robust Property Preserving Hashes.eng.srt
|
7.8 KB
|
Robust Property Preserving Hashes.mp4
|
4.4 MB
|
RSA-OAEP without Random Oracles, Featuring Eminem.eng.srt
|
15.4 KB
|
RSA-OAEP without Random Oracles, Featuring Eminem.mp4
|
7.5 MB
|
Secure MPC Laziness Leads to GOD.eng.srt
|
10.6 KB
|
Secure MPC Laziness Leads to GOD.mp4
|
4.6 MB
|
Setup Free SNARKs from Hidden Order Groups.eng.srt
|
9.6 KB
|
Setup Free SNARKs from Hidden Order Groups.mp4
|
5.8 MB
|
SoK A Consensus Taxonomy in the Blockchain Era.eng.srt
|
20.9 KB
|
SoK A Consensus Taxonomy in the Blockchain Era.mp4
|
11.6 MB
|
Stand up Crypto Comedy.eng.srt
|
8.2 KB
|
Stand up Crypto Comedy.mp4
|
5.5 MB
|
Statistical Ineffective Fault Attacks.mp4
|
3.2 MB
|
Surveillance from Brussels Privacy at UCSB CAM for fun.eng.srt
|
7.0 KB
|
Surveillance from Brussels Privacy at UCSB CAM for fun.mp4
|
4.3 MB
|
Synesthesia.eng.srt
|
10.1 KB
|
Synesthesia.mp4
|
6.2 MB
|
The CERES Project Campaign to Enhance Research Experience.eng.srt
|
7.6 KB
|
The CERES Project Campaign to Enhance Research Experience.mp4
|
3.8 MB
|
The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.eng.srt
|
7.1 KB
|
The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.mp4
|
4.2 MB
|
The Danish Crypto Choir - Don't Worry, Be Happy.eng.srt
|
5.6 KB
|
The Danish Crypto Choir - Don't Worry, Be Happy.mp4
|
11.4 MB
|
Theory of Cryptography Conference Test-of-Time Award Recipients.mp4
|
3.8 MB
|
Towards a general classification framework for cryptocurrency.mp4
|
9.9 MB
|
What does the SHARK say.eng.srt
|
12.4 KB
|
What does the SHARK say.mp4
|
7.2 MB
|
Zero Knowledge Standardization.eng.srt
|
6.3 KB
|
Zero Knowledge Standardization.mp4
|
3.7 MB
|
/Crypto/Crypto 2019/
|
ABE for DFA from k-Lin.eng.srt
|
27.1 KB
|
ABE for DFA from k-Lin.mp4
|
15.9 MB
|
Adaptively Secure MPC with Sublinear Communication Complexity.eng.srt
|
46.0 KB
|
Adaptively Secure MPC with Sublinear Communication Complexity.mp4
|
29.9 MB
|
Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.eng.srt
|
39.2 KB
|
Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.mp4
|
28.8 MB
|
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.eng.srt
|
42.2 KB
|
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.mp4
|
25.0 MB
|
BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.eng.srt
|
34.3 KB
|
BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.mp4
|
23.9 MB
|
BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.eng.srt
|
37.0 KB
|
BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.mp4
|
26.9 MB
|
BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.eng.srt
|
41.1 KB
|
BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.mp4
|
32.9 MB
|
Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.eng.srt
|
37.3 KB
|
Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.mp4
|
24.4 MB
|
CCA Security and Trapdoor Functions via Key-Dependent-Message Security.mp4
|
24.7 MB
|
Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.eng.srt
|
45.5 KB
|
Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.mp4
|
41.8 MB
|
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.eng.srt
|
29.0 KB
|
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.mp4
|
29.7 MB
|
Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.eng.srt
|
37.8 KB
|
Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.mp4
|
41.0 MB
|
Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.eng.srt
|
29.2 KB
|
Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.mp4
|
22.2 MB
|
Cryptographic Sensing.mp4
|
31.4 MB
|
Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.eng.srt
|
42.9 KB
|
Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.mp4
|
42.8 MB
|
Efficient Collision Attack Frameworks for RIPEMD-160.eng.srt
|
22.8 KB
|
Efficient Collision Attack Frameworks for RIPEMD-160.mp4
|
16.4 MB
|
Efficient Pseudorandom Correlation Generators Silent OT Extension and More.eng.srt
|
43.3 KB
|
Efficient Pseudorandom Correlation Generators Silent OT Extension and More.mp4
|
46.3 MB
|
Explicit Rate-1 Non-malleable Codes for Local Tampering.eng.srt
|
30.3 KB
|
Explicit Rate-1 Non-malleable Codes for Local Tampering.mp4
|
24.3 MB
|
Exploring Constructions of Compact NIZKs from Various Assumptions.eng.srt
|
38.2 KB
|
Exploring Constructions of Compact NIZKs from Various Assumptions.mp4
|
36.9 MB
|
Highly Efficient Key Exchange Protocols with Optimal Tightness.eng.srt
|
36.2 KB
|
Highly Efficient Key Exchange Protocols with Optimal Tightness.mp4
|
27.0 MB
|
Homomorphic Time-Lock Puzzles and Applications.eng.srt
|
37.5 KB
|
Homomorphic Time-Lock Puzzles and Applications.mp4
|
33.0 MB
|
How to Build Pseudorandom Functions from Public Random Permutations.eng.srt
|
26.6 KB
|
How to Build Pseudorandom Functions from Public Random Permutations.mp4
|
17.9 MB
|
How to Record Quantum Queries, and Applications to Quantum Indifferentiability.eng.srt
|
34.7 KB
|
How to Record Quantum Queries, and Applications to Quantum Indifferentiability.mp4
|
30.4 MB
|
Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.eng.srt
|
38.6 KB
|
Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.mp4
|
22.8 MB
|
Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.eng.srt
|
42.1 KB
|
Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.mp4
|
38.8 MB
|
Invited talk Contextual Integrity.eng.srt
|
98.2 KB
|
Invited talk Contextual Integrity.mp4
|
41.8 MB
|
Invited talk Secure computation When theory meets.eng.srt
|
115.4 KB
|
Invited talk Secure computation When theory meets.mp4
|
108.4 MB
|
It Wasn't Me.eng.srt
|
41.5 KB
|
It Wasn't Me.mp4
|
29.8 MB
|
Joint Presentation on Lattices at Crypto 2019.eng.srt
|
39.5 KB
|
Joint Presentation on Lattices at Crypto 2019.mp4
|
48.7 MB
|
Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.eng.srt
|
42.2 KB
|
Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.mp4
|
42.1 MB
|
Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.eng.srt
|
44.6 KB
|
Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.mp4
|
8.6 MB
|
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.eng.srt
|
37.9 KB
|
Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.mp4
|
30.8 MB
|
Match Me if You Can Matchmaking Encryption and Its Applications.eng.srt
|
34.2 KB
|
Match Me if You Can Matchmaking Encryption and Its Applications.mp4
|
18.6 MB
|
Memory-Hard Functions from Cryptographic Primitives.eng.srt
|
46.0 KB
|
Memory-Hard Functions from Cryptographic Primitives.mp4
|
40.0 MB
|
New Constructions of Reusable Designated-Verifier NIZKs.eng.srt
|
44.8 KB
|
New Constructions of Reusable Designated-Verifier NIZKs.mp4
|
33.1 MB
|
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.eng.srt
|
20.5 KB
|
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.mp4
|
36.4 MB
|
Non-interactive Non-malleability from Quantum Supremacy.eng.srt
|
42.1 KB
|
Non-interactive Non-malleability from Quantum Supremacy.mp4
|
30.1 MB
|
Non-malleable Codes for Decision Trees.eng.srt
|
36.4 KB
|
Non-malleable Codes for Decision Trees.mp4
|
35.3 MB
|
Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.eng.srt
|
35.6 KB
|
Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.mp4
|
19.7 MB
|
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.eng.srt
|
45.2 KB
|
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.mp4
|
24.3 MB
|
Nonces Are Noticed AEAD Revisited.eng.srt
|
33.7 KB
|
Nonces Are Noticed AEAD Revisited.mp4
|
22.3 MB
|
Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.eng.srt
|
37.5 KB
|
Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.mp4
|
41.0 MB
|
On Round Optimal Statistical Zero Knowledge Arguments.eng.srt
|
34.7 KB
|
On Round Optimal Statistical Zero Knowledge Arguments.mp4
|
30.0 MB
|
On the Plausibility of Fully Homomorphic Encryption for RAMs.eng.srt
|
35.9 KB
|
On the Plausibility of Fully Homomorphic Encryption for RAMs.mp4
|
45.9 MB
|
On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.eng.srt
|
38.4 KB
|
On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.mp4
|
34.4 MB
|
Proofs of Replicated Storage Without Timing Assumptions.eng.srt
|
36.7 KB
|
Proofs of Replicated Storage Without Timing Assumptions.mp4
|
15.5 MB
|
Public-Key Cryptography in the Fine-Grained Setting.eng.srt
|
40.0 KB
|
Public-Key Cryptography in the Fine-Grained Setting.mp4
|
31.5 MB
|
Quantum Indistinguishability of Random Sponges.eng.srt
|
30.1 KB
|
Quantum Indistinguishability of Random Sponges.mp4
|
22.1 MB
|
Quantum Security Proofs Using Semi-classical Oracles.eng.srt
|
48.7 KB
|
Quantum Security Proofs Using Semi-classical Oracles.mp4
|
34.9 MB
|
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.eng.srt
|
43.4 KB
|
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.mp4
|
18.6 MB
|
Reusable Non-Interactive Secure Computation.eng.srt
|
37.8 KB
|
Reusable Non-Interactive Secure Computation.mp4
|
27.0 MB
|
Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.eng.srt
|
37.4 KB
|
Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.mp4
|
24.1 MB
|
Seedless Fruit Is the Sweetest Random Number Generation, Revisited.eng.srt
|
39.8 KB
|
Seedless Fruit Is the Sweetest Random Number Generation, Revisited.mp4
|
24.1 MB
|
Shared presentation at Crypto 2019.eng.srt
|
56.2 KB
|
Shared presentation at Crypto 2019.mp4
|
34.5 MB
|
Shared presentation on Fiat-Shamir security at Crypto 2019.eng.srt
|
44.9 KB
|
Shared presentation on Fiat-Shamir security at Crypto 2019.mp4
|
46.9 MB
|
Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..eng.srt
|
51.8 KB
|
Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..mp4
|
29.1 MB
|
Shared presentation on Zero Knowledge at Crypto 2019.eng.srt
|
36.6 KB
|
Shared presentation on Zero Knowledge at Crypto 2019.mp4
|
38.5 MB
|
Simple Proofs of Space-Time and Rational Proofs of Storage.eng.srt
|
33.2 KB
|
Simple Proofs of Space-Time and Rational Proofs of Storage.mp4
|
19.7 MB
|
Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.eng.srt
|
37.2 KB
|
Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.mp4
|
35.2 MB
|
SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.eng.srt
|
24.7 KB
|
SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.mp4
|
39.5 MB
|
Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.eng.srt
|
25.8 KB
|
Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.mp4
|
18.0 MB
|
Strong Asymmetric PAKE Based on Trapdoor CKEM.eng.srt
|
39.0 KB
|
Strong Asymmetric PAKE Based on Trapdoor CKEM.mp4
|
25.0 MB
|
Symmetric Primitives with Structured Secrets.eng.srt
|
33.8 KB
|
Symmetric Primitives with Structured Secrets.mp4
|
21.3 MB
|
Synchronous, with a Chance of Partition Tolerance.eng.srt
|
34.0 KB
|
Synchronous, with a Chance of Partition Tolerance.mp4
|
18.6 MB
|
The Communication Complexity of Threshold Private Set Intersection.eng.srt
|
41.3 KB
|
The Communication Complexity of Threshold Private Set Intersection.mp4
|
33.5 MB
|
The Distinction Between Fixed and Random Generators in Group-Based Assumptions.eng.srt
|
46.7 KB
|
The Distinction Between Fixed and Random Generators in Group-Based Assumptions.mp4
|
40.4 MB
|
The Privacy Blanket of the Shuffle Model.eng.srt
|
37.0 KB
|
The Privacy Blanket of the Shuffle Model.mp4
|
38.1 MB
|
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.eng.srt
|
34.1 KB
|
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.mp4
|
26.7 MB
|
Trapdoor Hash Functions and Their Applications.eng.srt
|
40.9 KB
|
Trapdoor Hash Functions and Their Applications.mp4
|
31.9 MB
|
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.eng.srt
|
38.4 KB
|
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.mp4
|
31.1 MB
|
Unconditionally Secure Computation Against Low-Complexity Leakage.eng.srt
|
42.1 KB
|
Unconditionally Secure Computation Against Low-Complexity Leakage.mp4
|
24.1 MB
|
Unifying Computational Entropies via Kullback-Leibler Divergence.eng.srt
|
43.3 KB
|
Unifying Computational Entropies via Kullback-Leibler Divergence.mp4
|
37.8 MB
|
Unifying Leakage Models on a Renyi Day.mp4
|
22.6 MB
|
Universally Composable Secure Computation with Corrupted Tokens.eng.srt
|
33.9 KB
|
Universally Composable Secure Computation with Corrupted Tokens.mp4
|
39.3 MB
|
Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.eng.srt
|
46.8 KB
|
Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.mp4
|
31.8 MB
|
Watermarking Public-Key Cryptographic Primitives.eng.srt
|
41.8 KB
|
Watermarking Public-Key Cryptographic Primitives.mp4
|
19.5 MB
|
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.eng.srt
|
45.0 KB
|
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.mp4
|
35.4 MB
|
/.../Crypto 2019 Rump Session/
|
48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.eng.srt
|
9.5 KB
|
48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.mp4
|
7.7 MB
|
A new Paradigm Shift for the Crypto BlockChain Proof of Ability.mp4
|
4.9 MB
|
Algebraically Structured LWE, Revisited.mp4
|
6.6 MB
|
Asymmetric distributed trust.eng.srt
|
10.0 KB
|
Asymmetric distributed trust.mp4
|
8.8 MB
|
Bringing Verifiable Delay Functions Into Production.mp4
|
4.6 MB
|
Cards Against Cryptography.eng.srt
|
3.5 KB
|
Cards Against Cryptography.mp4
|
3.3 MB
|
Collusion Preserving Computation without a Mediator.eng.srt
|
6.3 KB
|
Collusion Preserving Computation without a Mediator.mp4
|
8.0 MB
|
Cryptanalyzing the Legendre PRF.eng.srt
|
4.5 KB
|
Cryptanalyzing the Legendre PRF.mp4
|
4.1 MB
|
DARPA Cryptographic Research.eng.srt
|
8.6 KB
|
DARPA Cryptographic Research.mp4
|
6.6 MB
|
decodingchallenge org.eng.srt
|
2.8 KB
|
decodingchallenge org.mp4
|
3.5 MB
|
DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.mp4
|
6.9 MB
|
He Gives C Sieves on the CSIDH.eng.srt
|
12.2 KB
|
He Gives C Sieves on the CSIDH.mp4
|
8.4 MB
|
Implementing Signal.mp4
|
8.7 MB
|
International Olympiad in Cryptography NSUCRYPTO.eng.srt
|
2.7 KB
|
International Olympiad in Cryptography NSUCRYPTO.mp4
|
3.7 MB
|
Key Words.eng.srt
|
8.1 KB
|
Key Words.mp4
|
8.9 MB
|
Microsoft's ElectionGuard.eng.srt
|
8.9 KB
|
Microsoft's ElectionGuard.mp4
|
8.6 MB
|
New Conference on Information Theoretic Cryptography (ITC).eng.srt
|
4.0 KB
|
New Conference on Information Theoretic Cryptography (ITC).mp4
|
3.3 MB
|
NIST Update.eng.srt
|
10.3 KB
|
NIST Update.mp4
|
9.1 MB
|
On parameter choices of Round5.eng.srt
|
3.0 KB
|
On parameter choices of Round5.mp4
|
4.1 MB
|
On the Round Complexity of Randomized Byzantine Agreement.eng.srt
|
4.3 KB
|
On the Round Complexity of Randomized Byzantine Agreement.mp4
|
4.6 MB
|
OPA.eng.srt
|
6.5 KB
|
OPA.mp4
|
7.5 MB
|
Opening and Borg Early Career Award (BECA) for Nadia Heninger.eng.srt
|
8.7 KB
|
Opening and Borg Early Career Award (BECA) for Nadia Heninger.mp4
|
9.4 MB
|
PQC Wiki.eng.srt
|
4.8 KB
|
PQC Wiki.mp4
|
4.1 MB
|
RSA Encraption.eng.srt
|
6.1 KB
|
RSA Encraption.mp4
|
5.8 MB
|
STARK friendly hash challenge.eng.srt
|
0.7 KB
|
STARK friendly hash challenge.mp4
|
1.2 MB
|
Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.eng.srt
|
6.1 KB
|
Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.mp4
|
4.7 MB
|
The Chia Proof of Space construction and implementation competition.eng.srt
|
1.5 KB
|
The Chia Proof of Space construction and implementation competition.mp4
|
1.4 MB
|
The Grand Unified Theory of Cryptology.eng.srt
|
3.3 KB
|
The Grand Unified Theory of Cryptology.mp4
|
3.2 MB
|
Trivial Real World Crypto.eng.srt
|
6.2 KB
|
Trivial Real World Crypto.mp4
|
5.7 MB
|
Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.eng.srt
|
11.0 KB
|
Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.mp4
|
6.6 MB
|
You are strong, FALCON, but we will break you.eng.srt
|
6.2 KB
|
You are strong, FALCON, but we will break you.mp4
|
6.0 MB
|
/Crypto/Crypto 2020/
|
A Classification of Computational Assumptions in the Algebraic Group Model.mp4
|
10.6 MB
|
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.eng.srt
|
43.9 KB
|
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.mp4
|
16.1 MB
|
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.eng.srt
|
35.1 KB
|
A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.mp4
|
19.3 MB
|
A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.mp4
|
11.0 MB
|
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.mp4
|
14.5 MB
|
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.eng.srt
|
40.5 KB
|
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.mp4
|
20.4 MB
|
Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.eng.srt
|
31.4 KB
|
Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.mp4
|
12.4 MB
|
Alzette a 64-bit ARX-box (feat. CRAX and TRAX).eng.srt
|
64.8 KB
|
Alzette a 64-bit ARX-box (feat. CRAX and TRAX).mp4
|
31.3 MB
|
Amplifying the Security of Functional Encryption, Unconditionally.eng.srt
|
49.3 KB
|
Amplifying the Security of Functional Encryption, Unconditionally.mp4
|
17.2 MB
|
Anonymous Tokens with Private Metadata Bit.eng.srt
|
42.0 KB
|
Anonymous Tokens with Private Metadata Bit.mp4
|
9.0 MB
|
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.eng.srt
|
43.6 KB
|
Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.mp4
|
15.8 MB
|
Automatic Verification of Differential Characteristics Application to Reduced Gimli.eng.srt
|
31.4 KB
|
Automatic Verification of Differential Characteristics Application to Reduced Gimli.mp4
|
24.7 MB
|
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).eng.srt
|
32.0 KB
|
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).mp4
|
12.3 MB
|
Black-Box Transformations from Passive to Covert Security with Public Verifiability.eng.srt
|
35.9 KB
|
Black-Box Transformations from Passive to Covert Security with Public Verifiability.mp4
|
8.3 MB
|
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.eng.srt
|
44.0 KB
|
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.mp4
|
19.9 MB
|
Collusion Resistant Watermarkable PRFs from Standard Assumptions.eng.srt
|
33.7 KB
|
Collusion Resistant Watermarkable PRFs from Standard Assumptions.mp4
|
12.9 MB
|
Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.eng.srt
|
46.3 KB
|
Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.mp4
|
38.8 MB
|
Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.eng.srt
|
38.5 KB
|
Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.mp4
|
12.3 MB
|
Cryptanalysis of LEDAcrypt.eng.srt
|
34.0 KB
|
Cryptanalysis of LEDAcrypt.mp4
|
19.5 MB
|
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.eng.srt
|
41.9 KB
|
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.mp4
|
23.5 MB
|
Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.eng.srt
|
42.4 KB
|
Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.mp4
|
18.0 MB
|
Cryptanalytic Extraction of Neural Network Models.eng.srt
|
55.5 KB
|
Cryptanalytic Extraction of Neural Network Models.mp4
|
20.1 MB
|
Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.eng.srt
|
137.3 KB
|
Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.mp4
|
58.2 MB
|
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.eng.srt
|
33.5 KB
|
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.mp4
|
15.0 MB
|
Dynamic Decentralized Functional Encryption.eng.srt
|
49.4 KB
|
Dynamic Decentralized Functional Encryption.mp4
|
20.9 MB
|
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.eng.srt
|
48.7 KB
|
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.mp4
|
16.5 MB
|
Efficient Pseudorandom Correlation Generators from Ring-LPN.eng.srt
|
42.3 KB
|
Efficient Pseudorandom Correlation Generators from Ring-LPN.mp4
|
10.3 MB
|
Fast and Secure Updatable Encryption.eng.srt
|
29.8 KB
|
Fast and Secure Updatable Encryption.mp4
|
10.7 MB
|
Fast reduction of algebraic lattices over cyclotomic fields.eng.srt
|
43.4 KB
|
Fast reduction of algebraic lattices over cyclotomic fields.mp4
|
20.5 MB
|
Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 o(k.eng.srt
|
50.5 KB
|
Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 o(k.mp4
|
17.6 MB
|
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.eng.srt
|
65.3 KB
|
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.mp4
|
19.7 MB
|
Fully Deniable Interactive Encryption.mp4
|
14.1 MB
|
Functional Encryption for Attribute-Weighted Sums from k-Lin.eng.srt
|
33.4 KB
|
Functional Encryption for Attribute-Weighted Sums from k-Lin.mp4
|
12.5 MB
|
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.eng.srt
|
59.9 KB
|
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.mp4
|
21.4 MB
|
Guaranteed Output Delivery Comes Free in Honest Majority MPC.eng.srt
|
45.9 KB
|
Guaranteed Output Delivery Comes Free in Honest Majority MPC.mp4
|
20.4 MB
|
Handling Adaptive Compromise for Practical Encryption Schemes.eng.srt
|
40.4 KB
|
Handling Adaptive Compromise for Practical Encryption Schemes.mp4
|
20.3 MB
|
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.mp4
|
16.0 MB
|
Incompressible Encodings.eng.srt
|
53.1 KB
|
Incompressible Encodings.mp4
|
13.9 MB
|
Indifferentiability for Public Key Cryptosystems.eng.srt
|
40.7 KB
|
Indifferentiability for Public Key Cryptosystems.mp4
|
12.3 MB
|
Interactive Proofs for Social Graphs.eng.srt
|
46.1 KB
|
Interactive Proofs for Social Graphs.mp4
|
19.2 MB
|
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.eng.srt
|
39.4 KB
|
Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.mp4
|
16.7 MB
|
Lattice-Based Blind Signatures, Revisited.mp4
|
9.8 MB
|
Leakage-Resilient Key Exchange and Two-Seed Extractors.mp4
|
18.4 MB
|
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.eng.srt
|
60.3 KB
|
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.mp4
|
18.9 MB
|
LWE with Side Information Attacks and Concrete Security Estimation.eng.srt
|
31.7 KB
|
LWE with Side Information Attacks and Concrete Security Estimation.mp4
|
18.4 MB
|
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.eng.srt
|
36.1 KB
|
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.mp4
|
13.0 MB
|
MPC with Friends and Foes.eng.srt
|
38.2 KB
|
MPC with Friends and Foes.mp4
|
15.4 MB
|
Multiparty Generation of an RSA Modulus.eng.srt
|
53.3 KB
|
Multiparty Generation of an RSA Modulus.mp4
|
19.5 MB
|
Nearly Optimal Robust Secret Sharing against Rushing Adversaries.eng.srt
|
41.7 KB
|
Nearly Optimal Robust Secret Sharing against Rushing Adversaries.mp4
|
15.9 MB
|
New Constructions of Hinting PRGs, OWFs with Encryption, and more.mp4
|
15.9 MB
|
New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.eng.srt
|
49.0 KB
|
New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.mp4
|
20.2 MB
|
New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.eng.srt
|
43.8 KB
|
New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.mp4
|
16.0 MB
|
NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.eng.srt
|
54.7 KB
|
NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.mp4
|
23.1 MB
|
Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.eng.srt
|
51.3 KB
|
Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.mp4
|
12.3 MB
|
Non-Malleability against Polynomial Tampering.eng.srt
|
46.3 KB
|
Non-Malleability against Polynomial Tampering.mp4
|
15.0 MB
|
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.eng.srt
|
36.1 KB
|
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.mp4
|
12.8 MB
|
On Succinct Arguments and Witness Encryption from Groups.mp4
|
15.2 MB
|
Order-Fairness for Byzantine Consensus.eng.srt
|
53.7 KB
|
Order-Fairness for Byzantine Consensus.mp4
|
15.1 MB
|
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.eng.srt
|
56.6 KB
|
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.mp4
|
21.3 MB
|
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.eng.srt
|
39.8 KB
|
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.mp4
|
18.1 MB
|
Practical Product Proofs for Lattice Commitments.eng.srt
|
41.7 KB
|
Practical Product Proofs for Lattice Commitments.mp4
|
9.9 MB
|
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.eng.srt
|
36.6 KB
|
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.mp4
|
21.1 MB
|
Quantifying the Security Cost of Migrating Protocols to Practice.eng.srt
|
52.2 KB
|
Quantifying the Security Cost of Migrating Protocols to Practice.mp4
|
19.2 MB
|
Random Probing Security Verification, Composition, Expansion and New Constructions.eng.srt
|
45.5 KB
|
Random Probing Security Verification, Composition, Expansion and New Constructions.mp4
|
16.8 MB
|
Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.mp4
|
17.0 MB
|
Reverse Firewalls for Actively Secure MPCs.eng.srt
|
51.7 KB
|
Reverse Firewalls for Actively Secure MPCs.mp4
|
17.2 MB
|
Round-optimal Black-box Commit-and-prove with Succinct Communication.eng.srt
|
34.7 KB
|
Round-optimal Black-box Commit-and-prove with Succinct Communication.mp4
|
13.7 MB
|
Rounding in the Rings.eng.srt
|
45.5 KB
|
Rounding in the Rings.mp4
|
15.3 MB
|
s-1 Opening remarks Security Models.eng.srt
|
136.7 KB
|
s-1 Opening remarks Security Models.mp4
|
68.2 MB
|
s-4 Our Models and Us.eng.srt
|
113.9 KB
|
s-4 Our Models and Us.mp4
|
59.4 MB
|
s-6 Public-key, Functional, & Witness Encryption.eng.srt
|
126.1 KB
|
s-6 Public-key, Functional, & Witness Encryption.mp4
|
56.5 MB
|
s-10 Rump Session.eng.srt
|
279.7 KB
|
s-10 Rump Session.mp4
|
180.9 MB
|
s-12 Multiparty Computation 1.mp4
|
51.2 MB
|
s-14 Real-world Crypto.eng.srt
|
108.8 KB
|
s-14 Real-world Crypto.mp4
|
47.4 MB
|
s-16 Zero Knowledge Proofs.eng.srt
|
136.9 KB
|
s-16 Zero Knowledge Proofs.mp4
|
58.4 MB
|
s-20 NIZKs, Consensus, Delay Functions.eng.srt
|
92.4 KB
|
s-20 NIZKs, Consensus, Delay Functions.mp4
|
40.7 MB
|
s-22 Leakage and Outsourced Encryption.eng.srt
|
131.1 KB
|
s-22 Leakage and Outsourced Encryption.mp4
|
47.8 MB
|
s-26 Cryptanalysis 2.eng.srt
|
93.9 KB
|
s-26 Cryptanalysis 2.mp4
|
44.4 MB
|
s-28 Constructions.eng.srt
|
101.4 KB
|
s-28 Constructions.mp4
|
44.6 MB
|
s-30 Multiparty Computation 2.eng.srt
|
74.7 KB
|
s-30 Multiparty Computation 2.mp4
|
28.3 MB
|
s-118 Best Paper Awards Session.eng.srt
|
168.7 KB
|
s-118 Best Paper Awards Session.mp4
|
70.8 MB
|
s-121 Multiparty Computation 3.eng.srt
|
101.4 KB
|
s-121 Multiparty Computation 3.mp4
|
39.2 MB
|
s-124 Lattices and Related Problems.eng.srt
|
116.9 KB
|
s-124 Lattices and Related Problems.mp4
|
54.9 MB
|
s-126 Post Quantum Crypto 2.eng.srt
|
75.6 KB
|
s-126 Post Quantum Crypto 2.mp4
|
31.6 MB
|
s-128 Post Quantum Crypto 1.eng.srt
|
78.8 KB
|
s-128 Post Quantum Crypto 1.mp4
|
48.2 MB
|
s-130 Test of Time Award Ceremony Cryptanalysis 1.mp4
|
73.7 MB
|
Scalable Pseudorandom Quantum States.eng.srt
|
51.6 KB
|
Scalable Pseudorandom Quantum States.mp4
|
19.9 MB
|
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.eng.srt
|
42.6 KB
|
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.mp4
|
15.5 MB
|
Security Analysis of NIST CTR-DRBG.eng.srt
|
23.2 KB
|
Security Analysis of NIST CTR-DRBG.mp4
|
8.7 MB
|
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.eng.srt
|
52.6 KB
|
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.mp4
|
15.4 MB
|
Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.eng.srt
|
7.8 KB
|
Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.mp4
|
14.4 MB
|
Spartan Efficient and general-purpose zkSNARKs without trusted setup.eng.srt
|
29.5 KB
|
Spartan Efficient and general-purpose zkSNARKs without trusted setup.mp4
|
10.1 MB
|
Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.eng.srt
|
47.4 KB
|
Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.mp4
|
11.6 MB
|
The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.eng.srt
|
28.8 KB
|
The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.mp4
|
8.1 MB
|
The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.eng.srt
|
40.5 KB
|
The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.mp4
|
12.6 MB
|
The Memory-Tightness of Authenticated Encryption.eng.srt
|
42.7 KB
|
The Memory-Tightness of Authenticated Encryption.mp4
|
12.1 MB
|
The Summation-Truncation Hybrid Reusing Discarded Bits for Free.mp4
|
10.0 MB
|
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.mp4
|
17.5 MB
|
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.eng.srt
|
56.8 KB
|
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.mp4
|
19.3 MB
|
Universally Composable Relaxed Password Authenticated Key Exchange.eng.srt
|
36.8 KB
|
Universally Composable Relaxed Password Authenticated Key Exchange.mp4
|
15.9 MB
|
Verifiable Registration-Based Encryption.mp4
|
18.5 MB
|
/Crypto/Crypto 2021/
|
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.eng.srt
|
38.3 KB
|
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.mp4
|
15.3 MB
|
A Compressed Sigma-Protocol Theory for Lattices.eng.srt
|
48.0 KB
|
A Compressed Sigma-Protocol Theory for Lattices.mp4
|
19.9 MB
|
A Logarithmic Lower Bound for Oblivious RAM (for all parameters).eng.srt
|
36.8 KB
|
A Logarithmic Lower Bound for Oblivious RAM (for all parameters).mp4
|
21.3 MB
|
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.eng.srt
|
52.0 KB
|
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.mp4
|
28.6 MB
|
A Rational Protocol Treatment of 51% Attacks.eng.srt
|
32.4 KB
|
A Rational Protocol Treatment of 51% Attacks.mp4
|
16.5 MB
|
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.eng.srt
|
28.3 KB
|
Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.mp4
|
8.2 MB
|
An Algebraic Framework for Universal and Updatable SNARKs.eng.srt
|
43.3 KB
|
An Algebraic Framework for Universal and Updatable SNARKs.mp4
|
13.0 MB
|
Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I....eng.srt
|
30.7 KB
|
Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I....mp4
|
16.1 MB
|
ATLAS Efficient and Scalable MPC in the Honest Majority Setting.eng.srt
|
33.9 KB
|
ATLAS Efficient and Scalable MPC in the Honest Majority Setting.mp4
|
11.2 MB
|
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.eng.srt
|
34.3 KB
|
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.mp4
|
10.3 MB
|
Broadcast-Optimal Two Round MPC with an Honest Majority.eng.srt
|
25.3 KB
|
Broadcast-Optimal Two Round MPC with an Honest Majority.mp4
|
9.3 MB
|
Compact Ring Signatures from Learning With Errors.eng.srt
|
40.1 KB
|
Compact Ring Signatures from Learning With Errors.mp4
|
12.7 MB
|
Composition with Knowledge Assumptions.eng.srt
|
47.5 KB
|
Composition with Knowledge Assumptions.mp4
|
14.3 MB
|
Compressing Proofs of k-Out-Of-n Partial Knowledge.eng.srt
|
41.7 KB
|
Compressing Proofs of k-Out-Of-n Partial Knowledge.mp4
|
18.0 MB
|
Computational Hardness of Optimal Fair Computation Beyond Minicrypt.eng.srt
|
30.4 KB
|
Computational Hardness of Optimal Fair Computation Beyond Minicrypt.mp4
|
14.1 MB
|
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.eng.srt
|
37.4 KB
|
Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.mp4
|
17.1 MB
|
Counterexamples to New Circular Security Assumptions Underlying iO.eng.srt
|
47.6 KB
|
Counterexamples to New Circular Security Assumptions Underlying iO.mp4
|
28.6 MB
|
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.eng.srt
|
34.4 KB
|
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.mp4
|
36.6 MB
|
Deniable Fully Homomorphic Encryption from Learning With Errors.eng.srt
|
30.2 KB
|
Deniable Fully Homomorphic Encryption from Learning With Errors.mp4
|
12.1 MB
|
Differential-Linear Cryptanalysis from an Algebraic Perspective.eng.srt
|
26.6 KB
|
Differential-Linear Cryptanalysis from an Algebraic Perspective.mp4
|
12.6 MB
|
Does Fiat-Shamir Require a Cryptographic Hash Function.eng.srt
|
44.8 KB
|
Does Fiat-Shamir Require a Cryptographic Hash Function.mp4
|
13.9 MB
|
DualRing Generic Construction of Ring Signatures with Efficient Instantiations.eng.srt
|
48.0 KB
|
DualRing Generic Construction of Ring Signatures with Efficient Instantiations.mp4
|
18.7 MB
|
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.eng.srt
|
36.9 KB
|
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.mp4
|
15.4 MB
|
Efficient Key Recovery for all HFE Signature Variants.mp4
|
16.6 MB
|
Fine-grained Secure Attribute-based Encryption.eng.srt
|
26.9 KB
|
Fine-grained Secure Attribute-based Encryption.mp4
|
9.8 MB
|
Fluid MPC Secure Multiparty Computation with Dynamic Participants.eng.srt
|
42.5 KB
|
Fluid MPC Secure Multiparty Computation with Dynamic Participants.mp4
|
17.2 MB
|
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.mp4
|
19.3 MB
|
Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.eng.srt
|
65.7 KB
|
Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.mp4
|
25.6 MB
|
Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.eng.srt
|
50.1 KB
|
Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.mp4
|
18.6 MB
|
Hidden Cosets and Applications to Unclonable Cryptography.eng.srt
|
43.3 KB
|
Hidden Cosets and Applications to Unclonable Cryptography.mp4
|
13.3 MB
|
How to Meet Ternary LWE Keys.eng.srt
|
23.7 KB
|
How to Meet Ternary LWE Keys.mp4
|
16.2 MB
|
Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.eng.srt
|
49.7 KB
|
Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.mp4
|
16.4 MB
|
Improved Computational Extractors and their Applications.eng.srt
|
36.6 KB
|
Improved Computational Extractors and their Applications.mp4
|
12.8 MB
|
Improved torsion-point attacks on SIDH variants.eng.srt
|
36.3 KB
|
Improved torsion-point attacks on SIDH variants.mp4
|
15.0 MB
|
KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.eng.srt
|
44.0 KB
|
KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.mp4
|
22.1 MB
|
Large Message Homomorphic Secret Sharing from DCR and Applications.mp4
|
13.7 MB
|
Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo....eng.srt
|
45.0 KB
|
Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo....mp4
|
31.8 MB
|
Limits on the Adaptive Security of Yao’s Garbling.eng.srt
|
11.7 KB
|
Limits on the Adaptive Security of Yao’s Garbling.mp4
|
13.8 MB
|
Linear Cryptanalysis of FF3-1 and FEA.eng.srt
|
42.5 KB
|
Linear Cryptanalysis of FF3-1 and FEA.mp4
|
16.8 MB
|
Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].eng.srt
|
35.2 KB
|
Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].mp4
|
13.7 MB
|
Lower bounds on lattice sieving and information set decoding.eng.srt
|
41.3 KB
|
Lower bounds on lattice sieving and information set decoding.mp4
|
39.9 MB
|
Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction....eng.srt
|
50.1 KB
|
Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction....mp4
|
19.0 MB
|
Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.eng.srt
|
24.7 KB
|
Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.mp4
|
19.0 MB
|
MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.eng.srt
|
46.2 KB
|
MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.mp4
|
16.7 MB
|
MoSS Modular Security Specifications Framework.eng.srt
|
46.0 KB
|
MoSS Modular Security Specifications Framework.mp4
|
17.5 MB
|
MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica....eng.srt
|
48.3 KB
|
MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica....mp4
|
14.6 MB
|
Multi-Input Quadratic Functional Encryption from Pairings.eng.srt
|
31.5 KB
|
Multi-Input Quadratic Functional Encryption from Pairings.mp4
|
11.4 MB
|
Multi-theorem Designated-Verifier NIZK for QMA.eng.srt
|
49.5 KB
|
Multi-theorem Designated-Verifier NIZK for QMA.mp4
|
18.3 MB
|
MuSig2 Simple Two-Round Schnorr Multi-Signatures.eng.srt
|
43.4 KB
|
MuSig2 Simple Two-Round Schnorr Multi-Signatures.mp4
|
26.0 MB
|
New Approaches for Quantum Copy-Protection.eng.srt
|
39.3 KB
|
New Approaches for Quantum Copy-Protection.mp4
|
17.2 MB
|
No Time to HashOn Super-Efficient Entropy Accumulation.eng.srt
|
31.1 KB
|
No Time to HashOn Super-Efficient Entropy Accumulation.mp4
|
12.3 MB
|
Non-Interactive Batch Arguments for NP from Standard Assumptions.eng.srt
|
38.6 KB
|
Non-Interactive Batch Arguments for NP from Standard Assumptions.mp4
|
12.4 MB
|
Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien....eng.srt
|
31.5 KB
|
Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien....mp4
|
18.0 MB
|
Non-Malleable Codes for Bounded Parallel-Time Tampering.eng.srt
|
49.2 KB
|
Non-Malleable Codes for Bounded Parallel-Time Tampering.mp4
|
11.7 MB
|
Oblivious Key-Value Stores and Amplification for Private Set Intersection.eng.srt
|
45.7 KB
|
Oblivious Key-Value Stores and Amplification for Private Set Intersection.mp4
|
14.6 MB
|
Oblivious RAM with Worst-Case Logarithmic Overhead.eng.srt
|
40.8 KB
|
Oblivious RAM with Worst-Case Logarithmic Overhead.mp4
|
13.7 MB
|
On the Concurrent Composition of Quantum Zero-Knowledge.eng.srt
|
48.2 KB
|
On the Concurrent Composition of Quantum Zero-Knowledge.mp4
|
20.1 MB
|
On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.eng.srt
|
44.6 KB
|
On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.mp4
|
19.5 MB
|
On the Round Complexity of Black-Box Secure MPC.eng.srt
|
42.0 KB
|
On the Round Complexity of Black-Box Secure MPC.mp4
|
15.7 MB
|
On the Round Complexity of Secure Quantum Computation.eng.srt
|
51.1 KB
|
On the Round Complexity of Secure Quantum Computation.mp4
|
16.8 MB
|
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.eng.srt
|
35.5 KB
|
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.mp4
|
16.7 MB
|
One-Way Functions Imply Secure Computation in a Quantum World.eng.srt
|
46.7 KB
|
One-Way Functions Imply Secure Computation in a Quantum World.mp4
|
15.1 MB
|
Proof-Carrying Data without Succinct Arguments.eng.srt
|
47.0 KB
|
Proof-Carrying Data without Succinct Arguments.mp4
|
15.5 MB
|
Provable Security Analysis of FIDO2.mp4
|
17.1 MB
|
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi....eng.srt
|
62.2 KB
|
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi....mp4
|
21.1 MB
|
Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.eng.srt
|
26.7 KB
|
Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.mp4
|
12.3 MB
|
Quadratic Secret Sharing and Conditional Disclosure of Secrets.eng.srt
|
40.0 KB
|
Quadratic Secret Sharing and Conditional Disclosure of Secrets.mp4
|
14.6 MB
|
Quantum Collision Attacks on Reduced SHA-256 and SHA-512.mp4
|
20.0 MB
|
Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.eng.srt
|
32.1 KB
|
Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.mp4
|
13.9 MB
|
Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.eng.srt
|
36.6 KB
|
Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.mp4
|
19.3 MB
|
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.eng.srt
|
50.6 KB
|
Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.mp4
|
28.6 MB
|
s-1 Opening Remarks Signatures.eng.srt
|
101.4 KB
|
s-1 Opening Remarks Signatures.mp4
|
51.8 MB
|
s-2 Invited Talk I (Vanessa Teague).eng.srt
|
134.6 KB
|
s-2 Invited Talk I (Vanessa Teague).mp4
|
71.8 MB
|
s-6 Quantum Cryptography 1.eng.srt
|
70.1 KB
|
s-6 Quantum Cryptography 1.mp4
|
34.8 MB
|
s-8 Award Papers.eng.srt
|
105.4 KB
|
s-8 Award Papers.mp4
|
46.9 MB
|
s-10 Lattice Cryptography.eng.srt
|
78.0 KB
|
s-10 Lattice Cryptography.mp4
|
41.7 MB
|
s-12 Lattice Cryptanalysis.eng.srt
|
95.0 KB
|
s-12 Lattice Cryptanalysis.mp4
|
51.7 MB
|
s-14 Quantum Cryptography 2.eng.srt
|
71.3 KB
|
s-14 Quantum Cryptography 2.mp4
|
43.1 MB
|
s-16 Models.eng.srt
|
47.8 KB
|
s-16 Models.mp4
|
29.3 MB
|
s-17 Invited Talk II (Jens Groth).eng.srt
|
105.4 KB
|
s-17 Invited Talk II (Jens Groth).mp4
|
47.8 MB
|
s-18 Succinct Arguments.eng.srt
|
103.2 KB
|
s-18 Succinct Arguments.mp4
|
54.2 MB
|
s-20 Cryptanalysis.eng.srt
|
70.0 KB
|
s-20 Cryptanalysis.mp4
|
45.6 MB
|
s-22 Cryptanalysis (continued).eng.srt
|
64.0 KB
|
s-22 Cryptanalysis (continued).mp4
|
41.2 MB
|
s-24 Codes and Extractors.eng.srt
|
95.2 KB
|
s-24 Codes and Extractors.mp4
|
48.8 MB
|
s-26 Multi-Party Computation 3.eng.srt
|
73.6 KB
|
s-26 Multi-Party Computation 3.mp4
|
35.9 MB
|
s-28 Encryption.eng.srt
|
103.9 KB
|
s-28 Encryption.mp4
|
50.0 MB
|
s-30 Foundations.eng.srt
|
71.7 KB
|
s-30 Foundations.mp4
|
30.5 MB
|
s-136 Quantum Cryptography 1 (continued).eng.srt
|
65.2 KB
|
s-136 Quantum Cryptography 1 (continued).mp4
|
33.3 MB
|
s-138 Signatures (continued).eng.srt
|
38.0 KB
|
s-138 Signatures (continued).mp4
|
21.7 MB
|
s-140 Multi-Party Computation 1.eng.srt
|
98.8 KB
|
s-140 Multi-Party Computation 1.mp4
|
50.2 MB
|
s-144 Multi-Party Computation 2.eng.srt
|
57.9 KB
|
s-144 Multi-Party Computation 2.mp4
|
26.8 MB
|
s-146 Multi-Party Computation 2 (continued).eng.srt
|
70.8 KB
|
s-146 Multi-Party Computation 2 (continued).mp4
|
41.9 MB
|
s-150 Secret Sharing.eng.srt
|
51.9 KB
|
s-150 Secret Sharing.mp4
|
27.9 MB
|
s-151 Applied Cryptography and Side Channels.eng.srt
|
78.7 KB
|
s-151 Applied Cryptography and Side Channels.mp4
|
45.8 MB
|
s-153 Crypto 2021 Rump Session.eng.srt
|
212.0 KB
|
s-153 Crypto 2021 Rump Session.mp4
|
139.5 MB
|
s-156 Secret Sharing (continued).eng.srt
|
48.8 KB
|
s-156 Secret Sharing (continued).mp4
|
24.9 MB
|
s-158 Zero-Knowledge.eng.srt
|
92.8 KB
|
s-158 Zero-Knowledge.mp4
|
52.6 MB
|
s-162 Foundations (continued).eng.srt
|
40.3 KB
|
s-162 Foundations (continued).mp4
|
20.0 MB
|
s-164 Low-Complexity Cryptography.eng.srt
|
55.8 KB
|
s-164 Low-Complexity Cryptography.mp4
|
33.2 MB
|
s-166 Protocols Wrap Up.eng.srt
|
88.9 KB
|
s-166 Protocols Wrap Up.mp4
|
48.9 MB
|
s-170 Test of Time Awards.eng.srt
|
17.5 KB
|
s-170 Test of Time Awards.mp4
|
13.7 MB
|
Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio....eng.srt
|
39.8 KB
|
Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio....mp4
|
13.4 MB
|
Secure Wire Shuffling in the Probing Model.eng.srt
|
26.6 KB
|
Secure Wire Shuffling in the Probing Model.mp4
|
14.1 MB
|
Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.eng.srt
|
42.4 KB
|
Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.mp4
|
20.1 MB
|
Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.eng.srt
|
51.2 KB
|
Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.mp4
|
14.9 MB
|
SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential....eng.srt
|
41.7 KB
|
SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential....mp4
|
16.7 MB
|
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.eng.srt
|
32.7 KB
|
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.mp4
|
13.4 MB
|
SSE and SSD Page-Efficient Searchable Symmetric Encryption.eng.srt
|
44.8 KB
|
SSE and SSD Page-Efficient Searchable Symmetric Encryption.mp4
|
12.4 MB
|
Sublinear GMW-Style Compiler for MPC with Preprocessing.eng.srt
|
42.4 KB
|
Sublinear GMW-Style Compiler for MPC with Preprocessing.mp4
|
15.7 MB
|
Subquadratic SNARGs in the Random Oracle Model.eng.srt
|
46.9 KB
|
Subquadratic SNARGs in the Random Oracle Model.mp4
|
18.5 MB
|
Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.eng.srt
|
46.4 KB
|
Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.mp4
|
30.2 MB
|
Sumcheck Arguments and their Applications.mp4
|
13.3 MB
|
Targeted Lossy Functions and Applications.eng.srt
|
32.6 KB
|
Targeted Lossy Functions and Applications.mp4
|
18.4 MB
|
The $t$-wise Independence of Substitution-Permutation Networks.eng.srt
|
33.4 KB
|
The $t$-wise Independence of Substitution-Permutation Networks.mp4
|
14.2 MB
|
The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.eng.srt
|
46.4 KB
|
The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.mp4
|
19.9 MB
|
Thinking Outside the Superbox.eng.srt
|
39.2 KB
|
Thinking Outside the Superbox.mp4
|
17.7 MB
|
Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.eng.srt
|
51.6 KB
|
Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.mp4
|
13.8 MB
|
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.mp4
|
11.5 MB
|
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.eng.srt
|
48.6 KB
|
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.mp4
|
17.7 MB
|
Tight State-Restoration Soundness in the Algebraic Group Model.eng.srt
|
42.9 KB
|
Tight State-Restoration Soundness in the Algebraic Group Model.mp4
|
12.7 MB
|
Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${ ....eng.srt
|
45.0 KB
|
Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${ ....mp4
|
14.4 MB
|
Time- and Space-Efficient Arguments from Groups of Unknown Order.eng.srt
|
57.7 KB
|
Time- and Space-Efficient Arguments from Groups of Unknown Order.mp4
|
21.8 MB
|
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.eng.srt
|
49.4 KB
|
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.mp4
|
17.4 MB
|
Towards faster polynomial-time lattice reduction.eng.srt
|
40.4 KB
|
Towards faster polynomial-time lattice reduction.mp4
|
30.6 MB
|
Towards Tight Random Probing Security.eng.srt
|
34.2 KB
|
Towards Tight Random Probing Security.mp4
|
13.4 MB
|
Traceable Secret Sharing and Applications.eng.srt
|
39.4 KB
|
Traceable Secret Sharing and Applications.mp4
|
15.0 MB
|
Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.eng.srt
|
35.1 KB
|
Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.mp4
|
11.5 MB
|
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.eng.srt
|
38.0 KB
|
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.mp4
|
13.3 MB
|
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.eng.srt
|
48.3 KB
|
Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.mp4
|
17.8 MB
|
White Box Traitor Tracing.eng.srt
|
46.2 KB
|
White Box Traitor Tracing.mp4
|
11.0 MB
|
Witness Authenticating NIZKs and Applications.eng.srt
|
42.4 KB
|
Witness Authenticating NIZKs and Applications.mp4
|
16.3 MB
|
You Only Speak Once Secure MPC with Stateless Ephemeral Roles.eng.srt
|
38.9 KB
|
You Only Speak Once Secure MPC with Stateless Ephemeral Roles.mp4
|
12.9 MB
|
/Crypto/Crypto 2022/
|
(Nondeterministic) Hardness vs. Non-Malleability.mp4
|
1.3 MB
|
(Nondeterministic) Hardness vs. Non-Malleability.srt
|
2.5 KB
|
A More Complete Analysis of the Signal Double Ratchet Algorithm.mp4
|
3.1 MB
|
A More Complete Analysis of the Signal Double Ratchet Algorithm.srt
|
9.1 KB
|
A New Approach to Efficient Non-Malleable Zero-Knowledge.mp4
|
3.6 MB
|
A New Approach to Efficient Non-Malleable Zero-Knowledge.srt
|
10.5 KB
|
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.mp4
|
5.9 MB
|
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.srt
|
10.5 KB
|
Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.mp4
|
2.3 MB
|
Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.srt
|
6.4 KB
|
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.mp4
|
3.2 MB
|
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.srt
|
10.0 KB
|
Augmented Random Oracles.mp4
|
1.3 MB
|
Augmented Random Oracles.srt
|
4.0 KB
|
Authenticated garbling from simple correlations.mp4
|
3.8 MB
|
Authenticated garbling from simple correlations.srt
|
11.7 KB
|
Batch Arguments for NP and More from Standard Bilinear Group Assumptions.mp4
|
3.1 MB
|
Batch Arguments for NP and More from Standard Bilinear Group Assumptions.srt
|
10.3 KB
|
Better than Advertised Security for Non-Interactive Threshold Signatures.mp4
|
3.1 MB
|
Better than Advertised Security for Non-Interactive Threshold Signatures.srt
|
7.7 KB
|
Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.mp4
|
3.1 MB
|
Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.srt
|
10.7 KB
|
Block-Cipher-Based Tree Hashing.mp4
|
3.6 MB
|
Block-Cipher-Based Tree Hashing.srt
|
8.7 KB
|
Breaking Rainbow Takes a Weekend on a Laptop.mp4
|
3.1 MB
|
Breaking Rainbow Takes a Weekend on a Laptop.srt
|
10.0 KB
|
Certified Everlasting Zero-Knowledge Proof for QMA.mp4
|
3.4 MB
|
Certified Everlasting Zero-Knowledge Proof for QMA.srt
|
7.7 KB
|
Collision-Resistance from Multi-Collision-Resistance.mp4
|
2.4 MB
|
Collision-Resistance from Multi-Collision-Resistance.srt
|
4.7 KB
|
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.mp4
|
3.6 MB
|
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.srt
|
9.8 KB
|
Constructive Post-Quantum Reductions.mp4
|
1.8 MB
|
Constructive Post-Quantum Reductions.srt
|
3.8 KB
|
Correlated Pseudorandomness from Expand-Accumulate Codes.mp4
|
3.7 MB
|
Correlated Pseudorandomness from Expand-Accumulate Codes.srt
|
12.9 KB
|
Cryptography from Pseudorandom Quantum States.mp4
|
3.2 MB
|
Cryptography from Pseudorandom Quantum States.srt
|
7.8 KB
|
Differential Cryptanalysis in the Fixed-Key Model.mp4
|
4.4 MB
|
Differential Cryptanalysis in the Fixed-Key Model.srt
|
10.8 KB
|
Dynamic Local Searchable Symmetric Encryption.mp4
|
3.8 MB
|
Dynamic Local Searchable Symmetric Encryption.srt
|
11.7 KB
|
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.mp4
|
4.3 MB
|
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.srt
|
8.3 KB
|
Faster Sounder Succinct Arguments and IOPs.mp4
|
1.8 MB
|
Faster Sounder Succinct Arguments and IOPs.srt
|
3.7 KB
|
Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.mp4
|
3.6 MB
|
Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.srt
|
8.0 KB
|
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.mp4
|
2.4 MB
|
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.srt
|
7.6 KB
|
Gossiping for Communication-Efficient Broadcast.mp4
|
3.1 MB
|
Gossiping for Communication-Efficient Broadcast.srt
|
10.1 KB
|
Implicit White-Box Implementations White-Boxing ARX Ciphers.mp4
|
3.8 MB
|
Implicit White-Box Implementations White-Boxing ARX Ciphers.srt
|
9.5 KB
|
Improving Support-Minors rank attacks applications to GeMSS and Rainbow.mp4
|
3.6 MB
|
Improving Support-Minors rank attacks applications to GeMSS and Rainbow.srt
|
7.0 KB
|
Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.mp4
|
4.6 MB
|
Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.srt
|
11.5 KB
|
Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.mp4
|
10.9 MB
|
Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.srt
|
5.4 KB
|
Le Mans Dynamic and Fluid MPC for Dishonest Majority.mp4
|
3.1 MB
|
Le Mans Dynamic and Fluid MPC for Dishonest Majority.srt
|
8.9 KB
|
log∗-Round Game-Theoretically-Fair Leader Election.mp4
|
2.6 MB
|
log∗-Round Game-Theoretically-Fair Leader Election.srt
|
8.9 KB
|
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.mp4
|
3.6 MB
|
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.srt
|
7.8 KB
|
Lower Bound on SNARGs in the Random Oracle Model.mp4
|
3.5 MB
|
Lower Bound on SNARGs in the Random Oracle Model.srt
|
9.9 KB
|
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.mp4
|
2.5 MB
|
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.srt
|
8.5 KB
|
Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.mp4
|
3.4 MB
|
Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.srt
|
11.1 KB
|
Multi-Input Attribute Based Encryption and Predicate Encryption.mp4
|
2.8 MB
|
Multi-Input Attribute Based Encryption and Predicate Encryption.srt
|
8.9 KB
|
Multimodal Private Signatures.mp4
|
13.0 MB
|
Multimodal Private Signatures.srt
|
32.7 KB
|
MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.mp4
|
4.1 MB
|
MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.srt
|
12.2 KB
|
Nearly Optimal Property Preserving Hashing.mp4
|
2.1 MB
|
Nearly Optimal Property Preserving Hashing.srt
|
7.3 KB
|
New Constructions of Collapsing Hashes.mp4
|
1.3 MB
|
New Constructions of Collapsing Hashes.srt
|
4.8 KB
|
Nova Recursive Zero-Knowledge Arguments from Folding Schemes.mp4
|
3.7 MB
|
Nova Recursive Zero-Knowledge Arguments from Folding Schemes.srt
|
9.9 KB
|
Oblivious Message Retrieval.mp4
|
3.6 MB
|
Oblivious Message Retrieval.srt
|
9.3 KB
|
Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.mp4
|
4.4 MB
|
Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.srt
|
8.7 KB
|
On Codes and Learning with Errors over Function Fields.mp4
|
7.7 MB
|
On Codes and Learning with Errors over Function Fields.srt
|
7.8 KB
|
On the Feasibility of Unclonable Encryption and, More.mp4
|
2.9 MB
|
On the Feasibility of Unclonable Encryption and, More.srt
|
8.2 KB
|
On the Impossibility of Key Agreements from Quantum Random Oracles.mp4
|
3.6 MB
|
On the Impossibility of Key Agreements from Quantum Random Oracles.srt
|
9.2 KB
|
On the Insider Security of MLS.mp4
|
3.4 MB
|
On the Insider Security of MLS.srt
|
9.1 KB
|
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.mp4
|
11.8 MB
|
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.srt
|
43.3 KB
|
Orion Zero Knowledge Proof with Linear Prover Time.mp4
|
2.0 MB
|
Orion Zero Knowledge Proof with Linear Prover Time.srt
|
4.9 KB
|
Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.mp4
|
2.5 MB
|
Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.srt
|
7.1 KB
|
Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.mp4
|
4.7 MB
|
Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.srt
|
7.6 KB
|
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.mp4
|
2.2 MB
|
Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.srt
|
8.1 KB
|
Password-Authenticated Key Exchange from Group Actions.mp4
|
4.5 MB
|
Password-Authenticated Key Exchange from Group Actions.srt
|
8.2 KB
|
PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.mp4
|
3.5 MB
|
PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.srt
|
8.3 KB
|
Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.mp4
|
5.3 MB
|
Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.srt
|
15.0 KB
|
Practical Statistically-Sound Proofs of Exponentiation in any Group.mp4
|
2.1 MB
|
Practical Statistically-Sound Proofs of Exponentiation in any Group.srt
|
5.0 KB
|
Practical Sublinear Proofs for R1CS from Lattices.mp4
|
1.9 MB
|
Practical Sublinear Proofs for R1CS from Lattices.srt
|
3.9 KB
|
Programmable Distributed Point Functions.mp4
|
3.0 MB
|
Programmable Distributed Point Functions.srt
|
9.8 KB
|
Provably Secure Reflection Ciphers.mp4
|
3.3 MB
|
Provably Secure Reflection Ciphers.srt
|
7.8 KB
|
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.mp4
|
3.1 MB
|
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.srt
|
9.8 KB
|
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.mp4
|
2.5 MB
|
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.srt
|
7.6 KB
|
Public-Key Watermarking Schemes for Pseudorandom Functions.mp4
|
13.0 MB
|
Public-Key Watermarking Schemes for Pseudorandom Functions.srt
|
32.7 KB
|
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.mp4
|
3.0 MB
|
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.srt
|
8.9 KB
|
Quantum Commitments and Signatures without One-Way Functions.mp4
|
3.7 MB
|
Quantum Commitments and Signatures without One-Way Functions.srt
|
6.3 KB
|
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.mp4
|
3.0 MB
|
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.srt
|
6.7 KB
|
Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.mp4
|
1.4 MB
|
Securing Approximate Homomorphic Encryption using Differential Privacy.mp4
|
4.9 MB
|
Securing Approximate Homomorphic Encryption using Differential Privacy.srt
|
14.2 KB
|
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.mp4
|
3.0 MB
|
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.srt
|
9.2 KB
|
Short Leakage Resilient and Non-malleable Secret Sharing Schemes.mp4
|
4.3 MB
|
Short Leakage Resilient and Non-malleable Secret Sharing Schemes.srt
|
10.1 KB
|
Shorter Hash-and-Sign Lattice-Based Signatures.mp4
|
3.2 MB
|
Shorter Hash-and-Sign Lattice-Based Signatures.srt
|
10.1 KB
|
Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.mp4
|
3.1 MB
|
Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.srt
|
6.9 KB
|
Simplified MITM Modeling for Permutations New (Quantum) Attacks.mp4
|
4.1 MB
|
Simplified MITM Modeling for Permutations New (Quantum) Attacks.srt
|
10.7 KB
|
Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.mp4
|
2.7 MB
|
Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.srt
|
7.9 KB
|
Statistically Sender-Private OT From LPN and Derandomization.mp4
|
2.8 MB
|
Statistically Sender-Private OT From LPN and Derandomization.srt
|
6.8 KB
|
Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.mp4
|
3.1 MB
|
Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.srt
|
7.3 KB
|
Succinct Classical Verification of Quantum Computation.mp4
|
2.8 MB
|
Succinct Classical Verification of Quantum Computation.srt
|
8.3 KB
|
Succinct Interactive Oracle Proofs Applications and Limitations.mp4
|
3.0 MB
|
Succinct Interactive Oracle Proofs Applications and Limitations.srt
|
8.7 KB
|
Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.mp4
|
5.4 MB
|
Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.srt
|
9.0 KB
|
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.mp4
|
2.7 MB
|
Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.srt
|
6.4 KB
|
Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.mp4
|
3.3 MB
|
Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.srt
|
6.8 KB
|
Threshold Signatures with Private Accountability.mp4
|
4.3 MB
|
Threshold Signatures with Private Accountability.srt
|
10.6 KB
|
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.mp4
|
2.6 MB
|
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.srt
|
8.2 KB
|
Tight Preimage Resistance of the Sponge Construction.mp4
|
3.3 MB
|
Tight Preimage Resistance of the Sponge Construction.srt
|
9.8 KB
|
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.mp4
|
3.3 MB
|
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.srt
|
8.2 KB
|
Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.mp4
|
2.4 MB
|
Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.srt
|
9.8 KB
|
To Label, or Not To Label (in Generic Groups).mp4
|
1.2 MB
|
To Label, or Not To Label (in Generic Groups).srt
|
3.8 KB
|
Triangulating Rebound Attack on AES-like Hashing.mp4
|
3.0 MB
|
Triangulating Rebound Attack on AES-like Hashing.srt
|
5.8 KB
|
Universally Composable End-to-End Secure Messaging (2).mp4
|
4.8 MB
|
Universally Composable End-to-End Secure Messaging (2).srt
|
11.4 KB
|
Universally Composable End-to-End Secure Messaging.mp4
|
4.4 MB
|
Universally Composable End-to-End Secure Messaging.srt
|
10.8 KB
|
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.mp4
|
3.1 MB
|
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.srt
|
11.8 KB
|
/.../Crypto 2022 Affiliated Events/
|
GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.mp4
|
69.3 MB
|
GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.srt
|
125.1 KB
|
GHTC 2022 Round Table 2 Agility for converging to a PQ world.mp4
|
72.1 MB
|
GHTC 2022 Round Table 2 Agility for converging to a PQ world.srt
|
141.1 KB
|
GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.mp4
|
61.8 MB
|
GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.srt
|
98.4 KB
|
GHTC 2022 Round Table 4 Lessons Learned.mp4
|
60.6 MB
|
GHTC 2022 Round Table 4 Lessons Learned.srt
|
108.7 KB
|
MathCrypt 2022 Session 1 (part I).mp4
|
21.6 MB
|
MathCrypt 2022 Session 1 (part I).srt
|
39.6 KB
|
MathCrypt 2022 Session 1 (part II).mp4
|
14.6 MB
|
MathCrypt 2022 Session 1 (part II).srt
|
32.8 KB
|
MathCrypt 2022 Session 2 (part I).mp4
|
14.4 MB
|
MathCrypt 2022 Session 2 (part I).srt
|
38.2 KB
|
MathCrypt 2022 Session 2 (part II).mp4
|
14.5 MB
|
MathCrypt 2022 Session 2 (part II).srt
|
34.8 KB
|
MathCrypt 2022 Session 3 (part I).mp4
|
16.7 MB
|
MathCrypt 2022 Session 3 (part I).srt
|
53.6 KB
|
MathCrypt 2022 Session 3 (part II).mp4
|
16.0 MB
|
MathCrypt 2022 Session 3 (part II).srt
|
54.8 KB
|
MathCrypt 2022 Session 4.mp4
|
24.6 MB
|
MathCrypt 2022 Session 4.srt
|
46.6 KB
|
PPML 2022 Contributed Talks I (part II).mp4
|
12.4 MB
|
PPML 2022 Contributed Talks I (part II).srt
|
36.5 KB
|
PPML 2022 Contributed Talks I (part III).mp4
|
12.9 MB
|
PPML 2022 Contributed Talks I (part III).srt
|
33.8 KB
|
PPML 2022 Contributed Talks I (part IV).mp4
|
10.5 MB
|
PPML 2022 Contributed Talks I (part IV).srt
|
32.5 KB
|
PPML 2022 Contributed Talks I (part V).mp4
|
11.9 MB
|
PPML 2022 Contributed Talks I (part V).srt
|
27.6 KB
|
PPML 2022 Contributed Talks II (part I).mp4
|
13.3 MB
|
PPML 2022 Contributed Talks II (part I).srt
|
32.3 KB
|
PPML 2022 Contributed Talks II (part II).mp4
|
12.3 MB
|
PPML 2022 Contributed Talks II (part II).srt
|
33.2 KB
|
PPML 2022 Contributed Talks II (part III).mp4
|
16.9 MB
|
PPML 2022 Contributed Talks II (part III).srt
|
44.8 KB
|
PPML 2022 Contributed Talks II (part IV).mp4
|
11.1 MB
|
PPML 2022 Contributed Talks II (part IV).srt
|
24.9 KB
|
PPML 2022 Invited Talk I.mp4
|
47.3 MB
|
PPML 2022 Invited Talk I.srt
|
114.0 KB
|
PPML 2022 Invited Talk II.mp4
|
57.1 MB
|
PPML 2022 Invited Talk II.srt
|
99.7 KB
|
PPML 2022 Invited Talk III.mp4
|
44.2 MB
|
PPML 2022 Invited Talk III.srt
|
116.8 KB
|
TPES 2022 Theory and Practice of Encrypted Search.mp4
|
227.6 MB
|
TPES 2022 Theory and Practice of Encrypted Search.srt
|
543.8 KB
|
WAC5 2022 Session 3 (part I).mp4
|
14.5 MB
|
WAC5 2022 Session 3 (part I).srt
|
49.7 KB
|
WAC5 2022 Session 3 (part II).mp4
|
20.7 MB
|
WAC5 2022 Session 3 (part II).srt
|
63.1 KB
|
WAC5 2022 Session 4 (part I).mp4
|
13.2 MB
|
WAC5 2022 Session 4 (part I).srt
|
41.4 KB
|
WAC5 2022 Session 4 (part II).mp4
|
20.5 MB
|
WAC5 2022 Session 4 (part II).srt
|
56.2 KB
|
/.../Crypto 2022 Live/
|
Best Paper Awards Crypto 2022.mp4
|
53.8 MB
|
Best Paper Awards Crypto 2022.srt
|
147.8 KB
|
Crypto 2022 program chair report best video winners.mp4
|
14.7 MB
|
Crypto 2022 program chair report best video winners.srt
|
40.6 KB
|
Crypto 2022 rump session part I.mp4
|
21.5 MB
|
Crypto 2022 rump session part I.srt
|
55.4 KB
|
Crypto 2022 rump session part II.mp4
|
24.6 MB
|
Crypto 2022 rump session part II.srt
|
49.8 KB
|
Crypto 2022 rump session part III.mp4
|
17.8 MB
|
Crypto 2022 rump session part III.srt
|
51.0 KB
|
Crypto 2022 rump session part IV.mp4
|
21.0 MB
|
Crypto 2022 rump session part IV.srt
|
38.5 KB
|
Crypto 2022 rump session part V.mp4
|
19.1 MB
|
Crypto 2022 rump session part V.srt
|
39.3 KB
|
Crypto 2022 Session on Blockchain.mp4
|
48.5 MB
|
Crypto 2022 Session on Blockchain.srt
|
134.6 KB
|
Crypto 2022 Session on Quantum Cryptography II.mp4
|
50.5 MB
|
Crypto 2022 Session on Quantum Cryptography II.srt
|
145.2 KB
|
IACR Fellows 2022 Ceremony.mp4
|
11.0 MB
|
IACR Fellows 2022 Ceremony.srt
|
23.3 KB
|
Implicit White Box Implementations White Boxing ARX Ciphers.mp4
|
18.5 MB
|
Implicit White Box Implementations White Boxing ARX Ciphers.srt
|
50.9 KB
|
Invited Talk by Yehuda Lindell (reuploaded).mp4
|
59.4 MB
|
Invited Talk by Yehuda Lindell (reuploaded).srt
|
137.2 KB
|
Opening Remarks at Crypto 2022.mp4
|
3.3 MB
|
Opening Remarks at Crypto 2022.srt
|
10.0 KB
|
Panel Discussion on Allyship and Inclusion.mp4
|
55.3 MB
|
Panel Discussion on Allyship and Inclusion.srt
|
108.6 KB
|
Remembering Nishant Kumar.mp4
|
8.4 MB
|
Remembering Nishant Kumar.srt
|
15.2 KB
|
Rotational Differential Linear Distinguishers of.mp4
|
14.6 MB
|
Rotational Differential Linear Distinguishers of.srt
|
22.9 KB
|
Session on Advanced Encryption Systems.mp4
|
73.8 MB
|
Session on Advanced Encryption Systems.srt
|
180.2 KB
|
Session on Coding Theory.mp4
|
68.8 MB
|
Session on Coding Theory.srt
|
194.4 KB
|
Session on Cryptanalysis II.mp4
|
67.7 MB
|
Session on Cryptanalysis II.srt
|
167.7 KB
|
Session on Distributed Algorithms.mp4
|
28.4 MB
|
Session on Distributed Algorithms.srt
|
89.2 KB
|
Session on Idealized Models.mp4
|
49.3 MB
|
Session on Idealized Models.srt
|
156.3 KB
|
Session on Lattice Based Signatures.mp4
|
47.6 MB
|
Session on Lattice Based Signatures.srt
|
130.7 KB
|
Session on Lattice Based Zero Knowledge.mp4
|
48.6 MB
|
Session on Lattice Based Zero Knowledge.srt
|
142.0 KB
|
Session on Lower Bounds.mp4
|
50.5 MB
|
Session on Lower Bounds.srt
|
143.3 KB
|
Session on Post Quantum Cryptography Theory.mp4
|
61.2 MB
|
Session on Post Quantum Cryptography Theory.srt
|
185.6 KB
|
Session on Proof Systems.mp4
|
66.8 MB
|
Session on Proof Systems.srt
|
177.2 KB
|
Session on Public Key Cryptography.mp4
|
59.9 MB
|
Session on Public Key Cryptography.srt
|
167.9 KB
|
Session on Quantum Cryptography I.mp4
|
60.5 MB
|
Session on Quantum Cryptography I.srt
|
128.4 KB
|
Session on Randomness.mp4
|
61.8 MB
|
Session on Randomness.srt
|
181.7 KB
|
Session on Secret Sharing and Secure Multiparty Computation.mp4
|
31.1 MB
|
Session on Secret Sharing and Secure Multiparty Computation.srt
|
104.5 KB
|
Session on Secure Hash Functions.mp4
|
26.9 MB
|
Session on Secure Hash Functions.srt
|
94.3 KB
|
Session on Secure Messaging.mp4
|
51.2 MB
|
Session on Secure Messaging.srt
|
144.9 KB
|
Session on Secure Multiparty Computation I.mp4
|
48.9 MB
|
Session on Secure Multiparty Computation I.srt
|
138.1 KB
|
Session on Secure Multiparty Computation II.mp4
|
39.6 MB
|
Session on Secure Multiparty Computation II.srt
|
140.0 KB
|
Session on Secure Multiparty Computation III.mp4
|
43.8 MB
|
Session on Secure Multiparty Computation III.srt
|
130.4 KB
|
Session on Signatures.mp4
|
45.6 MB
|
Session on Signatures.srt
|
146.2 KB
|
Session on Symmetric Cryptanalysis.mp4
|
71.2 MB
|
Session on Symmetric Cryptanalysis.srt
|
183.7 KB
|
Session on Symmetric Key Theory.mp4
|
63.6 MB
|
Session on Symmetric Key Theory.srt
|
171.0 KB
|
Session on Threshold Signatures.mp4
|
44.3 MB
|
Session on Threshold Signatures.srt
|
122.6 KB
|
Session on Unique Topics.mp4
|
45.9 MB
|
Session on Unique Topics.srt
|
138.8 KB
|
Session on Zero Knowledge.mp4
|
63.3 MB
|
Session on Zero Knowledge.srt
|
183.2 KB
|
Triangulating Rebound Attack on AES like Hashing.mp4
|
16.9 MB
|
/Crypto/Crypto 2023/
|
Anonymous Credentials.eng.srt
|
132.2 KB
|
Anonymous Credentials.mp4
|
47.9 MB
|
Attacks on Post-Quantum Crypto.eng.srt
|
71.0 KB
|
Attacks on Post-Quantum Crypto.mp4
|
31.5 MB
|
Consensus 1.eng.srt
|
85.1 KB
|
Consensus 1.mp4
|
29.3 MB
|
Consensus 2.eng.srt
|
100.1 KB
|
Consensus 2.mp4
|
38.7 MB
|
Correlated Pseudorandomness.eng.srt
|
64.5 KB
|
Correlated Pseudorandomness.mp4
|
29.4 MB
|
Cryptanalysis of Digital Signatures.eng.srt
|
124.5 KB
|
Cryptanalysis of Digital Signatures.mp4
|
37.3 MB
|
Crypto 2023 award session.eng.srt
|
21.3 KB
|
Crypto 2023 award session.mp4
|
12.1 MB
|
Crypto 2023 Best Paper Plenary.eng.srt
|
102.2 KB
|
Crypto 2023 Best Paper Plenary.mp4
|
31.5 MB
|
Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.eng.srt
|
100.4 KB
|
Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.mp4
|
47.2 MB
|
Crypto 2023 opening remarks.eng.srt
|
9.0 KB
|
Crypto 2023 opening remarks.mp4
|
4.8 MB
|
Crypto 2023 rump session.eng.srt
|
218.3 KB
|
Crypto 2023 rump session.mp4
|
113.5 MB
|
Efficient FHE.eng.srt
|
108.9 KB
|
Efficient FHE.mp4
|
42.6 MB
|
Emerging Paradigms 1 & 2 Post-Quantum Signatures 1 & 2.eng.srt
|
311.6 KB
|
Emerging Paradigms 1 & 2 Post-Quantum Signatures 1 & 2.mp4
|
110.7 MB
|
Foundations.eng.srt
|
133.1 KB
|
Foundations.mp4
|
42.8 MB
|
Functional Encryption 1 & 2.eng.srt
|
152.6 KB
|
Functional Encryption 1 & 2.mp4
|
58.2 MB
|
Invited Talk by Scott Aaronson.eng.srt
|
127.6 KB
|
Invited Talk by Scott Aaronson.mp4
|
54.0 MB
|
Isogenies and Applications.eng.srt
|
78.9 KB
|
Isogenies and Applications.mp4
|
25.5 MB
|
Lattice Problems and Their Complexity 1.eng.srt
|
89.3 KB
|
Lattice Problems and Their Complexity 1.mp4
|
28.4 MB
|
Lattice Problems and Their Complexity 2.eng.srt
|
96.8 KB
|
Lattice Problems and Their Complexity 2.mp4
|
28.4 MB
|
Lattice-Based PKC 1.eng.srt
|
81.9 KB
|
Lattice-Based PKC 1.mp4
|
28.3 MB
|
Lattice-Based PKC 2.eng.srt
|
64.3 KB
|
Lattice-Based PKC 2.mp4
|
33.6 MB
|
MPC - Emerging Models 1.eng.srt
|
77.3 KB
|
MPC - Emerging Models 1.mp4
|
28.4 MB
|
MPC - Emerging Models 2.eng.srt
|
83.0 KB
|
MPC - Emerging Models 2.mp4
|
26.3 MB
|
MPC Round Efficiency 1.eng.srt
|
95.7 KB
|
MPC Round Efficiency 1.mp4
|
28.9 MB
|
MPC Round Efficiency 2.eng.srt
|
82.7 KB
|
MPC Round Efficiency 2.mp4
|
22.7 MB
|
Obfuscation.eng.srt
|
81.8 KB
|
Obfuscation.mp4
|
34.7 MB
|
ORAM 1.eng.srt
|
86.7 KB
|
ORAM 1.mp4
|
27.2 MB
|
ORAM 2.eng.srt
|
102.4 KB
|
ORAM 2.mp4
|
23.4 MB
|
Post-Quantum ZK 1.eng.srt
|
78.7 KB
|
Post-Quantum ZK 1.mp4
|
33.5 MB
|
Post-Quantum ZK 2.eng.srt
|
68.1 KB
|
Post-Quantum ZK 2.mp4
|
27.7 MB
|
Provably Secure Symmetric Constructions 1.eng.srt
|
45.0 KB
|
Provably Secure Symmetric Constructions 1.mp4
|
28.0 MB
|
Provably Secure Symmetric Constructions 2.eng.srt
|
62.7 KB
|
Provably Secure Symmetric Constructions 2.mp4
|
25.1 MB
|
Quantum Cryptography 1.eng.srt
|
74.7 KB
|
Quantum Cryptography 1.mp4
|
23.1 MB
|
Quantum Cryptography 2.eng.srt
|
71.1 KB
|
Quantum Cryptography 2.mp4
|
27.7 MB
|
Quantum Protocols 1.eng.srt
|
90.6 KB
|
Quantum Protocols 1.mp4
|
27.2 MB
|
Quantum Protocols 2.eng.srt
|
96.3 KB
|
Quantum Protocols 2.mp4
|
26.9 MB
|
Quantum Security.eng.srt
|
74.8 KB
|
Quantum Security.mp4
|
36.1 MB
|
Random Oracle 1.eng.srt
|
82.0 KB
|
Random Oracle 1.mp4
|
27.5 MB
|
Random Oracle 2.eng.srt
|
81.0 KB
|
Random Oracle 2.mp4
|
23.6 MB
|
Secret Sharing 1.eng.srt
|
75.2 KB
|
Secret Sharing 1.mp4
|
35.4 MB
|
Secret Sharing 2.eng.srt
|
86.2 KB
|
Secret Sharing 2.mp4
|
34.4 MB
|
Secure Messaging 1.eng.srt
|
79.0 KB
|
Secure Messaging 1.mp4
|
24.1 MB
|
Secure Messaging 2.eng.srt
|
89.9 KB
|
Secure Messaging 2.mp4
|
29.8 MB
|
Secure Two Party Computation part I.eng.srt
|
46.7 KB
|
Secure Two Party Computation part I.mp4
|
19.2 MB
|
Secure Two-Party Computation part II.eng.srt
|
36.6 KB
|
Secure Two-Party Computation part II.mp4
|
13.7 MB
|
Side Channels 1 part I.eng.srt
|
37.6 KB
|
Side Channels 1 part I.mp4
|
15.5 MB
|
Side Channels 1 part II.eng.srt
|
31.7 KB
|
Side Channels 1 part II.mp4
|
12.8 MB
|
Side Channels 2.eng.srt
|
96.1 KB
|
Side Channels 2.mp4
|
33.7 MB
|
Sublinear Proofs.eng.srt
|
63.8 KB
|
Sublinear Proofs.mp4
|
27.2 MB
|
Succinctness 1 part I.eng.srt
|
36.5 KB
|
Succinctness 1 part I.mp4
|
10.4 MB
|
Succinctness 1 part II.eng.srt
|
52.7 KB
|
Succinctness 1 part II.mp4
|
18.3 MB
|
Succinctness 2.eng.srt
|
78.3 KB
|
Succinctness 2.mp4
|
22.3 MB
|
Succinctness 3.eng.srt
|
79.8 KB
|
Succinctness 3.mp4
|
23.5 MB
|
Succinctness 4.eng.srt
|
83.4 KB
|
Succinctness 4.mp4
|
25.3 MB
|
Symmetric Cryptanalysis 1.eng.srt
|
43.0 KB
|
Symmetric Cryptanalysis 1.mp4
|
30.1 MB
|
Symmetric Cryptanalysis 2.eng.srt
|
56.4 KB
|
Symmetric Cryptanalysis 2.mp4
|
34.0 MB
|
Symmetric Crypto with Public-Key Applications.eng.srt
|
109.9 KB
|
Symmetric Crypto with Public-Key Applications.mp4
|
41.0 MB
|
Symmetric Design.eng.srt
|
65.5 KB
|
Symmetric Design.mp4
|
26.0 MB
|
Threshold Cryptography 1.eng.srt
|
89.2 KB
|
Threshold Cryptography 1.mp4
|
29.7 MB
|
Threshold Cryptography 2.eng.srt
|
79.1 KB
|
Threshold Cryptography 2.mp4
|
28.8 MB
|
ZK Based on DL 1.eng.srt
|
85.3 KB
|
ZK Based on DL 1.mp4
|
25.6 MB
|
ZK Based on DL 2.eng.srt
|
91.2 KB
|
ZK Based on DL 2.mp4
|
30.5 MB
|
/.../Crypto 2023 Affiliated Events/CFAIL 2023/
|
CFAIL intro and talk I.eng.srt
|
53.2 KB
|
CFAIL intro and talk I.mp4
|
17.2 MB
|
CFAIL invited talk.eng.srt
|
99.5 KB
|
CFAIL invited talk.mp4
|
37.8 MB
|
CFAIL talk II.eng.srt
|
49.3 KB
|
CFAIL talk II.mp4
|
14.2 MB
|
CFAIL talk III.eng.srt
|
47.5 KB
|
CFAIL talk III.mp4
|
15.7 MB
|
/.../Crypto 2023 Affiliated Events/GHTC 2023/
|
GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.eng.srt
|
127.0 KB
|
GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.mp4
|
65.2 MB
|
GHTC 2023 round table 2 AI and Cryptanalysis.eng.srt
|
111.3 KB
|
GHTC 2023 round table 2 AI and Cryptanalysis.mp4
|
65.3 MB
|
GHTC 2023 round table 3 Privacy Preserving AI.eng.srt
|
114.9 KB
|
GHTC 2023 round table 3 Privacy Preserving AI.mp4
|
56.7 MB
|
GHTC 2023 round table 4 Lessons Learned.eng.srt
|
110.5 KB
|
GHTC 2023 round table 4 Lessons Learned.mp4
|
51.7 MB
|
/.../Crypto 2023 Affiliated Events/PPML 2023/
|
PPML 2023 Contributed Talks II.eng.srt
|
184.8 KB
|
PPML 2023 Contributed Talks II.mp4
|
65.6 MB
|
PPML 2023 invited talk I Mariana Raykova Contributed Talks I.eng.srt
|
146.2 KB
|
PPML 2023 invited talk I Mariana Raykova Contributed Talks I.mp4
|
50.2 MB
|
PPML 2023 invited talk II Janardhan (Jana) Kulkarni Contributed Talks III.eng.srt
|
152.3 KB
|
PPML 2023 invited talk II Janardhan (Jana) Kulkarni Contributed Talks III.mp4
|
48.7 MB
|
PPML 2023 invited talk III Sewoong Oh.eng.srt
|
80.3 KB
|
PPML 2023 invited talk III Sewoong Oh.mp4
|
32.2 MB
|
/CHES 2016/
|
A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.mp4
|
23.8 MB
|
A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.mp4
|
35.9 MB
|
Antikernel A Decentralized Secure Hardware Software Operating System.mp4
|
28.1 MB
|
Cache Attacks Enable Bulk Key Recovery on the Cloud.mp4
|
25.4 MB
|
CacheBleed A Timing Attack on OpenSSL Constant Time RSA.mp4
|
32.7 MB
|
CHES 2016 Panel Discussion.mp4
|
75.9 MB
|
Correlated Extra Reductions Defeat Blinded Regular Exponentiation.mp4
|
40.5 MB
|
Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.mp4
|
38.5 MB
|
Differential Computation Analysis Hiding your White Box Designs is Not Enough.mp4
|
29.4 MB
|
Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.mp4
|
24.7 MB
|
Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.mp4
|
27.9 MB
|
EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.mp4
|
25.3 MB
|
Faster Evaluation of SBoxes via Common Shares.mp4
|
16.7 MB
|
Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.mp4
|
35.0 MB
|
FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.mp4
|
36.6 MB
|
Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.mp4
|
36.7 MB
|
Masking AES with d1 Shares in Hardware.mp4
|
20.6 MB
|
Mitigating SAT Attack on Logic Locking.mp4
|
32.1 MB
|
No Place to Hide Contactless Probing of Secret Data on FPGAs.mp4
|
4.4 MB
|
Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4
|
121.9 MB
|
On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.mp4
|
6.7 MB
|
Physical Layer Group Key Agreement for Automotive Controller Area Network.mp4
|
34.8 MB
|
QcBits constant time small key code based cryptography.mp4
|
24.8 MB
|
Reducing the Number of Non linear Multiplications in Masking Schemes.mp4
|
31.8 MB
|
Run time Accessible DRAM PUFs in Commodity Devices.mp4
|
5.7 MB
|
Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.mp4
|
24.0 MB
|
Software implementation of Koblitz curves over quadratic fields.mp4
|
21.2 MB
|
Strong 8 bit Sboxes with Efficient Masking in Hardware.mp4
|
20.0 MB
|
Strong Machine Learning Attack against PUFs with No Mathematical Model.mp4
|
17.3 MB
|
Towards Easy Leakage Certification.mp4
|
10.2 MB
|
uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.mp4
|
7.0 MB
|
vatiCAN Vetted, Authenticated CAN Bus.mp4
|
25.8 MB
|
/CHES 2018/
|
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.eng.srt
|
44.2 KB
|
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.mp4
|
21.9 MB
|
Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.eng.srt
|
54.1 KB
|
Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.mp4
|
16.3 MB
|
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.eng.srt
|
55.7 KB
|
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.mp4
|
21.4 MB
|
CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.eng.srt
|
53.6 KB
|
CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.mp4
|
11.5 MB
|
CHES 2018 Rump Session.eng.srt
|
191.3 KB
|
CHES 2018 Rump Session.mp4
|
105.5 MB
|
Closing remarks at CHES 2018.eng.srt
|
10.1 KB
|
Closing remarks at CHES 2018.mp4
|
6.7 MB
|
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.eng.srt
|
101.1 KB
|
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.mp4
|
39.9 MB
|
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.eng.srt
|
63.7 KB
|
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.mp4
|
27.0 MB
|
Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.eng.srt
|
39.0 KB
|
Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.mp4
|
26.5 MB
|
Differential Fault Attacks on Deterministic Lattice Signatures.eng.srt
|
45.4 KB
|
Differential Fault Attacks on Deterministic Lattice Signatures.mp4
|
18.2 MB
|
Dismantling the AUT64 Automotive Cipher.eng.srt
|
43.5 KB
|
Dismantling the AUT64 Automotive Cipher.mp4
|
17.6 MB
|
Efficient Side Channel Protections of ARX Ciphers.mp4
|
17.8 MB
|
EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.eng.srt
|
48.9 KB
|
EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.mp4
|
25.1 MB
|
ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.eng.srt
|
40.7 KB
|
ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.mp4
|
20.7 MB
|
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.eng.srt
|
41.0 KB
|
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.mp4
|
25.7 MB
|
ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.eng.srt
|
48.5 KB
|
ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.mp4
|
24.2 MB
|
Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.eng.srt
|
43.3 KB
|
Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.mp4
|
20.6 MB
|
FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.eng.srt
|
38.8 KB
|
FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.mp4
|
24.9 MB
|
Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.eng.srt
|
60.6 KB
|
Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.mp4
|
14.4 MB
|
Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.mp4
|
23.6 MB
|
FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.eng.srt
|
36.4 KB
|
FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.mp4
|
19.1 MB
|
FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.eng.srt
|
41.4 KB
|
FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.mp4
|
15.7 MB
|
Generic Low Latency Masking in Hardware.eng.srt
|
40.9 KB
|
Generic Low Latency Masking in Hardware.mp4
|
17.5 MB
|
Hardware Masking, Revisited.eng.srt
|
45.1 KB
|
Hardware Masking, Revisited.mp4
|
20.7 MB
|
High Order Masking of Look up Tables with Common Shares.mp4
|
15.6 MB
|
High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.eng.srt
|
40.1 KB
|
High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.mp4
|
20.2 MB
|
Improved High Order Conversion From Boolean to Arithmetic Masking.mp4
|
16.1 MB
|
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.eng.srt
|
52.6 KB
|
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.mp4
|
24.6 MB
|
Leakage Detection with the x2 Test.eng.srt
|
37.8 KB
|
Leakage Detection with the x2 Test.mp4
|
19.2 MB
|
Linear Repairing Codes and Side Channel Attacks.eng.srt
|
58.3 KB
|
Linear Repairing Codes and Side Channel Attacks.mp4
|
24.8 MB
|
Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.eng.srt
|
51.2 KB
|
Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.mp4
|
21.4 MB
|
Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.eng.srt
|
32.7 KB
|
Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.mp4
|
16.8 MB
|
Multiplicative Masking for AES in Hardware.eng.srt
|
49.9 KB
|
Multiplicative Masking for AES in Hardware.mp4
|
19.7 MB
|
New Bleichenbacher Records - Fault Attacks on qDSA Signatures.eng.srt
|
43.9 KB
|
New Bleichenbacher Records - Fault Attacks on qDSA Signatures.mp4
|
16.5 MB
|
On Recovering Affine Encodings in White Box Implementations.eng.srt
|
42.6 KB
|
On Recovering Affine Encodings in White Box Implementations.mp4
|
21.8 MB
|
On the Difficulty of FSM based Hardware Obfuscation.eng.srt
|
48.2 KB
|
On the Difficulty of FSM based Hardware Obfuscation.mp4
|
23.8 MB
|
Opening remarks.eng.srt
|
17.2 KB
|
Opening remarks.mp4
|
8.4 MB
|
Persistent Fault Analysis on Block Ciphers.eng.srt
|
49.9 KB
|
Persistent Fault Analysis on Block Ciphers.mp4
|
29.6 MB
|
Practical CCA2 Secure and Masked Ring LWE Implementation.mp4
|
16.7 MB
|
Rhythmic Keccak - SCA Security and Low Latency in HW.eng.srt
|
39.3 KB
|
Rhythmic Keccak - SCA Security and Low Latency in HW.mp4
|
21.5 MB
|
Saber on ARM - CCA secure module lattice based key encapsulation on ARM.eng.srt
|
50.9 KB
|
Saber on ARM - CCA secure module lattice based key encapsulation on ARM.mp4
|
23.8 MB
|
SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.eng.srt
|
40.5 KB
|
SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.mp4
|
23.8 MB
|
Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.eng.srt
|
30.0 KB
|
Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.mp4
|
16.1 MB
|
SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.eng.srt
|
53.0 KB
|
SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.mp4
|
19.9 MB
|
Smashing the Implementation Records of AES S box.eng.srt
|
44.2 KB
|
Smashing the Implementation Records of AES S box.mp4
|
21.6 MB
|
Spin Me Right Round Rotational Symmetry for FPGA Specific AES.eng.srt
|
51.9 KB
|
Spin Me Right Round Rotational Symmetry for FPGA Specific AES.mp4
|
21.0 MB
|
Standard Lattice Based Key Encapsulation on Embedded Devices.eng.srt
|
39.6 KB
|
Standard Lattice Based Key Encapsulation on Embedded Devices.mp4
|
21.4 MB
|
Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.eng.srt
|
52.1 KB
|
Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.mp4
|
25.3 MB
|
/CHES 2021/
|
A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.mp4
|
18.9 MB
|
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.eng.srt
|
35.2 KB
|
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.mp4
|
25.0 MB
|
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.eng.srt
|
46.8 KB
|
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.mp4
|
23.0 MB
|
AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.eng.srt
|
35.5 KB
|
AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.mp4
|
19.4 MB
|
An Instruction Set Extension to Support Software-Based Masking.eng.srt
|
35.4 KB
|
An Instruction Set Extension to Support Software-Based Masking.mp4
|
22.8 MB
|
Analysis and Comparison of Table-based Arithmetic to Boolean Masking.eng.srt
|
30.6 KB
|
Analysis and Comparison of Table-based Arithmetic to Boolean Masking.mp4
|
8.5 MB
|
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.eng.srt
|
42.6 KB
|
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.mp4
|
12.7 MB
|
Batching CSIDH Group Actions using AVX-512.eng.srt
|
44.7 KB
|
Batching CSIDH Group Actions using AVX-512.mp4
|
23.4 MB
|
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.eng.srt
|
36.2 KB
|
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.mp4
|
16.7 MB
|
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu....eng.srt
|
41.3 KB
|
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu....mp4
|
18.0 MB
|
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.eng.srt
|
44.5 KB
|
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.mp4
|
25.0 MB
|
Classic McEliece on the ARM Cortex-M4.eng.srt
|
30.9 KB
|
Classic McEliece on the ARM Cortex-M4.mp4
|
15.8 MB
|
Combining Optimization Objectives New Modeling Attacks on Strong PUFs.eng.srt
|
41.3 KB
|
Combining Optimization Objectives New Modeling Attacks on Strong PUFs.mp4
|
14.7 MB
|
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.eng.srt
|
43.3 KB
|
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.mp4
|
17.9 MB
|
Concrete quantum cryptanalysis of binary elliptic curves.eng.srt
|
46.3 KB
|
Concrete quantum cryptanalysis of binary elliptic curves.mp4
|
17.4 MB
|
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other ....eng.srt
|
33.4 KB
|
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other ....mp4
|
15.1 MB
|
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.eng.srt
|
33.6 KB
|
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.mp4
|
19.6 MB
|
CTIDH faster constant-time CSIDH.eng.srt
|
40.8 KB
|
CTIDH faster constant-time CSIDH.mp4
|
16.5 MB
|
Cutting Through the Complexity of Reverse Engineering Embedded Devices.eng.srt
|
59.3 KB
|
Cutting Through the Complexity of Reverse Engineering Embedded Devices.mp4
|
15.6 MB
|
DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.eng.srt
|
39.2 KB
|
DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.mp4
|
16.9 MB
|
Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.eng.srt
|
18.9 KB
|
Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.mp4
|
12.3 MB
|
DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.eng.srt
|
33.4 KB
|
DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.mp4
|
16.0 MB
|
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin....eng.srt
|
47.1 KB
|
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin....mp4
|
17.1 MB
|
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study....eng.srt
|
44.4 KB
|
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study....mp4
|
18.3 MB
|
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E....eng.srt
|
43.8 KB
|
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E....mp4
|
11.3 MB
|
Fault Attacks on CCA-secure Lattice KEMs.eng.srt
|
35.5 KB
|
Fault Attacks on CCA-secure Lattice KEMs.mp4
|
16.0 MB
|
Fault Injection as an Oscilloscope Fault Correlation Analysis.eng.srt
|
46.6 KB
|
Fault Injection as an Oscilloscope Fault Correlation Analysis.mp4
|
20.2 MB
|
Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.eng.srt
|
36.0 KB
|
Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.mp4
|
13.1 MB
|
FIVER - Robust Verification of Countermeasures against Fault Injections.eng.srt
|
37.0 KB
|
FIVER - Robust Verification of Countermeasures against Fault Injections.mp4
|
18.5 MB
|
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.eng.srt
|
38.4 KB
|
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.mp4
|
19.8 MB
|
Higher-Order Lookup Table Masking in Essentially Constant Memory.eng.srt
|
33.5 KB
|
Higher-Order Lookup Table Masking in Essentially Constant Memory.mp4
|
14.6 MB
|
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.eng.srt
|
43.8 KB
|
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.mp4
|
18.6 MB
|
Inconsistency of Simulation and Practice in Delay-based Strong PUFs.eng.srt
|
41.0 KB
|
Inconsistency of Simulation and Practice in Delay-based Strong PUFs.mp4
|
24.3 MB
|
Information Leakages in Code-based Masking A Unified Quantification Approach.eng.srt
|
28.0 KB
|
Information Leakages in Code-based Masking A Unified Quantification Approach.mp4
|
15.0 MB
|
Keep it Unsupervised Horizontal Attacks Meet Deep Learning.eng.srt
|
34.3 KB
|
Keep it Unsupervised Horizontal Attacks Meet Deep Learning.mp4
|
13.7 MB
|
Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.eng.srt
|
37.2 KB
|
Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.mp4
|
14.5 MB
|
Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.mp4
|
18.2 MB
|
LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.eng.srt
|
39.1 KB
|
LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.mp4
|
14.1 MB
|
Low-Latency Keccak at any Arbitrary Order.eng.srt
|
31.0 KB
|
Low-Latency Keccak at any Arbitrary Order.mp4
|
11.3 MB
|
Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the....eng.srt
|
29.9 KB
|
Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the....mp4
|
10.1 MB
|
Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.eng.srt
|
49.2 KB
|
Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.mp4
|
30.2 MB
|
Masking Kyber First- and Higher-Order Implementations.eng.srt
|
46.0 KB
|
Masking Kyber First- and Higher-Order Implementations.mp4
|
29.3 MB
|
My other car is your car compromising the Tesla Model X keyless entry system.eng.srt
|
46.9 KB
|
My other car is your car compromising the Tesla Model X keyless entry system.mp4
|
27.2 MB
|
New First-Order Secure AES Performance Records.eng.srt
|
40.5 KB
|
New First-Order Secure AES Performance Records.mp4
|
27.8 MB
|
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno....eng.srt
|
34.6 KB
|
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno....mp4
|
16.5 MB
|
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 ....eng.srt
|
35.9 KB
|
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 ....mp4
|
18.4 MB
|
Online Template Attacks Revisited.eng.srt
|
39.0 KB
|
Online Template Attacks Revisited.mp4
|
15.7 MB
|
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.eng.srt
|
37.0 KB
|
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.mp4
|
20.5 MB
|
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat....eng.srt
|
39.5 KB
|
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat....mp4
|
15.0 MB
|
Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.eng.srt
|
34.7 KB
|
Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.mp4
|
16.9 MB
|
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.eng.srt
|
29.1 KB
|
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.mp4
|
13.8 MB
|
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.eng.srt
|
50.1 KB
|
Probing Security through Input-Output Separation and Revisited Quasilinear Masking.mp4
|
15.3 MB
|
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf....eng.srt
|
45.5 KB
|
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf....mp4
|
16.3 MB
|
Rainbow on Cortex-M4.eng.srt
|
47.5 KB
|
Rainbow on Cortex-M4.mp4
|
21.0 MB
|
Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.eng.srt
|
36.7 KB
|
Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.mp4
|
14.2 MB
|
Rapidly Verifiable XMSS Signatures.eng.srt
|
39.7 KB
|
Rapidly Verifiable XMSS Signatures.mp4
|
33.5 MB
|
RASSLE Return Address Stack based Side-channel LEakage.eng.srt
|
47.5 KB
|
RASSLE Return Address Stack based Side-channel LEakage.mp4
|
16.3 MB
|
Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.eng.srt
|
45.3 KB
|
Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.mp4
|
27.5 MB
|
Redundant Code-based Masking Revisited.eng.srt
|
40.0 KB
|
Redundant Code-based Masking Revisited.mp4
|
22.3 MB
|
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.eng.srt
|
37.3 KB
|
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.mp4
|
14.0 MB
|
Revealing the Weakness of Addition Chain Based Masked SBox Implementations.eng.srt
|
29.6 KB
|
Revealing the Weakness of Addition Chain Based Masked SBox Implementations.mp4
|
19.7 MB
|
Revisiting the functional bootstrap in TFHE.eng.srt
|
39.9 KB
|
Revisiting the functional bootstrap in TFHE.mp4
|
20.3 MB
|
ROTed Random Oblivious Transfer for embedded devices.eng.srt
|
31.3 KB
|
ROTed Random Oblivious Transfer for embedded devices.mp4
|
12.4 MB
|
s-1 CHES 2021 Opening Remarks.eng.srt
|
13.5 KB
|
s-1 CHES 2021 Opening Remarks.mp4
|
8.2 MB
|
s-2 Post-quantum crypto (part I).eng.srt
|
87.8 KB
|
s-2 Post-quantum crypto (part I).mp4
|
44.4 MB
|
s-4 Masking.eng.srt
|
93.9 KB
|
s-4 Masking.mp4
|
51.7 MB
|
s-6 Ask Me Anything (AMA) with Colin O’Flynn.eng.srt
|
74.0 KB
|
s-6 Ask Me Anything (AMA) with Colin O’Flynn.mp4
|
47.7 MB
|
s-8 Invited Talk by Carmela Troncoso.eng.srt
|
123.4 KB
|
s-8 Invited Talk by Carmela Troncoso.mp4
|
53.0 MB
|
s-10 Ask Me Anything (AMA) with Tanja Lange.eng.srt
|
61.8 KB
|
s-10 Ask Me Anything (AMA) with Tanja Lange.mp4
|
37.9 MB
|
s-12 Avant-garde crypto and protocols.eng.srt
|
79.6 KB
|
s-12 Avant-garde crypto and protocols.mp4
|
42.9 MB
|
s-14 Let’s Get Physical.eng.srt
|
107.0 KB
|
s-14 Let’s Get Physical.mp4
|
48.4 MB
|
s-16 Post-quantum crypto (part II).eng.srt
|
96.6 KB
|
s-16 Post-quantum crypto (part II).mp4
|
58.3 MB
|
s-18 CHES Test-of-Time Award Session.eng.srt
|
51.7 KB
|
s-18 CHES Test-of-Time Award Session.mp4
|
29.2 MB
|
s-20 Attacks against Real-World Systems.eng.srt
|
93.4 KB
|
s-20 Attacks against Real-World Systems.mp4
|
51.6 MB
|
s-22 Invited Talk by Robert N.M. Watson.eng.srt
|
162.6 KB
|
s-22 Invited Talk by Robert N.M. Watson.mp4
|
74.5 MB
|
s-24 Ask Me Anything (AMA) with Fatemeh Ganji.eng.srt
|
43.3 KB
|
s-24 Ask Me Anything (AMA) with Fatemeh Ganji.mp4
|
26.8 MB
|
s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.eng.srt
|
91.3 KB
|
s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.mp4
|
48.8 MB
|
s-28 Attacks (and Defenses).eng.srt
|
89.9 KB
|
s-28 Attacks (and Defenses).mp4
|
55.4 MB
|
s-30 Ask Me Anything (AMA) with Bart Preneel.eng.srt
|
69.7 KB
|
s-30 Ask Me Anything (AMA) with Bart Preneel.mp4
|
44.2 MB
|
s-33 AES and ISA extensions.eng.srt
|
89.5 KB
|
s-33 AES and ISA extensions.mp4
|
53.3 MB
|
s-34 Attacks against Classical PKC.eng.srt
|
98.9 KB
|
s-34 Attacks against Classical PKC.mp4
|
51.4 MB
|
s-37 White box, obfuscation, and logic locking.eng.srt
|
112.9 KB
|
s-37 White box, obfuscation, and logic locking.mp4
|
58.3 MB
|
s-39 Machine Learning for Side-Channel Attacks.eng.srt
|
111.7 KB
|
s-39 Machine Learning for Side-Channel Attacks.mp4
|
58.5 MB
|
s-41 Post-quantum Crypto (part III) CHES 2021 closing remarks.eng.srt
|
93.8 KB
|
s-41 Post-quantum Crypto (part III) CHES 2021 closing remarks.mp4
|
49.2 MB
|
s-42 CHES 2021 closing remarks.eng.srt
|
5.9 KB
|
s-42 CHES 2021 closing remarks.mp4
|
5.7 MB
|
s-99 Rump Session.eng.srt
|
193.4 KB
|
s-99 Rump Session.mp4
|
104.0 MB
|
Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.eng.srt
|
47.5 KB
|
Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.mp4
|
15.5 MB
|
SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.eng.srt
|
50.4 KB
|
SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.mp4
|
18.1 MB
|
Second-Order SCA Security with almost no Fresh Randomness.eng.srt
|
38.0 KB
|
Second-Order SCA Security with almost no Fresh Randomness.mp4
|
22.2 MB
|
Secure, Accurate, and Practical Narrow-Band Ranging System.eng.srt
|
24.4 KB
|
Secure, Accurate, and Practical Narrow-Band Ranging System.mp4
|
12.4 MB
|
Security and Trust in Open Source Security Tokens.eng.srt
|
40.7 KB
|
Security and Trust in Open Source Security Tokens.mp4
|
8.6 MB
|
Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.eng.srt
|
40.3 KB
|
Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.mp4
|
20.4 MB
|
Side-Channel Protections for Picnic Signatures.eng.srt
|
37.5 KB
|
Side-Channel Protections for Picnic Signatures.mp4
|
14.8 MB
|
Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr....eng.srt
|
39.9 KB
|
Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr....mp4
|
14.5 MB
|
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.eng.srt
|
37.9 KB
|
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.mp4
|
18.4 MB
|
The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.eng.srt
|
51.0 KB
|
The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.mp4
|
25.0 MB
|
The design of scalar AES Instruction Set Extensions for RISC-V.eng.srt
|
38.1 KB
|
The design of scalar AES Instruction Set Extensions for RISC-V.mp4
|
10.7 MB
|
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for....eng.srt
|
38.7 KB
|
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for....mp4
|
17.2 MB
|
Time-Memory Analysis of Parallel Collision Search Algorithms.eng.srt
|
45.3 KB
|
Time-Memory Analysis of Parallel Collision Search Algorithms.mp4
|
17.0 MB
|
Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em....eng.srt
|
20.3 KB
|
Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em....mp4
|
23.9 MB
|
Yoroi Updatable Whitebox Cryptography.eng.srt
|
31.3 KB
|
Yoroi Updatable Whitebox Cryptography.mp4
|
16.1 MB
|
/CHES 2022/
|
A compact and high-performance hardware architecture for CRYSTALS-Dilithium.eng.srt
|
28.1 KB
|
A compact and high-performance hardware architecture for CRYSTALS-Dilithium.mp4
|
13.7 MB
|
Best Paper Award Session.eng.srt
|
153.4 KB
|
Best Paper Award Session.mp4
|
71.2 MB
|
Invited talk Building OpenTitan by Dominic Rizzo, Google.eng.srt
|
103.5 KB
|
Invited talk Building OpenTitan by Dominic Rizzo, Google.mp4
|
44.8 MB
|
Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.eng.srt
|
174.4 KB
|
Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.mp4
|
83.2 MB
|
opening remarks.eng.srt
|
21.4 KB
|
opening remarks.mp4
|
11.5 MB
|
Partial session on High Order Masking.eng.srt
|
91.1 KB
|
Partial session on High Order Masking.mp4
|
35.7 MB
|
Rump Session.eng.srt
|
159.1 KB
|
Rump Session.mp4
|
84.0 MB
|
Session on Attribute Based and Fully Homomorphic Encryption.eng.srt
|
71.3 KB
|
Session on Attribute Based and Fully Homomorphic Encryption.mp4
|
28.4 MB
|
Session on Deep Learning Based Side Channel Attacks.eng.srt
|
148.4 KB
|
Session on Deep Learning Based Side Channel Attacks.mp4
|
73.9 MB
|
Session on Efficient Masking.eng.srt
|
141.6 KB
|
Session on Efficient Masking.mp4
|
67.2 MB
|
Session on Fast Hardware Implementations and Quantum Circuits.eng.srt
|
132.0 KB
|
Session on Fast Hardware Implementations and Quantum Circuits.mp4
|
51.6 MB
|
Session on Fast Implementations for Post Quantum Schemes.eng.srt
|
110.6 KB
|
Session on Fast Implementations for Post Quantum Schemes.mp4
|
67.8 MB
|
Session on Fault Protection Frameworks and SCA Countermeasures.eng.srt
|
147.1 KB
|
Session on Fault Protection Frameworks and SCA Countermeasures.mp4
|
65.4 MB
|
Session on Hardware Security.eng.srt
|
154.2 KB
|
Session on Hardware Security.mp4
|
67.4 MB
|
Session on Isogenies.eng.srt
|
64.2 KB
|
Session on Isogenies.mp4
|
29.9 MB
|
Session on Leakage Resilience and Masking Verification.eng.srt
|
157.6 KB
|
Session on Leakage Resilience and Masking Verification.mp4
|
62.1 MB
|
Session on Masking Schemes and their Analysis.eng.srt
|
144.6 KB
|
Session on Masking Schemes and their Analysis.mp4
|
62.0 MB
|
Session on Microarchitectural Leakage Modeling.eng.srt
|
88.9 KB
|
Session on Microarchitectural Leakage Modeling.mp4
|
36.1 MB
|
Session on NTT Implementations.eng.srt
|
122.7 KB
|
Session on NTT Implementations.mp4
|
68.0 MB
|
Session on Physical Unclonable Functions.eng.srt
|
145.6 KB
|
Session on Physical Unclonable Functions.mp4
|
70.3 MB
|
Session on Practical Fault Injection.eng.srt
|
144.0 KB
|
Session on Practical Fault Injection.mp4
|
70.7 MB
|
Session on RISC V.eng.srt
|
104.1 KB
|
Session on RISC V.mp4
|
55.5 MB
|
Session on Sensors Sensors Sensors.eng.srt
|
111.8 KB
|
Session on Sensors Sensors Sensors.mp4
|
38.0 MB
|
Session on Side Channel Attacks on Post Quantum Implementations 1.eng.srt
|
113.3 KB
|
Session on Side Channel Attacks on Post Quantum Implementations 1.mp4
|
65.9 MB
|
Session on Side Channel Metrics and Masking Schemes.eng.srt
|
127.2 KB
|
Session on Side Channel Metrics and Masking Schemes.mp4
|
66.8 MB
|
Session on Tools for SCA and Cryptanalysis.eng.srt
|
124.3 KB
|
Session on Tools for SCA and Cryptanalysis.mp4
|
61.5 MB
|
Session on Whitebox Cryptography.eng.srt
|
75.0 KB
|
Session on Whitebox Cryptography.mp4
|
31.8 MB
|
Silent session on Masking.mp4
|
14.8 MB
|
Test of Time Award.eng.srt
|
60.8 KB
|
Test of Time Award.mp4
|
35.3 MB
|
/CHES 2023/
|
(Security of) Efficient Exponentiation.eng.srt
|
87.7 KB
|
(Security of) Efficient Exponentiation.mp4
|
55.3 MB
|
Best Paper.eng.srt
|
51.6 KB
|
Best Paper.mp4
|
22.4 MB
|
CHES Test of Time Award Ceremony Rump Session.eng.srt
|
212.9 KB
|
CHES Test of Time Award Ceremony Rump Session.mp4
|
127.1 MB
|
Dealing with Microarchitectural Effects.eng.srt
|
85.5 KB
|
Dealing with Microarchitectural Effects.mp4
|
35.9 MB
|
Efficient Zero-Knowledge.eng.srt
|
100.9 KB
|
Efficient Zero-Knowledge.mp4
|
69.7 MB
|
Fault Analysis on Post Quantum Cryptography II.eng.srt
|
126.8 KB
|
Fault Analysis on Post Quantum Cryptography II.mp4
|
54.5 MB
|
Fault Analysis on Symmetric Algorithms I.eng.srt
|
82.3 KB
|
Fault Analysis on Symmetric Algorithms I.mp4
|
40.8 MB
|
Fault Analysis on Symmetric Algorithms II.eng.srt
|
70.4 KB
|
Fault Analysis on Symmetric Algorithms II.mp4
|
38.9 MB
|
Hardware Acceleration and Instruction Set Extensions.eng.srt
|
131.2 KB
|
Hardware Acceleration and Instruction Set Extensions.mp4
|
55.2 MB
|
Hardware Security.mp4
|
62.0 MB
|
Homomorphic Encryption.eng.srt
|
97.7 KB
|
Homomorphic Encryption.mp4
|
36.5 MB
|
Machine Learning and Side-Channel Analysis I.eng.srt
|
123.4 KB
|
Machine Learning and Side-Channel Analysis I.mp4
|
59.8 MB
|
Machine Learning and Side-Channel Analysis II.eng.srt
|
133.3 KB
|
Machine Learning and Side-Channel Analysis II.mp4
|
68.4 MB
|
Masking Post-Quantum Cryptography I.eng.srt
|
112.3 KB
|
Masking Post-Quantum Cryptography I.mp4
|
44.0 MB
|
Masking Post-Quantum Cryptography II.eng.srt
|
71.4 KB
|
Masking Post-Quantum Cryptography II.mp4
|
24.8 MB
|
Masking Techniques I.eng.srt
|
72.5 KB
|
Masking Techniques I.mp4
|
37.8 MB
|
Masking Techniques II.eng.srt
|
107.9 KB
|
Masking Techniques II.mp4
|
53.8 MB
|
Opening Remarks Invited Talk I.eng.srt
|
151.2 KB
|
Opening Remarks Invited Talk I.mp4
|
57.8 MB
|
Pairings.eng.srt
|
67.9 KB
|
Pairings.mp4
|
30.4 MB
|
Post-Quantum Cryptography in Software I.eng.srt
|
82.5 KB
|
Post-Quantum Cryptography in Software I.mp4
|
41.1 MB
|
Post-Quantum Cryptography in Software II.eng.srt
|
83.4 KB
|
Post-Quantum Cryptography in Software II.mp4
|
34.5 MB
|
Security of ECC (Implementations).eng.srt
|
164.6 KB
|
Security of ECC (Implementations).mp4
|
75.0 MB
|
Side Channel Attacks on Post Quantum Implementations I.eng.srt
|
75.1 KB
|
Side Channel Attacks on Post Quantum Implementations I.mp4
|
38.4 MB
|
Side-Channel Attacks on Post-Quantum Implementations II.eng.srt
|
125.6 KB
|
Side-Channel Attacks on Post-Quantum Implementations II.mp4
|
60.2 MB
|
Side-Channel Attacks on Post-Quantum Implementations III.eng.srt
|
75.7 KB
|
Side-Channel Attacks on Post-Quantum Implementations III.mp4
|
41.7 MB
|
Side-Channel Attacks on Symmetric Algorithms I.eng.srt
|
128.8 KB
|
Side-Channel Attacks on Symmetric Algorithms I.mp4
|
59.1 MB
|
Side-Channel Attacks on Symmetric Algorithms II.eng.srt
|
117.5 KB
|
Side-Channel Attacks on Symmetric Algorithms II.mp4
|
61.3 MB
|
Side-Channel Evaluation and Distinguishers.mp4
|
56.1 MB
|
Symmetric Designs.eng.srt
|
76.1 KB
|
Symmetric Designs.mp4
|
43.5 MB
|
True Randomness Closing Remarks.eng.srt
|
91.1 KB
|
True Randomness Closing Remarks.mp4
|
82.7 MB
|
White-Box Cryptography I.eng.srt
|
111.2 KB
|
White-Box Cryptography I.mp4
|
52.4 MB
|
White-Box Cryptography II.eng.srt
|
70.1 KB
|
White-Box Cryptography II.mp4
|
34.6 MB
|
/Eurocrypt/Eurocrypt 2012/
|
A Tutorial on High Performance Computing Applied to Cryp.mp4
|
42.6 MB
|
Adaptively Attribute-Hiding (Hierarchical) Inner Product.mp4
|
17.7 MB
|
All-But-Many Lossy Trapdoor Functions..mp4
|
19.7 MB
|
Another Look at Provable Security..mp4
|
40.2 MB
|
Concurrently Secure Computation in Constant Rounds..mp4
|
15.4 MB
|
Cover and Decomposition Index Calculus on Elliptic Curve.mp4
|
26.9 MB
|
Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.mp4
|
18.2 MB
|
Decoding Random Binary Linear Codes in 2 n 20 - How 1 1.mp4
|
21.1 MB
|
Detecting Dangerous Queries - A New Approach for Chosen C.mp4
|
13.8 MB
|
Efficient and Optimally Secure Key-Length Extension for.mp4
|
17.8 MB
|
Efficient Zero-Knowledge Argument for Correctness of a S.mp4
|
15.4 MB
|
Fair Computation with Rational Players..mp4
|
13.5 MB
|
Faster Algorithms for Approximate Common Divisors - Break.mp4
|
18.1 MB
|
Fully Homomorphic Encryption with Polylog Overhead..mp4
|
16.8 MB
|
Identity-Based (Lossy) Trapdoor Functions and Applications..mp4
|
16.2 MB
|
Identity-Based Encryption Resilient to Continual Auxilia.mp4
|
21.0 MB
|
Incremental Deterministic Public-Key Encryption..mp4
|
16.2 MB
|
Key-Alternating Ciphers in a Provable Setting - Encryptio.mp4
|
15.5 MB
|
Lattice Signatures without Trapdoors..mp4
|
14.3 MB
|
Message Authentication, Revisited..mp4
|
19.6 MB
|
Multiparty Computation with Low Communication, Computati.mp4
|
22.3 MB
|
Narrow-Bicliques - Cryptanalysis of Full IDEA..mp4
|
16.7 MB
|
On the Exact Security of Schnorr-Type Signatures in the.mp4
|
23.9 MB
|
Optimal Security Proofs for Full Domain Hash, Revisited..mp4
|
17.0 MB
|
Property Preserving Symmetric Encryption..mp4
|
16.4 MB
|
Pseudorandom Functions and Lattices..mp4
|
12.5 MB
|
Public Key Compression and Modulus Switching for Fully H.mp4
|
21.8 MB
|
Quantum Proofs of Knowledge..mp4
|
17.8 MB
|
Robust Coin Flipping..mp4
|
19.3 MB
|
Security of Symmetric Encryption in the Presence of Ciph.mp4
|
16.1 MB
|
Standard Security Does Not Imply Security against Select.mp4
|
11.9 MB
|
Statistical Tools Flavor Side-Channel Collision Attacks..mp4
|
19.4 MB
|
Tightly-Secure Signatures from Lossy Identification Schemes..mp4
|
17.0 MB
|
Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller..mp4
|
18.1 MB
|
Unconditionally-Secure Robust Secret Sharing with Compac.mp4
|
17.8 MB
|
/Eurocrypt/Eurocrypt 2016/
|
Adaptively Secure Identity-Based Encryption from Lattices with.mp4
|
18.0 MB
|
All Complete Functionalities are Reversible.mp4
|
13.2 MB
|
Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.mp4
|
13.3 MB
|
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.mp4
|
17.7 MB
|
CFRG Meeting.mp4
|
69.1 MB
|
Circuit Compilers with O(1 - log (n)) Leakage Rate.mp4
|
13.6 MB
|
Computationally Binding Quantum Commitments.mp4
|
16.7 MB
|
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.mp4
|
15.5 MB
|
Constrained Pseudorandom Functions for Unconstrained Inputs.mp4
|
10.6 MB
|
Engineering Code Obfuscation.mp4
|
43.4 MB
|
Essentially Optimal Robust Secret Sharing with Maximal Corruptions.mp4
|
13.2 MB
|
Eurocrypt 2016 Rump Session.mp4
|
87.4 MB
|
Fair and Robust MPC using a Global Transaction Ledger.mp4
|
15.6 MB
|
Faster Algorithms for Solving LPN.mp4
|
19.0 MB
|
Freestart Collision for Full SHA-1.mp4
|
13.1 MB
|
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.mp4
|
15.0 MB
|
IACR Business meeting, Eurocrypt 2016.mp4
|
26.5 MB
|
Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.mp4
|
15.0 MB
|
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.mp4
|
13.6 MB
|
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.mp4
|
12.7 MB
|
Indifferentiability of Confusion-Diffusion Networks.mp4
|
17.0 MB
|
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.mp4
|
15.6 MB
|
Multi-input Functional Encryption in the Private-Key Setting -.mp4
|
14.5 MB
|
New Attacks on the Concatenation and XOR Hash Combiners.mp4
|
13.0 MB
|
New negative results on differing-inputs obfuscation.mp4
|
11.3 MB
|
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.mp4
|
13.6 MB
|
On the Impossibility of Tight Cryptographic Reductions.mp4
|
14.3 MB
|
On the Power of Hierarchical Identity-Based Encryption.mp4
|
14.2 MB
|
On the Size of Pairing-Based Non-interactive Arguments.mp4
|
16.9 MB
|
Online Offline OR Composition of Sigma Protocols.mp4
|
12.2 MB
|
Protecting TLS from legacy crypto, Karthikeyan Bhargavan.mp4
|
41.1 MB
|
Provably Robust Sponge-Based PRNGs and KDFs.mp4
|
15.0 MB
|
Provably Weak Instances of Ring-LWE Revisited.mp4
|
15.5 MB
|
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.mp4
|
14.7 MB
|
Randomness Complexity of Private Circuits for Multiplication.mp4
|
10.4 MB
|
Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.mp4
|
17.1 MB
|
Sanitization of FHE Ciphertexts.mp4
|
13.0 MB
|
Secure Computation from Elastic Noisy Channels.mp4
|
21.0 MB
|
Securing Cryptography Implementations in Embedded Systems, part I.mp4
|
36.4 MB
|
Security Cryptography Implementations in Embedded Systems, Part 2..mp4
|
36.6 MB
|
Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.mp4
|
12.2 MB
|
The Exact Round Complexity of Secure Computation.mp4
|
13.1 MB
|
The future of cryptography.mp4
|
42.0 MB
|
Tightly CCA-Secure Encryption Without Pairings.mp4
|
13.0 MB
|
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.mp4
|
16.5 MB
|
Two Round Multiparty Computation via Multi-key FHE.mp4
|
14.1 MB
|
Unconditionally Secure Computation with Reduced Interaction.mp4
|
13.1 MB
|
Zero-Knowledge Arguments for Lattice-Based Accumulators.mp4
|
13.8 MB
|
/Eurocrypt/Eurocrypt 2017/
|
0 RTT Key Exchange with Full Forward Secrecy.mp4
|
34.2 MB
|
0 RTT Key Exchange with Full Forward Secrecy.srt
|
48.9 KB
|
A kilobit hidden SNFS discrete logarithm computation.mp4
|
19.4 MB
|
A kilobit hidden SNFS discrete logarithm computation.srt
|
60.4 KB
|
A New Structural Differential Property of 5 Round AES.mp4
|
13.4 MB
|
A New Structural Differential Property of 5 Round AES.srt
|
48.4 KB
|
A Note on Perfect Correctness by Derandomization.mp4
|
22.3 MB
|
A Note on Perfect Correctness by Derandomization.srt
|
51.6 KB
|
Ad Hoc PSM Protocols Secure Computation without Coordination.mp4
|
17.4 MB
|
Adaptive partitioning.mp4
|
44.9 MB
|
Adaptive partitioning.srt
|
76.5 KB
|
Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.mp4
|
16.4 MB
|
Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.srt
|
57.0 KB
|
Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.mp4
|
22.9 MB
|
Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.srt
|
66.5 KB
|
Breaking the Sub Exponential Barrier in Obfustopia.mp4
|
24.4 MB
|
Breaking the Sub Exponential Barrier in Obfustopia.srt
|
59.2 KB
|
Computational integrity with a public random string from quasi linear PCPs.mp4
|
24.2 MB
|
Computational integrity with a public random string from quasi linear PCPs.srt
|
43.3 KB
|
Computing generator in cyclotomic integer rings.mp4
|
20.4 MB
|
Computing generator in cyclotomic integer rings.srt
|
43.0 KB
|
Concurrently composable security with shielded super polynomial simulators.mp4
|
14.7 MB
|
Concurrently composable security with shielded super polynomial simulators.srt
|
45.5 KB
|
Conditional Cube Attack on Reduced Round Keccak Sponge Function.mp4
|
26.8 MB
|
Conditional Cube Attack on Reduced Round Keccak Sponge Function.srt
|
44.4 KB
|
Constrain't hiding constrained PRFs for NC1 from LWE.mp4
|
21.1 MB
|
Constrain't hiding constrained PRFs for NC1 from LWE.srt
|
58.2 KB
|
Cryptanalyses of Candidate Branching Program Obfuscators.mp4
|
22.4 MB
|
Cryptanalyses of Candidate Branching Program Obfuscators.srt
|
56.6 KB
|
Cryptography with Updates.mp4
|
24.1 MB
|
Cryptography with Updates.srt
|
66.2 KB
|
Decentralized Anonymous Micropayments.mp4
|
19.4 MB
|
Decentralized Anonymous Micropayments.srt
|
52.5 KB
|
Depth Robust Graphs and Their Cumulative Memory Complexity.mp4
|
25.6 MB
|
Depth Robust Graphs and Their Cumulative Memory Complexity.srt
|
64.4 KB
|
Faster Secure Two Party Computation in the Single Execution Setting.mp4
|
24.0 MB
|
Faster Secure Two Party Computation in the Single Execution Setting.srt
|
60.2 KB
|
Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.mp4
|
29.2 MB
|
Formal Abstractions for Attested Execution Secure Processors.mp4
|
22.8 MB
|
Formal Abstractions for Attested Execution Secure Processors.srt
|
66.1 KB
|
From Minicrypt to Obfustopia via Private Key Functional Encryption.mp4
|
17.2 MB
|
From Minicrypt to Obfustopia via Private Key Functional Encryption.srt
|
48.8 KB
|
Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.mp4
|
17.7 MB
|
Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.srt
|
73.8 KB
|
Group Based Secure Computation Optimizing Rounds, Communication, and Computation.mp4
|
26.4 MB
|
Group Based Secure Computation Optimizing Rounds, Communication, and Computation.srt
|
76.3 KB
|
Hashing Garbled Circuits for Free.mp4
|
18.1 MB
|
Hashing Garbled Circuits for Free.srt
|
51.5 KB
|
High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.mp4
|
15.7 MB
|
High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.srt
|
43.6 KB
|
How Fast Can Higher Order Masking Be in Software.mp4
|
20.8 MB
|
Improved Private Set Intersection against Malicious Adversaries.mp4
|
18.3 MB
|
Improved Private Set Intersection against Malicious Adversaries.srt
|
60.9 KB
|
Invited talk - Advances in computer aided cryptography.mp4
|
70.0 MB
|
Invited talk - Advances in computer aided cryptography.srt
|
156.6 KB
|
Invited talk - Living Between the Ideal and Real Worlds.mp4
|
52.4 MB
|
Invited talk - Living Between the Ideal and Real Worlds.srt
|
185.6 KB
|
Lattice Based SNARGs and Their Application to More Efficient Obfuscation.srt
|
79.2 KB
|
Modifying an Enciphering Scheme after Deployment.mp4
|
13.4 MB
|
Modifying an Enciphering Scheme after Deployment.srt
|
39.2 KB
|
Multi Input Inner Product Functional Encryption from Pairings.mp4
|
14.3 MB
|
Multi Input Inner Product Functional Encryption from Pairings.srt
|
44.6 KB
|
New Collision Attacks on Round Reduced Keccak.mp4
|
14.8 MB
|
New Collision Attacks on Round Reduced Keccak.srt
|
35.9 KB
|
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.mp4
|
24.8 MB
|
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.srt
|
50.8 KB
|
Non Interactive Secure 2PC in the Offline Online and Batch Settings.mp4
|
28.2 MB
|
Non Interactive Secure 2PC in the Offline Online and Batch Settings.srt
|
80.8 KB
|
On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.mp4
|
19.4 MB
|
On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.srt
|
59.3 KB
|
On Removing Graded Encodings from Functional Encryption.mp4
|
17.6 MB
|
On Removing Graded Encodings from Functional Encryption.srt
|
47.5 KB
|
On the Exact Round Complexity of Self Composable Two Party Computation.mp4
|
21.3 MB
|
On the Exact Round Complexity of Self Composable Two Party Computation.srt
|
51.8 KB
|
One Shot Verifiable Encryption from Lattices.mp4
|
27.5 MB
|
One Shot Verifiable Encryption from Lattices.srt
|
74.8 KB
|
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.mp4
|
22.6 MB
|
Private Puncturable PRFs From Standard Lattice Assumptions.mp4
|
23.6 MB
|
Private Puncturable PRFs From Standard Lattice Assumptions.srt
|
62.1 KB
|
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.mp4
|
17.9 MB
|
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.srt
|
55.6 KB
|
Public Seed Pseudorandom Permutations.mp4
|
21.8 MB
|
Quantum Authentication and Encryption with Key Recycling.mp4
|
30.7 MB
|
Quantum Authentication and Encryption with Key Recycling.srt
|
60.2 KB
|
Quantum authentication with key recycling.mp4
|
37.6 MB
|
Quantum authentication with key recycling.srt
|
76.0 KB
|
Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.mp4
|
20.9 MB
|
Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.srt
|
64.8 KB
|
Random Sampling Revisited Lattice Enumeration with Discrete Pruning.mp4
|
19.6 MB
|
Random Sampling Revisited Lattice Enumeration with Discrete Pruning.srt
|
56.4 KB
|
Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.mp4
|
35.8 MB
|
Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.srt
|
61.6 KB
|
Removing the Strong RSA Assumption from Arguments over the Integers.mp4
|
22.2 MB
|
Removing the Strong RSA Assumption from Arguments over the Integers.srt
|
61.1 KB
|
Revisiting Lattice Attacks on overstretched NTRU parameters.mp4
|
22.4 MB
|
Revisiting Lattice Attacks on overstretched NTRU parameters.srt
|
39.5 KB
|
Robust transforming combiners from indistinguishability obfuscation to functional encryption.mp4
|
18.1 MB
|
Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.mp4
|
25.6 MB
|
Short generators without quantum computers the case of multiquadratics.mp4
|
21.6 MB
|
Short Stickelberger Class Relations and application to Ideal SVP.mp4
|
21.1 MB
|
Short Stickelberger Class Relations and application to Ideal SVP.srt
|
49.1 KB
|
Simplifying Design and Analysis of Complex Predicate Encryption Schemes.mp4
|
17.5 MB
|
Simplifying Design and Analysis of Complex Predicate Encryption Schemes.srt
|
51.5 KB
|
Small CRT Exponent RSA Revisited.mp4
|
17.5 MB
|
Small CRT Exponent RSA Revisited.srt
|
42.7 KB
|
Sublinear Zero Knowledge Arguments for RAM Programs.mp4
|
17.4 MB
|
The Multi User Security of Double Encryption.mp4
|
20.7 MB
|
The Multi User Security of Double Encryption.srt
|
38.9 KB
|
Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.mp4
|
20.8 MB
|
Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.srt
|
44.2 KB
|
Twisted u4 normal form for elliptic curves.mp4
|
22.6 MB
|
Twisted u4 normal form for elliptic curves.srt
|
38.1 KB
|
Unconditional UC Secure Computation with Stronger Malicious PUFs.mp4
|
16.7 MB
|
/Eurocrypt/Eurocrypt 2018/
|
A New Approach to Black-Box Concurrent Secure Computation.eng.srt
|
41.0 KB
|
A New Approach to Black-Box Concurrent Secure Computation.mp4
|
21.0 MB
|
Adaptively Secure Garbling with Near Optimal Online Complexity.mp4
|
18.0 MB
|
An Efficiency-Preserving Transformation from.mp4
|
19.6 MB
|
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.mp4
|
20.3 MB
|
Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.mp4
|
18.1 MB
|
Formal Verification of Masked Hardware Implementations in the Presence of Glitches.eng.srt
|
58.4 KB
|
Formal Verification of Masked Hardware Implementations in the Presence of Glitches.mp4
|
27.3 MB
|
Fuzzy Password-Authenticated Key Exchange.eng.srt
|
55.7 KB
|
Fuzzy Password-Authenticated Key Exchange.mp4
|
18.1 MB
|
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.mp4
|
21.5 MB
|
Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).eng.srt
|
55.5 KB
|
Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).mp4
|
22.6 MB
|
Masking Proofs Are Tight and How to Exploit it in Security Evaluations.eng.srt
|
81.2 KB
|
Masking Proofs Are Tight and How to Exploit it in Security Evaluations.mp4
|
27.1 MB
|
Masking the GLP Lattice-Based Signature Scheme at Any Order.eng.srt
|
50.4 KB
|
Masking the GLP Lattice-Based Signature Scheme at Any Order.mp4
|
19.9 MB
|
Non-malleable Codes from Average-Case Hardness.mp4
|
15.9 MB
|
Non-malleable Randomness Encoders and Their Applications.mp4
|
19.3 MB
|
Obfustopia Built on Secret-Key Functional Encryption.eng.srt
|
47.3 KB
|
Obfustopia Built on Secret-Key Functional Encryption.mp4
|
17.1 MB
|
On the Existence of Three Round Zero-Knowledge Proofs.eng.srt
|
48.0 KB
|
On the Existence of Three Round Zero-Knowledge Proofs.mp4
|
15.4 MB
|
OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.mp4
|
16.3 MB
|
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.mp4
|
24.3 MB
|
Simple Proofs of Sequential Work.mp4
|
25.9 MB
|
Statistical Witness Indistinguishability (and more) in Two Messages.eng.srt
|
57.5 KB
|
Statistical Witness Indistinguishability (and more) in Two Messages.mp4
|
21.1 MB
|
Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.mp4
|
22.5 MB
|
The Discrete-Logarithm Problem with Preprocessing.mp4
|
27.5 MB
|
Thirty Years of Digital Currency - From Digicash to the Blockchain.eng.srt
|
154.2 KB
|
Thirty Years of Digital Currency - From Digicash to the Blockchain.mp4
|
45.7 MB
|
too short MTS.eng.srt
|
0.6 KB
|
too short MTS.mp4
|
630.6 KB
|
Two-Round Multiparty Secure Computation from Minimal Assumptions.mp4
|
19.4 MB
|
/.../Eurocrypt 2018 Rump Session/
|
3rd SKINNY Breaking Competition.mp4
|
4.8 MB
|
A basketful of secret shares.mp4
|
4.3 MB
|
Announcement - Lightsec workshop.mp4
|
958.4 KB
|
Another Application of Cryptocurrencies.eng.srt
|
14.7 KB
|
Another Application of Cryptocurrencies.mp4
|
5.5 MB
|
Bernstein Bound is Tight.mp4
|
5.2 MB
|
Conditional Linear Cryptanalysis.mp4
|
4.0 MB
|
Cryptography with Dispensable Backdoors.mp4
|
5.4 MB
|
CSIDH - an efficient post-quantum commutative group action.mp4
|
8.0 MB
|
Decoding distortions using frequency analysis.eng.srt
|
11.1 KB
|
Decoding distortions using frequency analysis.mp4
|
3.2 MB
|
ElectroEuro.mp4
|
3.7 MB
|
How to (not) share a password.mp4
|
5.6 MB
|
How to synchronize efficiently.mp4
|
4.0 MB
|
How we avoided a second Dual-EC-DRBG fiasco.eng.srt
|
15.3 KB
|
How we avoided a second Dual-EC-DRBG fiasco.mp4
|
5.4 MB
|
IACR Fellows nomination.mp4
|
3.5 MB
|
Kittens, Models And Thieves.mp4
|
4.4 MB
|
libpqcrypto.mp4
|
4.0 MB
|
Make AES great again.mp4
|
2.9 MB
|
Must the Communication Graph of MPC Protocols be an Expander.mp4
|
3.3 MB
|
NIST Update.mp4
|
5.1 MB
|
P2P social networks - why and how viable.eng.srt
|
7.6 KB
|
P2P social networks - why and how viable.mp4
|
2.8 MB
|
PRG.mp4
|
3.6 MB
|
QueerCrypt.mp4
|
2.5 MB
|
Random Oracles in the Real World.mp4
|
5.6 MB
|
Reverse Kuleshov effect in cryptography.mp4
|
3.2 MB
|
Small-Box Cryptography, and the Provable Security of SPNs.mp4
|
6.1 MB
|
State-Separating Proofs - A Reduction Methodology for Real-World Protocols.mp4
|
5.6 MB
|
TCC GOA.mp4
|
2.1 MB
|
The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.mp4
|
4.6 MB
|
The ZUC-256 Stream Cipher.mp4
|
2.9 MB
|
Unknown presentation.mp4
|
1.3 MB
|
Workshops @ Crypto 2018.mp4
|
3.1 MB
|
/Eurocrypt/Eurocrypt 2019/
|
A Modular Treatment of Blind Signatures from Identification Schemes.eng.srt
|
37.6 KB
|
A Modular Treatment of Blind Signatures from Identification Schemes.mp4
|
12.1 MB
|
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.eng.srt
|
31.6 KB
|
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.mp4
|
11.8 MB
|
A Quantum-Proof Non-malleable Extractor.eng.srt
|
31.5 KB
|
A Quantum-Proof Non-malleable Extractor.mp4
|
19.8 MB
|
Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.eng.srt
|
37.6 KB
|
Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.mp4
|
11.8 MB
|
An Algebraic Approach to Maliciously Secure Private Set Intersection.eng.srt
|
39.0 KB
|
An Algebraic Approach to Maliciously Secure Private Set Intersection.mp4
|
16.8 MB
|
An Analysis of NIST SP 800-90A.eng.srt
|
47.8 KB
|
An Analysis of NIST SP 800-90A.mp4
|
23.6 MB
|
Approx-SVP in Ideal Lattices with Pre-processing.eng.srt
|
42.5 KB
|
Approx-SVP in Ideal Lattices with Pre-processing.mp4
|
16.3 MB
|
Attacks only Get Better How to Break FF3 on Large Domains.eng.srt
|
33.7 KB
|
Attacks only Get Better How to Break FF3 on Large Domains.mp4
|
17.7 MB
|
Beyond Birthday Bound Secure MAC in Faulty Nonce Model.eng.srt
|
27.1 KB
|
Beyond Birthday Bound Secure MAC in Faulty Nonce Model.mp4
|
15.4 MB
|
bison Instantiating the Whitened Swap-Or-Not Construction.mp4
|
15.2 MB
|
Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.eng.srt
|
29.9 KB
|
Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.mp4
|
16.1 MB
|
Computationally Volume-Hiding Structured Encryption.eng.srt
|
48.6 KB
|
Computationally Volume-Hiding Structured Encryption.mp4
|
16.5 MB
|
Consensus Through Herding.eng.srt
|
56.8 KB
|
Consensus Through Herding.mp4
|
23.1 MB
|
Continuous Non-Malleable Codes in the 8-Split-State Model.mp4
|
19.9 MB
|
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.eng.srt
|
27.4 KB
|
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.mp4
|
19.4 MB
|
Degree 2 is Complete for the Round-Complexity of Malicious MPC.eng.srt
|
20.1 KB
|
Degree 2 is Complete for the Round-Complexity of Malicious MPC.mp4
|
11.0 MB
|
Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.eng.srt
|
24.2 KB
|
Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.mp4
|
12.1 MB
|
Designated-Verifier Pseudorandom Generators, and Their Applications.eng.srt
|
27.9 KB
|
Designated-Verifier Pseudorandom Generators, and Their Applications.mp4
|
10.5 MB
|
Differential Privacy and the People's Data.eng.srt
|
86.2 KB
|
Differential Privacy and the People's Data.mp4
|
50.9 MB
|
Distributional Collision Resistance Beyond One-Way Functions.mp4
|
22.1 MB
|
Durandal A Rank Metric Based Signature Scheme.eng.srt
|
27.1 KB
|
Durandal A Rank Metric Based Signature Scheme.mp4
|
13.4 MB
|
Efficient Circuit-Based PSI with Linear Communication.mp4
|
15.9 MB
|
Efficient Verifiable Delay Functions.eng.srt
|
47.6 KB
|
Efficient Verifiable Delay Functions.mp4
|
17.1 MB
|
Founding Secure Computation on Blockchains.eng.srt
|
43.4 KB
|
Founding Secure Computation on Blockchains.mp4
|
18.6 MB
|
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.eng.srt
|
53.0 KB
|
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.mp4
|
23.3 MB
|
Fully Homomorphic Encryption from the Ground Up.mp4
|
44.7 MB
|
Homomorphic Secret Sharing from Lattices Without FHE.eng.srt
|
40.2 KB
|
Homomorphic Secret Sharing from Lattices Without FHE.mp4
|
16.2 MB
|
Improved Bootstrapping for Approximate Homomorphic Encryption.eng.srt
|
34.8 KB
|
Improved Bootstrapping for Approximate Homomorphic Encryption.mp4
|
17.2 MB
|
Incremental Proofs of Sequential Work.eng.srt
|
39.4 KB
|
Incremental Proofs of Sequential Work.mp4
|
18.4 MB
|
Locality-Preserving Oblivious RAM.eng.srt
|
35.7 KB
|
Locality-Preserving Oblivious RAM.mp4
|
18.4 MB
|
Lower Bounds for Differentially Private RAMs.eng.srt
|
55.5 KB
|
Lower Bounds for Differentially Private RAMs.mp4
|
19.9 MB
|
Minicrypt Primitives with Algebraic Structure and Applications.mp4
|
12.8 MB
|
Misuse Attacks on Post-quantum Cryptosystems.eng.srt
|
32.2 KB
|
Misuse Attacks on Post-quantum Cryptosystems.mp4
|
17.7 MB
|
Multi-party Virtual State Channels.mp4
|
16.3 MB
|
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.eng.srt
|
40.2 KB
|
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.mp4
|
16.7 MB
|
New Techniques for Obfuscating Conjunctions.eng.srt
|
57.1 KB
|
New Techniques for Obfuscating Conjunctions.mp4
|
26.0 MB
|
Non-Malleable Codes Against Bounded Polynomial Time Tampering.eng.srt
|
41.8 KB
|
Non-Malleable Codes Against Bounded Polynomial Time Tampering.mp4
|
21.6 MB
|
On ELFs, Deterministic Encryption, and Correlated-Input Security.eng.srt
|
45.6 KB
|
On ELFs, Deterministic Encryption, and Correlated-Input Security.mp4
|
19.9 MB
|
On Quantum Advantage in Information Theoretic Single-Server PIR.eng.srt
|
52.7 KB
|
On Quantum Advantage in Information Theoretic Single-Server PIR.mp4
|
19.6 MB
|
Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.eng.srt
|
27.8 KB
|
Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.mp4
|
15.4 MB
|
Private Anonymous Data Access.eng.srt
|
37.1 KB
|
Private Anonymous Data Access.mp4
|
23.6 MB
|
Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.eng.srt
|
47.4 KB
|
Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.mp4
|
19.7 MB
|
Quantum Lightning Never Strikes the Same State Twice.eng.srt
|
49.7 KB
|
Quantum Lightning Never Strikes the Same State Twice.mp4
|
19.5 MB
|
Reusable Designated-Verifier NIZKs for all NP from CDH.eng.srt
|
19.0 KB
|
Reusable Designated-Verifier NIZKs for all NP from CDH.mp4
|
7.1 MB
|
Reversible Proofs of Sequential Work.eng.srt
|
41.5 KB
|
Reversible Proofs of Sequential Work.mp4
|
15.9 MB
|
Revisiting Non-Malleable Secret Sharing.eng.srt
|
49.7 KB
|
Revisiting Non-Malleable Secret Sharing.mp4
|
21.5 MB
|
Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.mp4
|
19.0 MB
|
SeaSign Compact Isogeny Signatures from Class Group Actions.eng.srt
|
48.2 KB
|
SeaSign Compact Isogeny Signatures from Class Group Actions.mp4
|
20.8 MB
|
Secret-Sharing Schemes for General and Uniform Access Structures.mp4
|
22.2 MB
|
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.mp4
|
16.4 MB
|
Simple Schemes in the Bounded Storage Model.eng.srt
|
57.8 KB
|
Simple Schemes in the Bounded Storage Model.mp4
|
29.7 MB
|
Symbolic Encryption with Pseudorandom Keys.mp4
|
25.4 MB
|
The General Sieve Kernel and New Records in Lattice Reduction.eng.srt
|
39.4 KB
|
The General Sieve Kernel and New Records in Lattice Reduction.mp4
|
14.4 MB
|
Tight Proofs of Space and Replication.eng.srt
|
48.3 KB
|
Tight Proofs of Space and Replication.mp4
|
27.6 MB
|
Tight Time-Memory Trade-Offs for Symmetric Encryption.eng.srt
|
39.0 KB
|
Tight Time-Memory Trade-Offs for Symmetric Encryption.mp4
|
16.1 MB
|
Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).eng.srt
|
117.9 KB
|
Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).mp4
|
57.0 MB
|
Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.eng.srt
|
34.6 KB
|
Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.mp4
|
19.8 MB
|
Two Round Information-Theoretic MPC with Malicious Security.eng.srt
|
28.7 KB
|
Two Round Information-Theoretic MPC with Malicious Security.mp4
|
15.3 MB
|
Uncovering Algebraic Structures in the MPC Landscape.eng.srt
|
44.4 KB
|
Uncovering Algebraic Structures in the MPC Landscape.mp4
|
19.4 MB
|
Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.eng.srt
|
32.8 KB
|
Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.mp4
|
14.2 MB
|
Welcome to Eurocrypt 2019, Marc Fischlin.eng.srt
|
10.2 KB
|
Welcome to Eurocrypt 2019, Marc Fischlin.mp4
|
9.2 MB
|
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.mp4
|
28.3 MB
|
/Eurocrypt/Eurocrypt 2020/
|
(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.mp4
|
13.8 MB
|
Adaptively Secure ABE for DFA from k-Lin and More.mp4
|
12.6 MB
|
An Algebraic Attack on Rank Metric Code-Based Cryptosystems.mp4
|
20.2 MB
|
Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.mp4
|
18.8 MB
|
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.mp4
|
16.5 MB
|
Broadcast-Optimal Two-Round MPC.mp4
|
15.5 MB
|
Candidate iO From Homomorphic Encryption Schemes.mp4
|
33.8 MB
|
Combiners for Functional Encryption, Unconditionally.mp4
|
11.3 MB
|
Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.mp4
|
14.3 MB
|
Compact NIZKs from Standard Assumptions on Bilinear Maps.mp4
|
20.1 MB
|
Continuous Verifiable Delay Functions.mp4
|
14.5 MB
|
Double-Base Chains for Scalar Multiplications on Elliptic Curves.mp4
|
11.5 MB
|
Efficient Constructions for Almost-everywhere Secure Computation.mp4
|
9.1 MB
|
Efficient simulation of random states and random unitaries.mp4
|
13.9 MB
|
Everybody's a Target Scalability in Public-Key Encryption.mp4
|
12.2 MB
|
Evolving Ramp Secret Sharing with a Small Gap.mp4
|
12.1 MB
|
Extracting Randomness from Extractor-Dependent Sources.mp4
|
9.9 MB
|
Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.mp4
|
20.0 MB
|
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.mp4
|
17.0 MB
|
Formalizing Data Deletion in the Context of the Right to be Forgotten.mp4
|
12.1 MB
|
Fractal Post-Quantum and Transparent Recursive Proofs from Holography.mp4
|
18.4 MB
|
Friet an Authenticated Encryption Scheme with Built-in Fault Detection.mp4
|
16.7 MB
|
Generic-Group Delay Functions Require Hidden-Order Groups.mp4
|
18.8 MB
|
Hardness of LWE on General Entropic Distributions.mp4
|
12.2 MB
|
He Gives C-Sieves on the CSIDH.mp4
|
16.6 MB
|
How to Extract Useful Randomness from Unreliable Sources.mp4
|
18.7 MB
|
Implementing Grover oracles for quantum key search on AES and LowMC.mp4
|
10.6 MB
|
Impossibility Results for Lattice-Based Functional Encryption Schemes.mp4
|
21.1 MB
|
Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.mp4
|
14.5 MB
|
Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.mp4
|
15.0 MB
|
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.mp4
|
13.9 MB
|
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.mp4
|
13.8 MB
|
Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.mp4
|
13.4 MB
|
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.mp4
|
12.7 MB
|
Low Error Efficient Computational Extractors in the CRS Model.mp4
|
14.9 MB
|
Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.mp4
|
12.9 MB
|
Lower Bounds for Leakage-Resilient Secret Sharing.mp4
|
8.6 MB
|
Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.mp4
|
15.6 MB
|
Mathematics and Cryptography A Marriage of Convenience.mp4
|
37.9 MB
|
Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.mp4
|
20.9 MB
|
Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.mp4
|
14.8 MB
|
Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.mp4
|
19.1 MB
|
New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.mp4
|
19.7 MB
|
New Slide Attacks on Almost Self-Similar Ciphers.mp4
|
30.4 MB
|
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.mp4
|
18.6 MB
|
On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.mp4
|
16.7 MB
|
On Instantiating the Algebraic Group Model from Falsifiable Assumptions.mp4
|
25.2 MB
|
On the Memory-Tightness of Hashed ElGamal.mp4
|
10.5 MB
|
On the Quantum Complexity of the Continuous Hidden Subgroup Problem.mp4
|
10.2 MB
|
On the Streaming Indistinguishability of a Random Permutation and a Random Function.mp4
|
15.2 MB
|
Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.mp4
|
22.1 MB
|
OptORAMa Optimal Oblivious RAM.mp4
|
14.8 MB
|
Private Aggregation from Fewer Anonymous Messages.mp4
|
19.6 MB
|
Private Information Retrieval with Sublinear Online Time.mp4
|
14.1 MB
|
PSI from PaXoS Fast, Malicious Private Set Intersection.mp4
|
12.3 MB
|
Quantum Security Analysis of CSIDH.mp4
|
25.5 MB
|
Quantum-access-secure message authentication via blind-unforgeability.mp4
|
13.0 MB
|
Rational isogenies from irrational endomorphisms.mp4
|
12.4 MB
|
Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.mp4
|
13.0 MB
|
s-178 Opening Remarks and Number-theoretic Cryptography.mp4
|
78.3 MB
|
s-180 Best Paper Award.mp4
|
30.7 MB
|
s-182 Obfuscation, Functional Encryption, and Attribute-Based Encryption.mp4
|
54.2 MB
|
s-184 Best Young Researcher Award.mp4
|
42.4 MB
|
s-185 Symmetric Cryptanalysis.mp4
|
72.2 MB
|
s-186 Quantum Cryptography.mp4
|
46.4 MB
|
s-188 Quantum Cryptanalysis.mp4
|
43.3 MB
|
s-190 Secure Computation.mp4
|
58.7 MB
|
s-192 IACR Membership Meeting Part I.mp4
|
68.7 MB
|
s-193 Symmetric Designs.mp4
|
68.0 MB
|
s-194 Zero Knowledge.mp4
|
60.1 MB
|
s-196 Succinct and Concretely Efficient Proof Systems.mp4
|
58.4 MB
|
s-198 Mathematics and Cryptography A Marriage of Convenience.mp4
|
49.4 MB
|
s-200 IACR Fellows Ceremony and Rump Session.mp4
|
145.0 MB
|
s-201 Side-Channel and Fault Attacks.mp4
|
81.2 MB
|
s-202 Verifiable Delay Functions and Randomness Extraction.mp4
|
55.2 MB
|
s-204 Secret Sharing and Information Privacy.mp4
|
70.0 MB
|
s-206 Fine-Grained Cryptography A New Frontier.mp4
|
53.2 MB
|
s-207 Lattice-Based and Code-Based Cryptography.mp4
|
65.9 MB
|
s-209 Public-Key Encryption and Generic Models.mp4
|
54.8 MB
|
s-211 Closing Remarks Feedback Session.mp4
|
88.4 MB
|
s-212 Panel Discussion on Contact Tracing.mp4
|
138.4 MB
|
Secure Multi-party Quantum Computation with a Dishonest Majority.mp4
|
14.0 MB
|
Security of Hedged Fiat-Shamir Signatures under Fault Attacks.mp4
|
26.4 MB
|
Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.mp4
|
20.9 MB
|
Side-channel Masking with Pseudo-Random Generator.mp4
|
22.6 MB
|
Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.mp4
|
9.9 MB
|
Signatures from Sequential-OR Proofs.mp4
|
15.6 MB
|
SPARKs Succinct Parallelizable Arguments of Knowledge.mp4
|
15.5 MB
|
Stacked Garbling for Disjunctive Zero-Knowledge Proofs.mp4
|
10.5 MB
|
Statistical ZAP Arguments.mp4
|
11.5 MB
|
Statistical ZAPR Arguments from Bilinear Maps.mp4
|
15.3 MB
|
Statistical Zaps and New Oblivious Transfer Protocols.mp4
|
14.3 MB
|
Succinct Non-Interactive Secure Computation.mp4
|
13.1 MB
|
The Price of Active Security in Cryptographic Protocols.mp4
|
11.4 MB
|
The Retracing Boomerang Attack.mp4
|
29.8 MB
|
Tight Security Bounds for Double-block Hash-then-Sum MACs.mp4
|
12.2 MB
|
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.mp4
|
17.7 MB
|
TNT How to Tweak a Block Cipher.mp4
|
13.9 MB
|
Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.mp4
|
13.7 MB
|
Transparent SNARKs from DARK Compilers.mp4
|
12.2 MB
|
Two-Round Oblivious Transfer from CDH or LPN.mp4
|
11.4 MB
|
Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.mp4
|
22.7 MB
|
/Eurocrypt/Eurocrypt 2021/
|
A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx....eng.srt
|
33.3 KB
|
A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx....mp4
|
12.5 MB
|
A Decade (or so) of fully homomorphic encryption, by Craig Gentry.eng.srt
|
146.6 KB
|
A Decade (or so) of fully homomorphic encryption, by Craig Gentry.mp4
|
66.8 MB
|
A Deeper Look at Machine Learning-Based Cryptanalysis.eng.srt
|
42.2 KB
|
A Deeper Look at Machine Learning-Based Cryptanalysis.mp4
|
27.0 MB
|
Abuse Resistant Law Enforcement Access Systems.eng.srt
|
33.2 KB
|
Abuse Resistant Law Enforcement Access Systems.mp4
|
11.8 MB
|
Advanced Lattice Sieving on GPUs, with Tensor Cores.eng.srt
|
47.1 KB
|
Advanced Lattice Sieving on GPUs, with Tensor Cores.mp4
|
12.6 MB
|
Aggregatable Distributed Key Generation.eng.srt
|
36.8 KB
|
Aggregatable Distributed Key Generation.mp4
|
12.7 MB
|
Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.eng.srt
|
36.9 KB
|
Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.mp4
|
12.1 MB
|
An Evolution of Models for Zero-Knowledge Proofs.eng.srt
|
140.6 KB
|
An Evolution of Models for Zero-Knowledge Proofs.mp4
|
50.9 MB
|
Analysing the HPKE Standard.eng.srt
|
23.2 KB
|
Analysing the HPKE Standard.mp4
|
27.1 MB
|
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.eng.srt
|
32.6 KB
|
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.mp4
|
18.0 MB
|
Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili....eng.srt
|
48.7 KB
|
Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili....mp4
|
24.6 MB
|
Black-Box Non-Interactive Non-Malleable Commitments.eng.srt
|
52.0 KB
|
Black-Box Non-Interactive Non-Malleable Commitments.mp4
|
16.1 MB
|
Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.eng.srt
|
46.6 KB
|
Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.mp4
|
16.4 MB
|
Candidate Obfuscation via Oblivious LWE Sampling.eng.srt
|
48.3 KB
|
Candidate Obfuscation via Oblivious LWE Sampling.mp4
|
15.2 MB
|
Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.eng.srt
|
43.7 KB
|
Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.mp4
|
14.6 MB
|
Classical proofs of quantum knowledge.eng.srt
|
57.3 KB
|
Classical proofs of quantum knowledge.mp4
|
13.4 MB
|
Classical vs Quantum Random Oracles.eng.srt
|
38.4 KB
|
Classical vs Quantum Random Oracles.mp4
|
23.3 MB
|
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.eng.srt
|
31.8 KB
|
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.mp4
|
17.1 MB
|
Compactness of Hashing Modes and Efficiency beyond Merkle Tree.eng.srt
|
26.4 KB
|
Compactness of Hashing Modes and Efficiency beyond Merkle Tree.mp4
|
12.6 MB
|
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.eng.srt
|
40.1 KB
|
Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.mp4
|
17.0 MB
|
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.eng.srt
|
24.5 KB
|
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.mp4
|
19.9 MB
|
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o....eng.srt
|
44.6 KB
|
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o....mp4
|
21.7 MB
|
Decentralized Multi-Authority ABE for DNFs from LWE.eng.srt
|
45.2 KB
|
Decentralized Multi-Authority ABE for DNFs from LWE.mp4
|
17.8 MB
|
Delay Encryption.eng.srt
|
44.0 KB
|
Delay Encryption.mp4
|
34.7 MB
|
Dummy Shuffling against Algebraic Attacks in White-box Implementations.eng.srt
|
51.4 KB
|
Dummy Shuffling against Algebraic Attacks in White-box Implementations.mp4
|
15.0 MB
|
Dynamic Ad Hoc Clock Synchronization.eng.srt
|
65.4 KB
|
Dynamic Ad Hoc Clock Synchronization.mp4
|
25.6 MB
|
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.eng.srt
|
40.2 KB
|
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.mp4
|
25.6 MB
|
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.eng.srt
|
38.2 KB
|
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.mp4
|
11.0 MB
|
Eurocrypt 2021 rump session part deux.eng.srt
|
100.3 KB
|
Eurocrypt 2021 rump session part deux.mp4
|
57.7 MB
|
Fast verification of masking schemes in characteristic two.eng.srt
|
32.1 KB
|
Fast verification of masking schemes in characteristic two.mp4
|
14.9 MB
|
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.eng.srt
|
46.1 KB
|
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.mp4
|
12.4 MB
|
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.eng.srt
|
29.3 KB
|
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.mp4
|
15.0 MB
|
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia....eng.srt
|
30.9 KB
|
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia....mp4
|
22.2 MB
|
Improved cryptanalysis of UOV and Rainbow.eng.srt
|
50.4 KB
|
Improved cryptanalysis of UOV and Rainbow.mp4
|
14.7 MB
|
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.eng.srt
|
32.7 KB
|
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.mp4
|
18.2 MB
|
Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn....eng.srt
|
52.0 KB
|
Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn....mp4
|
17.4 MB
|
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.eng.srt
|
36.8 KB
|
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.mp4
|
15.7 MB
|
Leakage Resilient Value Comparison With Application to Message Authentication.eng.srt
|
39.2 KB
|
Leakage Resilient Value Comparison With Application to Message Authentication.mp4
|
13.7 MB
|
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.eng.srt
|
33.9 KB
|
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.mp4
|
16.7 MB
|
LogStack Stacked Garbling with O(b log b) Computation.eng.srt
|
47.1 KB
|
LogStack Stacked Garbling with O(b log b) Computation.mp4
|
17.7 MB
|
Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.eng.srt
|
31.8 KB
|
Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.mp4
|
14.6 MB
|
Mind the Middle Layer The HADES Design Strategy Revisited.eng.srt
|
36.7 KB
|
Mind the Middle Layer The HADES Design Strategy Revisited.mp4
|
11.4 MB
|
Multi-Party Reusable Non-Interactive Secure Computation from LWE.eng.srt
|
38.7 KB
|
Multi-Party Reusable Non-Interactive Secure Computation from LWE.mp4
|
11.7 MB
|
Multi-Source Non-Malleable Extractors and Applications.eng.srt
|
34.2 KB
|
Multi-Source Non-Malleable Extractors and Applications.mp4
|
10.2 MB
|
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong....eng.srt
|
31.8 KB
|
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong....mp4
|
13.3 MB
|
Non-Interactive Anonymous Router.eng.srt
|
51.9 KB
|
Non-Interactive Anonymous Router.mp4
|
17.5 MB
|
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.eng.srt
|
36.7 KB
|
Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.mp4
|
10.4 MB
|
Oblivious Transfer is in MiniQCrypt.eng.srt
|
40.8 KB
|
Oblivious Transfer is in MiniQCrypt.mp4
|
12.4 MB
|
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.eng.srt
|
31.2 KB
|
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.mp4
|
20.0 MB
|
On the ideal shortest vector problem over random rational primes.eng.srt
|
35.8 KB
|
On the ideal shortest vector problem over random rational primes.mp4
|
15.5 MB
|
On the Power of Expansion More Efficient Constructions in the Random Probing Model.eng.srt
|
50.2 KB
|
On the Power of Expansion More Efficient Constructions in the Random Probing Model.mp4
|
14.5 MB
|
On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle ....eng.srt
|
47.5 KB
|
On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle ....mp4
|
17.1 MB
|
On the Security of Homomorphic Encryption on Approximate Numbers.eng.srt
|
39.8 KB
|
On the Security of Homomorphic Encryption on Approximate Numbers.mp4
|
19.1 MB
|
One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.eng.srt
|
36.8 KB
|
One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.mp4
|
14.6 MB
|
Order-C Secure Multiparty Computation for Highly Repetitive Circuits.eng.srt
|
42.3 KB
|
Order-C Secure Multiparty Computation for Highly Repetitive Circuits.mp4
|
21.0 MB
|
Password Hashing and Preprocessing.eng.srt
|
43.4 KB
|
Password Hashing and Preprocessing.mp4
|
14.0 MB
|
Post-Quantum Multi-Party Computation.mp4
|
22.1 MB
|
Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.eng.srt
|
26.2 KB
|
Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.mp4
|
11.8 MB
|
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.eng.srt
|
33.7 KB
|
Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.mp4
|
16.3 MB
|
Robust Property-Preserving Hash Functions for Hamming Distance and More.eng.srt
|
39.2 KB
|
Robust Property-Preserving Hash Functions for Hamming Distance and More.mp4
|
8.5 MB
|
Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ....eng.srt
|
29.0 KB
|
Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ....mp4
|
12.2 MB
|
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio....eng.srt
|
29.4 KB
|
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio....mp4
|
12.6 MB
|
Secure Software Leasing.eng.srt
|
49.4 KB
|
Secure Software Leasing.mp4
|
22.9 MB
|
Security Analysis of Quantum Lightning.eng.srt
|
15.7 KB
|
Security Analysis of Quantum Lightning.mp4
|
5.0 MB
|
session-1 Eurocrypt 2021 opening remarks best paper awards.eng.srt
|
142.8 KB
|
session-1 Eurocrypt 2021 opening remarks best paper awards.mp4
|
68.7 MB
|
session-4 Public Key Cryptography and Isogenies.eng.srt
|
104.2 KB
|
session-4 Public Key Cryptography and Isogenies.mp4
|
49.9 MB
|
session-6 Symmetric Cryptanalysis.eng.srt
|
90.8 KB
|
session-6 Symmetric Cryptanalysis.mp4
|
58.8 MB
|
session-7 FHE and IO.eng.srt
|
91.5 KB
|
session-7 FHE and IO.mp4
|
49.6 MB
|
session-8 Implementation Issues, Masking and Secret Sharing.eng.srt
|
86.2 KB
|
session-8 Implementation Issues, Masking and Secret Sharing.mp4
|
49.6 MB
|
session-12 Isogenies and Lattices.eng.srt
|
109.9 KB
|
session-12 Isogenies and Lattices.mp4
|
50.4 MB
|
session-14 Multiparty Computation.eng.srt
|
103.5 KB
|
session-14 Multiparty Computation.mp4
|
49.4 MB
|
session-193 Quantum Constructions and Proofs.eng.srt
|
87.5 KB
|
session-193 Quantum Constructions and Proofs.mp4
|
41.3 MB
|
session-194 Symmetric Designs and Leakage-Resilience.eng.srt
|
100.1 KB
|
session-194 Symmetric Designs and Leakage-Resilience.mp4
|
46.1 MB
|
session-196 Post-Quantum Cryptography.eng.srt
|
102.6 KB
|
session-196 Post-Quantum Cryptography.mp4
|
56.3 MB
|
session-201 Zero Knowledge, Property-Preserving Hashing and ORAM.eng.srt
|
97.0 KB
|
session-201 Zero Knowledge, Property-Preserving Hashing and ORAM.mp4
|
49.0 MB
|
session-202 Block Chain, Privacy and Law Enforcement.eng.srt
|
110.8 KB
|
session-202 Block Chain, Privacy and Law Enforcement.mp4
|
54.5 MB
|
session-204 Multiparty Computation and Garbled Circuits.eng.srt
|
105.0 KB
|
session-204 Multiparty Computation and Garbled Circuits.mp4
|
52.1 MB
|
session-206 Faults, Tampering and Non-Malleability.eng.srt
|
66.8 KB
|
session-206 Faults, Tampering and Non-Malleability.mp4
|
32.4 MB
|
session-219 Rump session.eng.srt
|
101.5 KB
|
session-219 Rump session.mp4
|
53.6 MB
|
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.eng.srt
|
62.4 KB
|
Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.mp4
|
27.7 MB
|
Structured Encryption and Dynamic Leakage Suppression.eng.srt
|
43.0 KB
|
Structured Encryption and Dynamic Leakage Suppression.mp4
|
14.7 MB
|
TARDIS A Foundation of Time-Lock Puzzles in UC.eng.srt
|
49.0 KB
|
TARDIS A Foundation of Time-Lock Puzzles in UC.mp4
|
18.8 MB
|
The More The Merrier Reducing the Cost of Large Scale MPC.eng.srt
|
52.0 KB
|
The More The Merrier Reducing the Cost of Large Scale MPC.mp4
|
15.4 MB
|
The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre....eng.srt
|
37.1 KB
|
The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre....mp4
|
13.0 MB
|
The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si....eng.srt
|
35.7 KB
|
The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si....mp4
|
23.6 MB
|
The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.eng.srt
|
43.3 KB
|
The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.mp4
|
10.8 MB
|
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.eng.srt
|
42.5 KB
|
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.mp4
|
15.0 MB
|
Threshold Garbled Circuits and Ad Hoc Secure Computation.eng.srt
|
37.7 KB
|
Threshold Garbled Circuits and Ad Hoc Secure Computation.mp4
|
11.7 MB
|
Tightly-Secure Authenticated Key Exchange, Revisited.eng.srt
|
39.4 KB
|
Tightly-Secure Authenticated Key Exchange, Revisited.mp4
|
10.9 MB
|
Towards Accountability in CRS Generation.eng.srt
|
39.8 KB
|
Towards Accountability in CRS Generation.mp4
|
26.1 MB
|
Unbounded Multi-Party Computation from Learning with Errors.eng.srt
|
25.3 KB
|
Unbounded Multi-Party Computation from Learning with Errors.mp4
|
10.5 MB
|
VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.eng.srt
|
47.5 KB
|
VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.mp4
|
13.2 MB
|
/Eurocrypt/Eurocrypt 2022/
|
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4
|
10.0 MB
|
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.srt
|
32.3 KB
|
A Correlation Attack on Full SNOW-V and SNOW-Vi.mp4
|
9.3 MB
|
A Correlation Attack on Full SNOW-V and SNOW-Vi.srt
|
18.2 KB
|
A Fast and Simple Partially Oblivious PRF, with Applications.mp4
|
18.0 MB
|
A Fast and Simple Partially Oblivious PRF, with Applications.srt
|
47.9 KB
|
A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4
|
23.4 MB
|
A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.srt
|
31.7 KB
|
A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.mp4
|
18.2 MB
|
A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.srt
|
40.8 KB
|
A PCP Theorem for Interactive Proofs and Applications.mp4
|
12.5 MB
|
A PCP Theorem for Interactive Proofs and Applications.srt
|
36.0 KB
|
Adaptively Secure Computation for RAM Programs.mp4
|
18.8 MB
|
Adaptively Secure Computation for RAM Programs.srt
|
51.1 KB
|
Anamorphic Encryption Private Communication against a Dictator.mp4
|
28.2 MB
|
Anamorphic Encryption Private Communication against a Dictator.srt
|
65.5 KB
|
Anonymity of NIST PQC Round 3 KEMs.mp4
|
13.4 MB
|
Anonymity of NIST PQC Round 3 KEMs.srt
|
32.6 KB
|
Anonymous, Robust Post-Quantum Public Key Encryption.mp4
|
21.2 MB
|
Anonymous, Robust Post-Quantum Public Key Encryption.srt
|
55.3 KB
|
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.mp4
|
14.2 MB
|
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.srt
|
43.2 KB
|
Asymmetric PAKE with low computation and communication.mp4
|
20.6 MB
|
Asymmetric PAKE with low computation and communication.srt
|
43.0 KB
|
Asymptotically Quasi-Optimal Cryptography.mp4
|
16.7 MB
|
Asymptotically Quasi-Optimal Cryptography.srt
|
41.4 KB
|
Authentication in the Bounded Storage Model.mp4
|
16.3 MB
|
Authentication in the Bounded Storage Model.srt
|
44.0 KB
|
Batch-OT with Optimal Rate.mp4
|
12.2 MB
|
Batch-OT with Optimal Rate.srt
|
30.4 KB
|
Beyond quadratic speedups in quantum attacks on symmetric schemes.mp4
|
14.0 MB
|
Beyond quadratic speedups in quantum attacks on symmetric schemes.srt
|
39.5 KB
|
COA-Secure Obfuscation and Applications.mp4
|
26.3 MB
|
COA-Secure Obfuscation and Applications.srt
|
72.1 KB
|
CoCoA Concurrent Continuous Group Key Agreement.mp4
|
23.1 MB
|
CoCoA Concurrent Continuous Group Key Agreement.srt
|
50.0 KB
|
Constant-round Blind Classical Verification of Quantum Sampling.mp4
|
17.6 MB
|
Constant-round Blind Classical Verification of Quantum Sampling.srt
|
47.4 KB
|
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.mp4
|
15.9 MB
|
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.srt
|
25.0 KB
|
Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.mp4
|
11.2 MB
|
Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.srt
|
33.6 KB
|
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.mp4
|
12.3 MB
|
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.srt
|
39.6 KB
|
Efficient Schemes for Committing Authenticated Encryption.mp4
|
15.5 MB
|
Efficient Schemes for Committing Authenticated Encryption.srt
|
35.2 KB
|
Embedding the UC Model into the IITM Model.mp4
|
21.8 MB
|
Embedding the UC Model into the IITM Model.srt
|
55.1 KB
|
Families of SNARK-friendly 2-chains of elliptic curves.mp4
|
18.0 MB
|
Families of SNARK-friendly 2-chains of elliptic curves.srt
|
39.8 KB
|
Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).mp4
|
14.7 MB
|
Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).srt
|
41.2 KB
|
Garbled Circuits With Sublinear Evaluator.mp4
|
12.3 MB
|
Garbled Circuits With Sublinear Evaluator.srt
|
44.4 KB
|
Gemini elastic SNARKs for diverse environments.mp4
|
12.6 MB
|
Gemini elastic SNARKs for diverse environments.srt
|
44.6 KB
|
Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.mp4
|
17.9 MB
|
Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.srt
|
37.3 KB
|
Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.mp4
|
15.2 MB
|
Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.srt
|
51.9 KB
|
Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.mp4
|
15.2 MB
|
Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.srt
|
38.1 KB
|
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.mp4
|
16.8 MB
|
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.srt
|
40.3 KB
|
Highly Efficient OT-Based Multiplication Protocols.mp4
|
16.8 MB
|
Highly Efficient OT-Based Multiplication Protocols.srt
|
41.4 KB
|
IACR Distinguished Lecture by Ingrid Verbauwhede.mp4
|
48.6 MB
|
IACR Distinguished Lecture by Ingrid Verbauwhede.srt
|
116.1 KB
|
Incompressible Cryptography.mp4
|
11.2 MB
|
Incompressible Cryptography.srt
|
37.9 KB
|
Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4
|
15.6 MB
|
Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.srt
|
48.1 KB
|
Information-Combining Differential Fault Attacks on DEFAULT.mp4
|
15.5 MB
|
Information-Combining Differential Fault Attacks on DEFAULT.srt
|
43.7 KB
|
Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.mp4
|
44.0 MB
|
Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.srt
|
121.1 KB
|
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4
|
12.6 MB
|
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.srt
|
19.2 KB
|
Lightweight, Maliciously Secure Verifiable Function Secret Sharing.mp4
|
16.6 MB
|
Lightweight, Maliciously Secure Verifiable Function Secret Sharing.srt
|
42.1 KB
|
Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.mp4
|
10.4 MB
|
Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.srt
|
28.5 KB
|
Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4
|
17.0 MB
|
Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.srt
|
37.3 KB
|
Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4
|
20.2 MB
|
Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.srt
|
50.4 KB
|
Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4
|
24.5 MB
|
Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.srt
|
34.0 KB
|
Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4
|
12.1 MB
|
Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.srt
|
19.7 KB
|
Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.mp4
|
12.7 MB
|
Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.srt
|
39.3 KB
|
Live version of Optimal Tightness for Chain-Based Unique Signatures.mp4
|
20.1 MB
|
Live version of Optimal Tightness for Chain-Based Unique Signatures.srt
|
34.3 KB
|
Live version of Private Circuits with Quasilinear Randomness.mp4
|
19.7 MB
|
Live version of Private Circuits with Quasilinear Randomness.srt
|
41.2 KB
|
Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.mp4
|
8.7 MB
|
Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.srt
|
26.7 KB
|
Live version Unclonable Polymers and Their Cryptographic Applications.mp4
|
14.6 MB
|
Live version Unclonable Polymers and Their Cryptographic Applications.srt
|
41.8 KB
|
McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.mp4
|
12.4 MB
|
McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.srt
|
40.9 KB
|
Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.mp4
|
18.6 MB
|
Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.srt
|
46.8 KB
|
Multi-Designated Receiver Signed Public Key Encryption.mp4
|
13.1 MB
|
Multi-Designated Receiver Signed Public Key Encryption.srt
|
37.4 KB
|
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4
|
9.0 MB
|
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.srt
|
28.4 KB
|
Non-malleable Commitments Against Quantum Attacks.mp4
|
13.9 MB
|
Non-malleable Commitments Against Quantum Attacks.srt
|
42.1 KB
|
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.mp4
|
20.8 MB
|
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.srt
|
48.9 KB
|
On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.mp4
|
12.2 MB
|
On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.srt
|
36.8 KB
|
On Succinct Non-Interactive Arguments in Relativized Worlds.mp4
|
16.8 MB
|
On Succinct Non-Interactive Arguments in Relativized Worlds.srt
|
45.0 KB
|
On the Concrete Security of TLS 1.3 PSK Mode.mp4
|
19.5 MB
|
On the Concrete Security of TLS 1.3 PSK Mode.srt
|
48.0 KB
|
On the Multi-User Security of Short Schnorr Signatures with Preprocessing.mp4
|
22.3 MB
|
On the Multi-User Security of Short Schnorr Signatures with Preprocessing.srt
|
53.9 KB
|
On the security of ECDSA with additive key derivation and presignatures.mp4
|
17.9 MB
|
On the security of ECDSA with additive key derivation and presignatures.srt
|
53.0 KB
|
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.mp4
|
18.6 MB
|
One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.srt
|
50.8 KB
|
Online-Extractability in the Quantum Random-Oracle Model.mp4
|
16.3 MB
|
Online-Extractability in the Quantum Random-Oracle Model.srt
|
40.9 KB
|
Opening remarks and Best Paper Award talk.mp4
|
24.2 MB
|
Opening remarks and Best Paper Award talk.srt
|
68.1 KB
|
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.mp4
|
8.8 MB
|
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.srt
|
36.6 KB
|
Optimal Tightness for Chain-Based Unique Signatures.mp4
|
19.7 MB
|
Optimal Tightness for Chain-Based Unique Signatures.srt
|
33.4 KB
|
Post-Quantum Security of the Even-Mansour Cipher.mp4
|
13.9 MB
|
Post-Quantum Security of the Even-Mansour Cipher.srt
|
46.8 KB
|
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.mp4
|
15.6 MB
|
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.srt
|
42.8 KB
|
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.mp4
|
17.6 MB
|
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.srt
|
36.6 KB
|
Private Circuits with Quasilinear Randomness.mp4
|
15.0 MB
|
Private Circuits with Quasilinear Randomness.srt
|
39.9 KB
|
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.mp4
|
12.9 MB
|
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.srt
|
38.7 KB
|
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.mp4
|
26.1 MB
|
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.srt
|
65.0 KB
|
Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4
|
1.2 MB
|
Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.srt
|
1.7 KB
|
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.mp4
|
16.2 MB
|
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.srt
|
34.3 KB
|
Round-Optimal and Communication-Efficient Multiparty Computation.mp4
|
11.9 MB
|
Round-Optimal and Communication-Efficient Multiparty Computation.srt
|
42.6 KB
|
Round-Optimal Black-Box Protocol Compilers.mp4
|
16.3 MB
|
Round-Optimal Black-Box Protocol Compilers.srt
|
54.9 KB
|
Round-Optimal Byzantine Agreement.mp4
|
12.1 MB
|
Round-Optimal Byzantine Agreement.srt
|
40.8 KB
|
Round-Optimal Multi-Party Computation with Identifiable Abort.mp4
|
13.7 MB
|
Round-Optimal Multi-Party Computation with Identifiable Abort.srt
|
39.1 KB
|
Rump Session at Eurocrypt 2022.mp4
|
190.1 MB
|
s-33 Homomorphic encryption 2.mp4
|
30.4 MB
|
s-33 Homomorphic encryption 2.srt
|
76.8 KB
|
s-44 Post-quantum cryptography 2.mp4
|
45.3 MB
|
s-44 Post-quantum cryptography 2.srt
|
141.5 KB
|
Secure Multiparty Computation with Free Branching.mp4
|
12.9 MB
|
Secure Multiparty Computation with Free Branching.srt
|
42.9 KB
|
Secure Multiparty Computation with Sublinear Preprocessing.mp4
|
14.0 MB
|
Secure Multiparty Computation with Sublinear Preprocessing.srt
|
43.9 KB
|
Secure Non-Interactive Reduction and Spectral Analysis of Correlations.mp4
|
16.6 MB
|
Secure Non-Interactive Reduction and Spectral Analysis of Correlations.srt
|
49.0 KB
|
Secure Non-interactive Simulation Feasibility - & Rate.mp4
|
19.4 MB
|
Secure Non-interactive Simulation Feasibility - & Rate.srt
|
44.0 KB
|
Short Pairing-Free Blind Signatures with Exponential Security.mp4
|
11.6 MB
|
Short Pairing-Free Blind Signatures with Exponential Security.srt
|
37.9 KB
|
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.mp4
|
11.5 MB
|
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.srt
|
43.1 KB
|
Single-Server Private Information Retrieval with Sublinear Amortized Time.mp4
|
20.0 MB
|
Single-Server Private Information Retrieval with Sublinear Amortized Time.srt
|
48.1 KB
|
SNARGs for P from Sub-exponential DDH and QR.mp4
|
12.8 MB
|
SNARGs for P from Sub-exponential DDH and QR.srt
|
43.3 KB
|
Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.mp4
|
12.2 MB
|
Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.srt
|
33.6 KB
|
Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.mp4
|
16.8 MB
|
Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.srt
|
40.0 KB
|
Unclonable Polymers and Their Cryptographic Applications.mp4
|
9.2 MB
|
Unclonable Polymers and Their Cryptographic Applications.srt
|
29.0 KB
|
Universally Composable Subversion-Resilient Cryptography.mp4
|
12.2 MB
|
Universally Composable Subversion-Resilient Cryptography.srt
|
40.8 KB
|
Watermarking PRFs against Quantum Adversaries.mp4
|
16.7 MB
|
Watermarking PRFs against Quantum Adversaries.srt
|
40.1 KB
|
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.mp4
|
15.8 MB
|
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.srt
|
46.9 KB
|
/Eurocrypt/Eurocrypt 2023/
|
(Zero-Knowledge) Proofs 1 (cont)..eng.srt
|
65.2 KB
|
(Zero-Knowledge) Proofs 1 (cont).mp4
|
24.6 MB
|
(Zero-knowledge) Proofs 1.eng.srt
|
115.5 KB
|
(Zero-knowledge) Proofs 1.mp4
|
38.9 MB
|
(Zero-Knowledge) Proofs 2.eng.srt
|
116.7 KB
|
(Zero-Knowledge) Proofs 2.mp4
|
48.5 MB
|
Attribute Based Encryption and Friends.eng.srt
|
111.7 KB
|
Attribute Based Encryption and Friends.mp4
|
40.5 MB
|
Attribute-based Encryption and Friends (cont.).eng.srt
|
60.0 KB
|
Attribute-based Encryption and Friends (cont.).mp4
|
26.3 MB
|
Authenticated Key Exchange.eng.srt
|
75.4 KB
|
Authenticated Key Exchange.mp4
|
37.2 MB
|
Block Cipher Cryptanalysis (cont.).eng.srt
|
80.5 KB
|
Block Cipher Cryptanalysis (cont.).mp4
|
29.7 MB
|
Blockcipher cryptanalysis.eng.srt
|
97.9 KB
|
Blockcipher cryptanalysis.mp4
|
50.0 MB
|
Differential Privacy.eng.srt
|
59.2 KB
|
Differential Privacy.mp4
|
23.0 MB
|
Efficient MPC Constructions (cont.).eng.srt
|
65.2 KB
|
Efficient MPC Constructions (cont.).mp4
|
23.6 MB
|
Efficient MPC Constructions.eng.srt
|
85.3 KB
|
Efficient MPC Constructions.mp4
|
29.9 MB
|
Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.eng.srt
|
127.5 KB
|
Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.mp4
|
39.3 MB
|
Eurocrypt 2023 Rump Session (part 2).mp4
|
83.4 MB
|
Eurocrypt 2023 Rump session part 1.mp4
|
89.5 MB
|
Eurocrypt2023 Invited Talk Guy Rothblum Indistinguishable Predictions and Multi-Group Fair Learni.eng.srt
|
136.5 KB
|
Eurocrypt2023 Invited Talk Guy Rothblum Indistinguishable Predictions and Multi-Group Fair Learni.mp4
|
36.1 MB
|
Fully Homomorphic Encryption (cont.).eng.srt
|
57.9 KB
|
Fully Homomorphic Encryption (cont.).mp4
|
30.2 MB
|
Fully Homomorphic Encryption.eng.srt
|
99.0 KB
|
Fully Homomorphic Encryption.mp4
|
36.9 MB
|
Garbling Schemes and Oblivious Transfer.eng.srt
|
88.7 KB
|
Garbling Schemes and Oblivious Transfer.mp4
|
46.7 MB
|
Hash Function Cryptanalysis.eng.srt
|
81.6 KB
|
Hash Function Cryptanalysis.mp4
|
60.8 MB
|
Isogenies 1.eng.srt
|
101.2 KB
|
Isogenies 1.mp4
|
37.8 MB
|
Isogenies 2.eng.srt
|
111.9 KB
|
Isogenies 2.mp4
|
41.1 MB
|
Lattice Constructions.eng.srt
|
95.1 KB
|
Lattice Constructions.mp4
|
39.1 MB
|
Lattice Cryptanalysis.eng.srt
|
70.0 KB
|
Lattice Cryptanalysis.mp4
|
27.8 MB
|
Lower Bounds.eng.srt
|
166.7 KB
|
Lower Bounds.mp4
|
73.1 MB
|
Messaging and Message Franking.eng.srt
|
110.1 KB
|
Messaging and Message Franking.mp4
|
45.5 MB
|
MPC and Proofs.eng.srt
|
101.8 KB
|
MPC and Proofs.mp4
|
44.2 MB
|
Non-Interactive Multi-party Computation.eng.srt
|
103.9 KB
|
Non-Interactive Multi-party Computation.mp4
|
36.7 MB
|
Non-malleable Commitments and Obfuscation.eng.srt
|
79.4 KB
|
Non-malleable Commitments and Obfuscation.mp4
|
26.9 MB
|
Oblivious Data Access 1.eng.srt
|
101.2 KB
|
Oblivious Data Access 1.mp4
|
42.1 MB
|
Oblivious Data Access 2.eng.srt
|
131.2 KB
|
Oblivious Data Access 2.mp4
|
34.6 MB
|
Oblivious Transfer (cont.).eng.srt
|
62.9 KB
|
Oblivious Transfer (cont.).mp4
|
24.7 MB
|
Oblivious Transfer.eng.srt
|
86.9 KB
|
Oblivious Transfer.mp4
|
31.0 MB
|
Pseudorandom Functions.eng.srt
|
66.7 KB
|
Pseudorandom Functions.mp4
|
34.3 MB
|
Public-Key Cryptanalysis.eng.srt
|
86.8 KB
|
Public-Key Cryptanalysis.mp4
|
33.7 MB
|
Quantum Cryptography.eng.srt
|
87.7 KB
|
Quantum Cryptography.mp4
|
36.0 MB
|
Real World Cryptography.eng.srt
|
75.1 KB
|
Real World Cryptography.mp4
|
29.8 MB
|
Side Channel Attacks and Masking.eng.srt
|
102.5 KB
|
Side Channel Attacks and Masking.mp4
|
47.7 MB
|
Signature Schemes 1 (cont.).eng.srt
|
70.8 KB
|
Signature Schemes 1 (cont.).mp4
|
26.2 MB
|
Signature Schemes 2.eng.srt
|
100.0 KB
|
Signature Schemes 2.mp4
|
33.8 MB
|
Signatures 1.eng.srt
|
106.7 KB
|
Signatures 1.mp4
|
44.8 MB
|
Symettric Designs 1.eng.srt
|
99.2 KB
|
Symettric Designs 1.mp4
|
43.4 MB
|
Symmetric Design 2 (cont.).eng.srt
|
66.5 KB
|
Symmetric Design 2 (cont.).mp4
|
28.9 MB
|
Symmetric Design 2.eng.srt
|
70.5 KB
|
Symmetric Design 2.mp4
|
31.2 MB
|
Symmetric Design 3.eng.srt
|
78.2 KB
|
Symmetric Design 3.mp4
|
34.7 MB
|
Theory of Public-Key Cryptography.eng.srt
|
100.6 KB
|
Theory of Public-Key Cryptography.mp4
|
49.9 MB
|
Traitor Tracing Schemes.eng.srt
|
66.0 KB
|
Traitor Tracing Schemes.mp4
|
26.1 MB
|
/FSE 2013/
|
A Framework for Automated Independent-Biclique Cryptanalysis.mp4
|
27.9 MB
|
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.mp4
|
29.7 MB
|
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.mp4
|
28.9 MB
|
ALE - AES-Based Lightweight Authenticated Encryption.mp4
|
26.0 MB
|
Attacks and Security Proofs of EAX-Prime.mp4
|
32.7 MB
|
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.mp4
|
35.3 MB
|
Complementing Feistel Ciphers.mp4
|
28.3 MB
|
Cryptanalysis of Round-Reduced LED.mp4
|
30.6 MB
|
Cryptanalysis of WIDEA.mp4
|
28.0 MB
|
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.mp4
|
31.1 MB
|
FSE 2013 Rump Session.mp4
|
80.9 MB
|
Full Plain'text Recovery Attack on Broadcast RC4.mp4
|
30.3 MB
|
Higher-Order Side Channel Security and Mask Refreshing.mp4
|
31.2 MB
|
Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.mp4
|
35.6 MB
|
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.mp4
|
33.1 MB
|
Invited Talk - Failures of secret key cryptography.mp4
|
101.0 MB
|
Masking Tables - An Underestimated Security Risk.mp4
|
25.7 MB
|
Near Collision Attack on the Grain v1 Stream Cipher.mp4
|
28.0 MB
|
On Symmetric Encryption with Distinguishable Decryption Failures.mp4
|
28.7 MB
|
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.mp4
|
28.3 MB
|
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.mp4
|
25.7 MB
|
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.mp4
|
30.7 MB
|
Program Chair' Opening Remarks.mp4
|
2.5 MB
|
Reflection Cryptanalysis of PRINCE-Like Ciphers.mp4
|
28.1 MB
|
Related-Key Attacks Against Full Hummingbird-2.mp4
|
32.1 MB
|
Rotational Cryptanalysis of Round-Reduced Keccak.mp4
|
32.6 MB
|
Secure Message Authentication Against Related-Key Attack.mp4
|
31.0 MB
|
Security Analysis of PRINCE.mp4
|
26.6 MB
|
Smashing WEP in a Passive Attack.mp4
|
32.6 MB
|
Time-Memory Trade-Offs for Near-Collisions.mp4
|
32.5 MB
|
Towards Secure Distance Bounding.mp4
|
86.4 MB
|
Towards Understanding the Known-Key Security of Block Ciphers.mp4
|
35.5 MB
|
Tweakable Blockciphers with Asymptotically Optimal Security.mp4
|
30.8 MB
|
/FSE 2019/
|
A General Proof Framework for Recent AES Distinguishers.eng.srt
|
28.7 KB
|
A General Proof Framework for Recent AES Distinguishers.mp4
|
10.7 MB
|
Adiantum length-preserving encryption for entry-level processors.eng.srt
|
38.8 KB
|
Adiantum length-preserving encryption for entry-level processors.mp4
|
13.5 MB
|
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.eng.srt
|
22.7 KB
|
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.mp4
|
26.2 MB
|
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.eng.srt
|
29.2 KB
|
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.mp4
|
15.1 MB
|
Clustering Related-Tweak Characteristics Application to MANTIS-6.eng.srt
|
42.0 KB
|
Clustering Related-Tweak Characteristics Application to MANTIS-6.mp4
|
34.4 MB
|
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.eng.srt
|
25.2 KB
|
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.mp4
|
11.8 MB
|
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.eng.srt
|
22.4 KB
|
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.mp4
|
15.0 MB
|
CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.eng.srt
|
28.4 KB
|
CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.mp4
|
19.9 MB
|
Cryptanalysis of AES-PRF and Its Dual.eng.srt
|
24.5 KB
|
Cryptanalysis of AES-PRF and Its Dual.mp4
|
13.6 MB
|
Cryptanalysis of Low-Data Instances of Full LowMCv2.eng.srt
|
29.1 KB
|
Cryptanalysis of Low-Data Instances of Full LowMCv2.mp4
|
13.9 MB
|
Cryptanalysis of Reduced round SKINNY Block Cipher.eng.srt
|
21.1 KB
|
Cryptanalysis of Reduced round SKINNY Block Cipher.mp4
|
22.2 MB
|
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.eng.srt
|
27.5 KB
|
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.mp4
|
18.3 MB
|
Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.eng.srt
|
45.9 KB
|
Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.mp4
|
27.0 MB
|
FSE 2019 Rump Session.eng.srt
|
104.8 KB
|
FSE 2019 Rump Session.mp4
|
74.9 MB
|
General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.eng.srt
|
34.3 KB
|
General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.mp4
|
17.8 MB
|
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.eng.srt
|
29.6 KB
|
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.mp4
|
28.0 MB
|
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.eng.srt
|
33.0 KB
|
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.mp4
|
15.7 MB
|
Key Assignment Scheme with Authenticated Encryption.eng.srt
|
31.2 KB
|
Key Assignment Scheme with Authenticated Encryption.mp4
|
24.3 MB
|
Key Prediction Security of Keyed Sponges.eng.srt
|
26.7 KB
|
Key Prediction Security of Keyed Sponges.mp4
|
18.8 MB
|
libInterMAC Beyond Confidentiality and Integrity in Practice.eng.srt
|
33.6 KB
|
libInterMAC Beyond Confidentiality and Integrity in Practice.mp4
|
17.0 MB
|
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.eng.srt
|
30.7 KB
|
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.mp4
|
29.8 MB
|
MDS Matrices with Lightweight Circuits.eng.srt
|
34.5 KB
|
MDS Matrices with Lightweight Circuits.mp4
|
24.9 MB
|
Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.eng.srt
|
35.3 KB
|
Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.mp4
|
22.8 MB
|
More Accurate Differential Properties of LED64 and Midori64.eng.srt
|
29.8 KB
|
More Accurate Differential Properties of LED64 and Midori64.mp4
|
31.9 MB
|
New Yoyo Tricks with AES-based Permutations.eng.srt
|
26.8 KB
|
New Yoyo Tricks with AES-based Permutations.mp4
|
18.4 MB
|
Nonlinear Approximations in Cryptanalysis Revisited.mp4
|
33.0 MB
|
On Invariant Attacks.eng.srt
|
92.7 KB
|
On Invariant Attacks.mp4
|
36.7 MB
|
On the Boomerang Uniformity of Cryptographic Sboxes.eng.srt
|
42.7 KB
|
On the Boomerang Uniformity of Cryptographic Sboxes.mp4
|
17.7 MB
|
Partitions in the S-Box of Streebog and Kuznyechik.eng.srt
|
46.1 KB
|
Partitions in the S-Box of Streebog and Kuznyechik.mp4
|
21.2 MB
|
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.mp4
|
21.4 MB
|
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.eng.srt
|
27.5 KB
|
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.mp4
|
15.7 MB
|
Separable Statistics and Multidimensional Linear Cryptanalysis.mp4
|
17.1 MB
|
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.eng.srt
|
31.2 KB
|
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.mp4
|
19.4 MB
|
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.eng.srt
|
40.8 KB
|
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.mp4
|
25.3 MB
|
SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.eng.srt
|
35.6 KB
|
SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.mp4
|
20.0 MB
|
The design of Xoodoo and Xoofff.eng.srt
|
30.3 KB
|
The design of Xoodoo and Xoofff.mp4
|
11.6 MB
|
Towards Low Energy Stream Ciphers.eng.srt
|
31.0 KB
|
Towards Low Energy Stream Ciphers.mp4
|
17.7 MB
|
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.eng.srt
|
28.8 KB
|
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.mp4
|
26.6 MB
|
/FSE 2022/
|
(Quantum) Collision Attacks on Reduced Simpira v2.mp4
|
8.3 MB
|
1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.eng.srt
|
49.9 KB
|
1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.mp4
|
18.0 MB
|
A - Formal Analysis of Boomerang Probabilities.eng.srt
|
21.1 KB
|
A - Formal Analysis of Boomerang Probabilities.mp4
|
5.7 MB
|
Accelerating the Search of Differential and Linear Characteristics with the SAT Method.mp4
|
18.7 MB
|
Algebraic Collision Attacks on Keccak.eng.srt
|
33.7 KB
|
Algebraic Collision Attacks on Keccak.mp4
|
17.6 MB
|
Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.eng.srt
|
53.4 KB
|
Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.mp4
|
27.5 MB
|
Atom A Stream Cipher with Double Key Filter.eng.srt
|
41.3 KB
|
Atom A Stream Cipher with Double Key Filter.mp4
|
16.3 MB
|
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.mp4
|
15.5 MB
|
Automatic Search of Cubes for Attacking Stream Ciphers.eng.srt
|
31.1 KB
|
Automatic Search of Cubes for Attacking Stream Ciphers.mp4
|
16.1 MB
|
Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.eng.srt
|
51.8 KB
|
Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.mp4
|
23.4 MB
|
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.eng.srt
|
36.8 KB
|
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.mp4
|
16.8 MB
|
Catching the Fastest Boomerangs Application to SKINNY.mp4
|
18.3 MB
|
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.eng.srt
|
28.7 KB
|
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.mp4
|
17.8 MB
|
Cryptanalysis (1).eng.srt
|
72.9 KB
|
Cryptanalysis (1).mp4
|
48.3 MB
|
Cryptanalysis of authenticated encryption schemes.eng.srt
|
92.5 KB
|
Cryptanalysis of authenticated encryption schemes.mp4
|
51.6 MB
|
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.eng.srt
|
25.4 KB
|
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.mp4
|
9.7 MB
|
Cryptanalysis.eng.srt
|
96.1 KB
|
Cryptanalysis.mp4
|
49.1 MB
|
CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.eng.srt
|
39.4 KB
|
CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.mp4
|
15.9 MB
|
Diving Deep into the Weak Keys of Round Reduced Ascon.eng.srt
|
50.1 KB
|
Diving Deep into the Weak Keys of Round Reduced Ascon.mp4
|
21.4 MB
|
Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.eng.srt
|
25.0 KB
|
Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.mp4
|
13.2 MB
|
Exploring Differential-Based Distinguishers and Forgeries for ASCON.eng.srt
|
29.1 KB
|
Exploring Differential-Based Distinguishers and Forgeries for ASCON.mp4
|
11.8 MB
|
Fake Near Collisions Attacks.eng.srt
|
39.7 KB
|
Fake Near Collisions Attacks.mp4
|
17.2 MB
|
Forking Tweakable Even-Mansour Ciphers.eng.srt
|
13.8 KB
|
Forking Tweakable Even-Mansour Ciphers.mp4
|
5.9 MB
|
FSE 2022 opening remarks - award papers.eng.srt
|
141.8 KB
|
FSE 2022 opening remarks - award papers.mp4
|
86.5 MB
|
FSE 2022 Rump Session.eng.srt
|
138.7 KB
|
FSE 2022 Rump Session.mp4
|
88.1 MB
|
Hash function cryptanalysis.eng.srt
|
90.6 KB
|
Hash function cryptanalysis.mp4
|
57.4 MB
|
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.eng.srt
|
29.2 KB
|
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.mp4
|
11.2 MB
|
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.eng.srt
|
26.1 KB
|
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.mp4
|
17.6 MB
|
Improved guess-and-determine and distinguishing attacks on SNOW-V.eng.srt
|
35.6 KB
|
Improved guess-and-determine and distinguishing attacks on SNOW-V.mp4
|
19.3 MB
|
Improved Preimage Attacks on 3-Round Keccak-224 256.mp4
|
14.0 MB
|
Improved Preimage Attacks on 4-Round Keccak-224 256.eng.srt
|
44.2 KB
|
Improved Preimage Attacks on 4-Round Keccak-224 256.mp4
|
24.1 MB
|
Improved Rectangle Attacks on SKINNY and CRAFT.eng.srt
|
40.3 KB
|
Improved Rectangle Attacks on SKINNY and CRAFT.mp4
|
14.0 MB
|
Improved Security Bound of (E D)WCDM.eng.srt
|
54.4 KB
|
Improved Security Bound of (E D)WCDM.mp4
|
23.6 MB
|
Increasing Precision of Division Property.mp4
|
21.4 MB
|
Influence of the Linear Layer on the Algebraic Degree in SP-Networks.eng.srt
|
42.6 KB
|
Influence of the Linear Layer on the Algebraic Degree in SP-Networks.mp4
|
18.0 MB
|
Invited talk by Christian Rechberger.eng.srt
|
121.4 KB
|
Invited talk by Christian Rechberger.mp4
|
55.8 MB
|
Invited talk by Orr Dunkelman.eng.srt
|
130.8 KB
|
Invited talk by Orr Dunkelman.mp4
|
55.7 MB
|
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.eng.srt
|
29.3 KB
|
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.mp4
|
20.0 MB
|
LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.eng.srt
|
31.5 KB
|
LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.mp4
|
16.8 MB
|
Maximums of the Additive Differential Probability of Exclusive-Or.eng.srt
|
42.4 KB
|
Maximums of the Additive Differential Probability of Exclusive-Or.mp4
|
11.5 MB
|
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.eng.srt
|
46.6 KB
|
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.mp4
|
21.2 MB
|
MOE Multiplication Operated Encryption with Trojan Resilience.eng.srt
|
42.5 KB
|
MOE Multiplication Operated Encryption with Trojan Resilience.mp4
|
23.6 MB
|
New designs and efficient implementations.eng.srt
|
79.7 KB
|
New designs and efficient implementations.mp4
|
51.7 MB
|
On Length Independent Security Bounds for the PMAC Family.eng.srt
|
35.5 KB
|
On Length Independent Security Bounds for the PMAC Family.mp4
|
12.0 MB
|
On the Relationships between Different Methods for Degree Evaluation.eng.srt
|
23.0 KB
|
On the Relationships between Different Methods for Degree Evaluation.mp4
|
10.9 MB
|
Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.eng.srt
|
26.9 KB
|
Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.mp4
|
12.6 MB
|
Permutation Based EDM An Inverse Free BBB Secure PRF.eng.srt
|
54.4 KB
|
Permutation Based EDM An Inverse Free BBB Secure PRF.mp4
|
19.9 MB
|
PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.mp4
|
11.2 MB
|
Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.eng.srt
|
42.4 KB
|
Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.mp4
|
16.9 MB
|
Provable security and attack models.eng.srt
|
118.2 KB
|
Provable security and attack models.mp4
|
59.3 MB
|
Provable Security of SP Networks with Partial Non-Linear Layers.eng.srt
|
33.2 KB
|
Provable Security of SP Networks with Partial Non-Linear Layers.mp4
|
14.8 MB
|
Provable security.eng.srt
|
103.7 KB
|
Provable security.mp4
|
57.7 MB
|
Provably Quantum-Secure Tweakable Block Ciphers.eng.srt
|
41.3 KB
|
Provably Quantum-Secure Tweakable Block Ciphers.mp4
|
17.6 MB
|
Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.eng.srt
|
40.9 KB
|
Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.mp4
|
16.6 MB
|
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.eng.srt
|
33.7 KB
|
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.mp4
|
18.4 MB
|
Quantum Period Finding is Compression Robust.eng.srt
|
20.2 KB
|
Quantum Period Finding is Compression Robust.mp4
|
6.9 MB
|
Resistance of SNOW-V against Fast Correlation Attacks.eng.srt
|
28.5 KB
|
Resistance of SNOW-V against Fast Correlation Attacks.mp4
|
15.9 MB
|
Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.eng.srt
|
26.8 KB
|
Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.mp4
|
13.9 MB
|
Security of COFB against Chosen Ciphertext Attacks.eng.srt
|
34.6 KB
|
Security of COFB against Chosen Ciphertext Attacks.mp4
|
12.1 MB
|
Statistical cryptanalysis of block ciphers.eng.srt
|
98.3 KB
|
Statistical cryptanalysis of block ciphers.mp4
|
51.2 MB
|
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.eng.srt
|
35.4 KB
|
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.mp4
|
14.6 MB
|
Stream ciphers.eng.srt
|
79.1 KB
|
Stream ciphers.mp4
|
50.1 MB
|
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.eng.srt
|
34.6 KB
|
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.mp4
|
19.2 MB
|
Tightness of the Suffix Keyed Sponge Bound.eng.srt
|
42.8 KB
|
Tightness of the Suffix Keyed Sponge Bound.mp4
|
15.8 MB
|
Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.eng.srt
|
34.4 KB
|
Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.mp4
|
18.7 MB
|
Towards Low-Latency Implementation of Linear Layers.eng.srt
|
28.2 KB
|
Towards Low-Latency Implementation of Linear Layers.mp4
|
14.7 MB
|
Weak Keys in Reduced AEGIS and Tiaoxin.eng.srt
|
28.1 KB
|
Weak Keys in Reduced AEGIS and Tiaoxin.mp4
|
14.3 MB
|
Weak Tweak-Keys for the CRAFT Block Cipher.eng.srt
|
30.9 KB
|
Weak Tweak-Keys for the CRAFT Block Cipher.mp4
|
13.9 MB
|
/FSE 2023/
|
Algebraic and Integral Attacks 1.eng.srt
|
69.8 KB
|
Algebraic and Integral Attacks 1.mp4
|
31.4 MB
|
Algebraic and Integral Attacks 2.eng.srt
|
59.4 KB
|
Algebraic and Integral Attacks 2.mp4
|
27.6 MB
|
Authenticated Encryption Cryptanalysis.eng.srt
|
80.4 KB
|
Authenticated Encryption Cryptanalysis.mp4
|
42.6 MB
|
Award paper session Hybrid code lifting.eng.srt
|
31.5 KB
|
Award paper session Hybrid code lifting.mp4
|
20.1 MB
|
Award paper session Mind your path.eng.srt
|
48.1 KB
|
Award paper session Mind your path.mp4
|
20.0 MB
|
Block Cipher Cryptanalysis.eng.srt
|
91.5 KB
|
Block Cipher Cryptanalysis.mp4
|
35.7 MB
|
Boomerang and Rectangle Attacks 1.eng.srt
|
48.9 KB
|
Boomerang and Rectangle Attacks 1.mp4
|
24.9 MB
|
Boomerang and Rectangle Attacks 2.eng.srt
|
73.8 KB
|
Boomerang and Rectangle Attacks 2.mp4
|
34.1 MB
|
Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.eng.srt
|
72.7 KB
|
Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.mp4
|
40.9 MB
|
Cryptanalysis of Draco.eng.srt
|
22.9 KB
|
Cryptanalysis of Draco.mp4
|
10.0 MB
|
Cryptographic Applications.eng.srt
|
70.0 KB
|
Cryptographic Applications.mp4
|
26.2 MB
|
Differential Trail Search and Bounds 1.eng.srt
|
54.9 KB
|
Differential Trail Search and Bounds 1.mp4
|
31.2 MB
|
Differential Trail Search and Bounds 2.eng.srt
|
60.7 KB
|
Differential Trail Search and Bounds 2.mp4
|
21.9 MB
|
FSE 2023 Closing Remarks.mp4
|
1.9 MB
|
FSE 2023 Invited talk by Yosuke Todo.eng.srt
|
93.2 KB
|
FSE 2023 Invited talk by Yosuke Todo.mp4
|
47.7 MB
|
FSE 2023 Opening Remarks.eng.srt
|
21.3 KB
|
FSE 2023 Opening Remarks.mp4
|
10.7 MB
|
FSE 2023 Rump Session.eng.srt
|
86.1 KB
|
FSE 2023 Rump Session.mp4
|
38.4 MB
|
Hash Function Cryptanalysis.eng.srt
|
77.7 KB
|
Hash Function Cryptanalysis.mp4
|
38.3 MB
|
Leakage and Faults.eng.srt
|
65.6 KB
|
Leakage and Faults.mp4
|
26.9 MB
|
Linear Layers.eng.srt
|
101.2 KB
|
Linear Layers.mp4
|
41.1 MB
|
MILP and Models.eng.srt
|
92.8 KB
|
MILP and Models.mp4
|
50.2 MB
|
New Constructions 1.eng.srt
|
73.9 KB
|
New Constructions 1.mp4
|
28.1 MB
|
New Constructions 2.eng.srt
|
51.0 KB
|
New Constructions 2.mp4
|
25.7 MB
|
Non Linear Layers.eng.srt
|
60.9 KB
|
Non Linear Layers.mp4
|
23.4 MB
|
Security Proofs.eng.srt
|
117.8 KB
|
Security Proofs.mp4
|
34.9 MB
|
Stream Ciphers and Cryptanalysis 1.eng.srt
|
85.5 KB
|
Stream Ciphers and Cryptanalysis 1.mp4
|
40.0 MB
|
Stream Ciphers and Cryptanalysis 2.eng.srt
|
90.5 KB
|
Stream Ciphers and Cryptanalysis 2.mp4
|
36.9 MB
|
/IACR Distinguished Lectures/
|
Differential Privacy and the People's Data.eng.srt
|
86.2 KB
|
Differential Privacy and the People's Data.mp4
|
50.9 MB
|
From Idea to Impact, the Crypto Story What's Next.eng.srt
|
134.4 KB
|
From Idea to Impact, the Crypto Story What's Next.mp4
|
109.5 MB
|
IACR Distinguished Lecture Caught in Between Theory and Practice.eng.srt
|
108.8 KB
|
IACR Distinguished Lecture Caught in Between Theory and Practice.mp4
|
14.3 MB
|
IACR Distinguished Lectures.m3u
|
0.3 KB
|
Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.srt
|
104.5 KB
|
Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4
|
53.7 MB
|
Phil Rogaway - IACR Distinguished Lecture 2015.eng.srt
|
114.9 KB
|
Phil Rogaway - IACR Distinguished Lecture 2015.mp4
|
95.9 MB
|
The future of cryptography.eng.srt
|
134.8 KB
|
The future of cryptography.mp4
|
38.0 MB
|
Tutorial on Homomorphic Encryption (part 1).mp4
|
70.5 MB
|
Tutorial on Homomorphic Encryption (part 2).mp4
|
95.5 MB
|
/PKC 2010/
|
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.mp4
|
21.6 MB
|
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.mp4
|
17.7 MB
|
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.mp4
|
24.5 MB
|
Confidential Signatures and Deterministic Signcryption.mp4
|
15.9 MB
|
Constant Size Ciphertexts in Threshold Attribute-Based Encryption.mp4
|
19.5 MB
|
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.mp4
|
20.8 MB
|
Duality in Lattice Based Cryptography.mp4
|
63.4 MB
|
Efficient Arithmetic on Hessian Curves.mp4
|
19.8 MB
|
Efficient Set Operations in the Presence of Malicious Adversaries.mp4
|
22.4 MB
|
Faster Pairing Computations on Curves with High-Degree Twists.mp4
|
26.3 MB
|
Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.mp4
|
23.7 MB
|
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.mp4
|
23.8 MB
|
Functional Encryption for Inner Product - Achieving Const.mp4
|
27.3 MB
|
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.mp4
|
26.4 MB
|
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.mp4
|
22.8 MB
|
More Constructions of Lossy and Correlation-Secure Trapdoor Functions.mp4
|
19.4 MB
|
On the Feasibility of Consistent Computations.mp4
|
22.7 MB
|
Preventing Pollution Attacks in Multi-source Network Coding.mp4
|
25.9 MB
|
Secure Network Coding over the Integers.mp4
|
30.0 MB
|
Security of Encryption Schemes in Weakened Random Oracle Models.mp4
|
21.9 MB
|
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.mp4
|
20.9 MB
|
Solving a 676-Bit Discrete Logarithm Problem in GF(36n).mp4
|
18.2 MB
|
Text Search Protocols with Simulation Based Security.mp4
|
21.9 MB
|
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.mp4
|
21.2 MB
|
/PKC 2020/
|
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.mp4
|
12.0 MB
|
A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.mp4
|
15.4 MB
|
Adaptive Simulation Security for Inner Product Functional Encryption.mp4
|
14.1 MB
|
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.mp4
|
12.6 MB
|
Bandwidth-Efficient Threshold EC-DSA.mp4
|
18.8 MB
|
Blazing Fast OT for Three-Round UC OT Extension.mp4
|
14.1 MB
|
Boosting Verifiable Computation on Encrypted Data.mp4
|
26.4 MB
|
Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.mp4
|
27.5 MB
|
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.mp4
|
15.8 MB
|
Constraining and Watermarking PRFs from Milder Assumptions.mp4
|
11.0 MB
|
Efficient Redactable Signature and Application to Anonymous Credentials.mp4
|
8.3 MB
|
Fast, Compact, and Expressive Attribute-Based Encryption.mp4
|
11.3 MB
|
Faster Cofactorization with ECM Using Mixed Representations.mp4
|
17.7 MB
|
Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.mp4
|
19.4 MB
|
Generic Authenticated Key Exchange in the Quantum Random Oracle Model.mp4
|
16.4 MB
|
Going Beyond Dual Execution MPC for Functions with Efficient Verification.mp4
|
14.1 MB
|
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.mp4
|
15.3 MB
|
Improved Classical Cryptanalysis of SIKE in Practice.mp4
|
15.2 MB
|
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.mp4
|
12.6 MB
|
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.mp4
|
6.4 MB
|
Linearly-Homomorphic Signatures and Scalable Mix-Nets.mp4
|
10.8 MB
|
Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.mp4
|
15.2 MB
|
Master-Key KDM-Secure IBE from Pairings.mp4
|
13.9 MB
|
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.mp4
|
8.8 MB
|
Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.mp4
|
19.6 MB
|
MPSign A Signature from Small-Secret Middle-Product Learning with Errors.mp4
|
9.5 MB
|
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.mp4
|
12.4 MB
|
On QA-NIZK in the BPK Model.mp4
|
20.4 MB
|
PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.mp4
|
12.6 MB
|
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.mp4
|
20.0 MB
|
Public-Key Puncturable Encryption Modular and Compact Constructions.mp4
|
14.1 MB
|
s-148 Welcome Functional Encryption and Identity Based Encryption.mp4
|
76.7 MB
|
s-154 Encryption Schemes and Secure Channels.mp4
|
67.5 MB
|
s-158 Invited Talk.mp4
|
53.1 MB
|
s-161 Proofs and Arguments.mp4
|
64.4 MB
|
s-167 Multiparty Protocols, Secure Computation and Related Primitives.mp4
|
52.0 MB
|
s-169 PKC Test of Time Award Ceremony.mp4
|
47.3 MB
|
s-170 Post Quantum Cryptography.mp4
|
42.2 MB
|
s-185 Cryptographic Primitives.mp4
|
54.8 MB
|
s-187 Lattice Based Cryptography.mp4
|
39.9 MB
|
s-189 Cryptanalysis and Concrete Security Closing Remarks.mp4
|
58.6 MB
|
Sublinear-Round Byzantine Agreement Under Corrupt Majority.mp4
|
15.2 MB
|
The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.mp4
|
7.3 MB
|
The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.mp4
|
11.3 MB
|
Threshold Ring Signatures New Definitions and Post-quantum Security.mp4
|
22.2 MB
|
Threshold Schemes from Isogeny Assumptions.mp4
|
40.3 MB
|
Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.mp4
|
13.2 MB
|
Topology-Hiding Computation for Networks with Unknown Delays.mp4
|
14.9 MB
|
Toward RSA-OAEP Without Random Oracles.mp4
|
14.4 MB
|
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.mp4
|
15.2 MB
|
Updateable Inner Product Argument with Logarithmic Verifier and Applications.mp4
|
29.9 MB
|
Verifiable Inner Product Encryption Scheme.mp4
|
16.0 MB
|
Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.mp4
|
18.2 MB
|
Witness Maps and Applications.mp4
|
20.1 MB
|
/PKC 2021/
|
A Geometric Approach to Homomorphic Secret Sharing.eng.srt
|
32.5 KB
|
A Geometric Approach to Homomorphic Secret Sharing.mp4
|
11.9 MB
|
Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.eng.srt
|
24.7 KB
|
Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.mp4
|
13.1 MB
|
An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag....mp4
|
15.3 MB
|
Analysis of Multivariate Encryption Schemes Application to Dob.eng.srt
|
41.2 KB
|
Analysis of Multivariate Encryption Schemes Application to Dob.mp4
|
15.4 MB
|
Banquet Short and Fast Signatures from AES.eng.srt
|
39.6 KB
|
Banquet Short and Fast Signatures from AES.mp4
|
13.3 MB
|
BETA Biometric-Enabled Threshold Authentication.eng.srt
|
53.8 KB
|
BETA Biometric-Enabled Threshold Authentication.mp4
|
17.7 MB
|
Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.eng.srt
|
43.0 KB
|
Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.mp4
|
13.8 MB
|
Bootstrapping fully homomorphic encryption over the integers in less - than one second.eng.srt
|
38.2 KB
|
Bootstrapping fully homomorphic encryption over the integers in less - than one second.mp4
|
14.6 MB
|
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.eng.srt
|
47.9 KB
|
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.mp4
|
20.4 MB
|
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.eng.srt
|
24.9 KB
|
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.mp4
|
13.3 MB
|
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.eng.srt
|
29.5 KB
|
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.mp4
|
16.7 MB
|
Exact Lattice Sampling from Non-Gaussian Distributions.eng.srt
|
44.0 KB
|
Exact Lattice Sampling from Non-Gaussian Distributions.mp4
|
19.3 MB
|
Flexible and Efficient Verifiable Computation on Encrypted Data.eng.srt
|
41.5 KB
|
Flexible and Efficient Verifiable Computation on Encrypted Data.mp4
|
16.5 MB
|
Generic Negation of Pair Encodings.eng.srt
|
45.7 KB
|
Generic Negation of Pair Encodings.mp4
|
12.7 MB
|
Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.eng.srt
|
34.2 KB
|
Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.mp4
|
15.7 MB
|
Group Signatures with User-Controlled and Sequential Linkability.eng.srt
|
38.4 KB
|
Group Signatures with User-Controlled and Sequential Linkability.mp4
|
18.4 MB
|
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.eng.srt
|
23.8 KB
|
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.mp4
|
8.1 MB
|
Improving Revocation for Group Signature with Redactable Signature.eng.srt
|
44.0 KB
|
Improving Revocation for Group Signature with Redactable Signature.mp4
|
13.1 MB
|
Isogeny-based key compression without pairings.eng.srt
|
43.7 KB
|
Isogeny-based key compression without pairings.mp4
|
19.7 MB
|
Masked Triples Amortizing Multiplication Triples across Conditionals.eng.srt
|
41.7 KB
|
Masked Triples Amortizing Multiplication Triples across Conditionals.mp4
|
12.8 MB
|
Master-Key KDM-Secure ABE via Predicate Encoding.eng.srt
|
23.9 KB
|
Master-Key KDM-Secure ABE via Predicate Encoding.mp4
|
8.9 MB
|
More Efficient Digital Signatures with Tight Multi-User Security.eng.srt
|
12.1 KB
|
More Efficient Digital Signatures with Tight Multi-User Security.mp4
|
16.8 MB
|
Multi-Client Functional Encryption for Separable Functions.eng.srt
|
36.6 KB
|
Multi-Client Functional Encryption for Separable Functions.mp4
|
8.6 MB
|
Multi-Party Threshold Private Set Intersection with Sublinear Communication.eng.srt
|
41.5 KB
|
Multi-Party Threshold Private Set Intersection with Sublinear Communication.mp4
|
18.8 MB
|
Multiparty Cardinality Testing for Threshold Private Set Intersection.eng.srt
|
23.3 KB
|
Multiparty Cardinality Testing for Threshold Private Set Intersection.mp4
|
9.1 MB
|
Multivariate Public Key Cryptosystem from Sidon Spaces.eng.srt
|
36.0 KB
|
Multivariate Public Key Cryptosystem from Sidon Spaces.mp4
|
12.4 MB
|
Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar....eng.srt
|
33.2 KB
|
Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar....mp4
|
18.5 MB
|
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.eng.srt
|
54.2 KB
|
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.mp4
|
14.7 MB
|
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.mp4
|
18.6 MB
|
On the CCA Compatibility of Public-Key Infrastructure.eng.srt
|
40.0 KB
|
On the CCA Compatibility of Public-Key Infrastructure.mp4
|
12.1 MB
|
On the Integer Polynomial Learning with Errors Problem.eng.srt
|
38.5 KB
|
On the Integer Polynomial Learning with Errors Problem.mp4
|
20.0 MB
|
On the Success Probability of Solving Unique SVP via BKZ.eng.srt
|
60.8 KB
|
On the Success Probability of Solving Unique SVP via BKZ.mp4
|
23.7 MB
|
Private Set Operations from Oblivious Switching.eng.srt
|
34.1 KB
|
Private Set Operations from Oblivious Switching.mp4
|
11.2 MB
|
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.eng.srt
|
20.7 KB
|
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.mp4
|
8.5 MB
|
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora....eng.srt
|
16.8 KB
|
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora....mp4
|
10.8 MB
|
Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S....eng.srt
|
35.9 KB
|
Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S....mp4
|
14.6 MB
|
Revisiting (R)CCA Security and Replay Protection.eng.srt
|
37.7 KB
|
Revisiting (R)CCA Security and Replay Protection.mp4
|
16.8 MB
|
Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.eng.srt
|
60.1 KB
|
Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.mp4
|
15.0 MB
|
s-1 Opening Remarks Post-Quantum Cryptography.eng.srt
|
109.6 KB
|
s-1 Opening Remarks Post-Quantum Cryptography.mp4
|
60.7 MB
|
s-4 Invited Talk I (Léo Ducas).eng.srt
|
109.2 KB
|
s-4 Invited Talk I (Léo Ducas).mp4
|
54.0 MB
|
s-6 Signatures.eng.srt
|
125.7 KB
|
s-6 Signatures.mp4
|
57.2 MB
|
s-7 Cryptographic Primitives I.eng.srt
|
106.2 KB
|
s-7 Cryptographic Primitives I.mp4
|
44.9 MB
|
s-10 Cryptographic Protocols and Secure Computation I.eng.srt
|
121.2 KB
|
s-10 Cryptographic Protocols and Secure Computation I.mp4
|
61.3 MB
|
s-12 Functional Encryption and Attributed-based Encryption.eng.srt
|
72.9 KB
|
s-12 Functional Encryption and Attributed-based Encryption.mp4
|
37.3 MB
|
s-14 Cryptographic Primitives II.eng.srt
|
122.1 KB
|
s-14 Cryptographic Primitives II.mp4
|
64.1 MB
|
s-16 Invited Talk II (Eike Kiltz).eng.srt
|
124.7 KB
|
s-16 Invited Talk II (Eike Kiltz).mp4
|
59.9 MB
|
s-18 Lattice-based Cryptography.eng.srt
|
106.2 KB
|
s-18 Lattice-based Cryptography.mp4
|
46.3 MB
|
s-20 Cryptographic Protocols and Secure Computation II.eng.srt
|
119.0 KB
|
s-20 Cryptographic Protocols and Secure Computation II.mp4
|
54.2 MB
|
s-22 Arguments and Proofs Closing Remarks.eng.srt
|
82.5 KB
|
s-22 Arguments and Proofs Closing Remarks.mp4
|
44.9 MB
|
s-84 PKC Test of Time Awards.eng.srt
|
28.3 KB
|
s-84 PKC Test of Time Awards.mp4
|
24.1 MB
|
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.eng.srt
|
33.6 KB
|
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.mp4
|
12.9 MB
|
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.eng.srt
|
34.8 KB
|
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.mp4
|
10.7 MB
|
Steel Composable Hardware-based Stateful and Randomised Functional Encryption.eng.srt
|
35.2 KB
|
Steel Composable Hardware-based Stateful and Randomised Functional Encryption.mp4
|
10.2 MB
|
Subversion-Resilient Public Key Encryption with Practical Watchdogs.eng.srt
|
23.6 KB
|
Subversion-Resilient Public Key Encryption with Practical Watchdogs.mp4
|
12.5 MB
|
The Convergence of Slide-type Reductions.eng.srt
|
38.4 KB
|
The Convergence of Slide-type Reductions.mp4
|
8.5 MB
|
Two-Party Adaptor Signatures From Identification Schemes.eng.srt
|
44.8 KB
|
Two-Party Adaptor Signatures From Identification Schemes.mp4
|
16.5 MB
|
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.eng.srt
|
45.6 KB
|
Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.mp4
|
13.7 MB
|
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.eng.srt
|
33.9 KB
|
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.mp4
|
12.9 MB
|
Universal Proxy Re-Encryption.eng.srt
|
32.3 KB
|
Universal Proxy Re-Encryption.mp4
|
13.4 MB
|
Updatable Signatures and Message Authentication Codes.eng.srt
|
45.1 KB
|
Updatable Signatures and Message Authentication Codes.mp4
|
13.5 MB
|
Verifiable Random Functions with Optimal Tightness.eng.srt
|
37.4 KB
|
Verifiable Random Functions with Optimal Tightness.mp4
|
11.0 MB
|
/PKC 2022/
|
A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.eng.srt
|
65.8 KB
|
A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.mp4
|
17.7 MB
|
A Note on the Post-Quantum Security of (Ring) Signatures.eng.srt
|
52.7 KB
|
A Note on the Post-Quantum Security of (Ring) Signatures.mp4
|
14.2 MB
|
CNF-FSS and its Applications.eng.srt
|
37.9 KB
|
CNF-FSS and its Applications.mp4
|
12.7 MB
|
Count Me In Extendablity for Threshold Ring Signatures.eng.srt
|
40.1 KB
|
Count Me In Extendablity for Threshold Ring Signatures.mp4
|
18.3 MB
|
Cryptanalysis.eng.srt
|
95.2 KB
|
Cryptanalysis.mp4
|
41.0 MB
|
Cryptographic Protocols - Tools.eng.srt
|
115.2 KB
|
Cryptographic Protocols - Tools.mp4
|
55.7 MB
|
ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.eng.srt
|
40.8 KB
|
ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.mp4
|
15.1 MB
|
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.eng.srt
|
34.2 KB
|
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.mp4
|
14.0 MB
|
Efficient Lattice-Based Inner-Product Functional Encryption.eng.srt
|
46.2 KB
|
Efficient Lattice-Based Inner-Product Functional Encryption.mp4
|
19.0 MB
|
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.eng.srt
|
59.1 KB
|
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.mp4
|
22.1 MB
|
Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.eng.srt
|
55.5 KB
|
Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.mp4
|
19.6 MB
|
Encryption.eng.srt
|
99.6 KB
|
Encryption.mp4
|
49.0 MB
|
Financially Backed Covert Security.eng.srt
|
45.6 KB
|
Financially Backed Covert Security.mp4
|
14.8 MB
|
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.eng.srt
|
23.3 KB
|
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.mp4
|
7.3 MB
|
Invited Talk with Dustin Moody.eng.srt
|
111.8 KB
|
Invited Talk with Dustin Moody.mp4
|
58.3 MB
|
Invited Talk with Yuliang Zheng.eng.srt
|
59.8 KB
|
Invited Talk with Yuliang Zheng.mp4
|
42.7 MB
|
KDM Security for the Fujisaki-Okamoto Transformations in the QROM.eng.srt
|
36.5 KB
|
KDM Security for the Fujisaki-Okamoto Transformations in the QROM.mp4
|
17.8 MB
|
Lattice-based Signatures with Tight Adaptive Corruptions and More.eng.srt
|
40.6 KB
|
Lattice-based Signatures with Tight Adaptive Corruptions and More.mp4
|
15.2 MB
|
Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.eng.srt
|
33.8 KB
|
Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.mp4
|
11.3 MB
|
Lifting Standard Model Reductions to Common Setup Assumptions.eng.srt
|
29.5 KB
|
Lifting Standard Model Reductions to Common Setup Assumptions.mp4
|
15.9 MB
|
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.eng.srt
|
37.2 KB
|
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.mp4
|
10.8 MB
|
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.eng.srt
|
38.8 KB
|
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.mp4
|
14.4 MB
|
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.eng.srt
|
51.4 KB
|
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.mp4
|
13.5 MB
|
Making Private Function Evaluation Safer, Faster, and Simpler.eng.srt
|
40.6 KB
|
Making Private Function Evaluation Safer, Faster, and Simpler.mp4
|
20.4 MB
|
Multitarget decryption failure attacks and their application to Saber and Kyber.eng.srt
|
72.2 KB
|
Multitarget decryption failure attacks and their application to Saber and Kyber.mp4
|
19.8 MB
|
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.eng.srt
|
29.6 KB
|
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.mp4
|
8.6 MB
|
On the Bottleneck Complexity of MPC with Correlated Randomness.eng.srt
|
44.9 KB
|
On the Bottleneck Complexity of MPC with Correlated Randomness.mp4
|
16.4 MB
|
On the Isogeny Problem with Torsion Point Information.eng.srt
|
35.8 KB
|
On the Isogeny Problem with Torsion Point Information.mp4
|
11.0 MB
|
On the security of OSIDH.eng.srt
|
32.5 KB
|
On the security of OSIDH.mp4
|
11.4 MB
|
Opening Remarks - MPC & Secret Sharing (session-2).eng.srt
|
111.4 KB
|
Opening Remarks - MPC & Secret Sharing (session-2).mp4
|
59.8 MB
|
Polynomial IOPs for Linear Algebra Relations.eng.srt
|
37.7 KB
|
Polynomial IOPs for Linear Algebra Relations.mp4
|
10.5 MB
|
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.eng.srt
|
29.7 KB
|
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.mp4
|
17.6 MB
|
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.eng.srt
|
30.4 KB
|
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.mp4
|
9.6 MB
|
Post-quantum Security of Plain OAEP Transform.eng.srt
|
38.9 KB
|
Post-quantum Security of Plain OAEP Transform.mp4
|
12.5 MB
|
Radical Isogenies on Montgomery Curves.eng.srt
|
28.9 KB
|
Radical Isogenies on Montgomery Curves.mp4
|
15.1 MB
|
Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.eng.srt
|
41.6 KB
|
Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.mp4
|
22.3 MB
|
Reusable Two-Round MPC from LPN.eng.srt
|
36.8 KB
|
Reusable Two-Round MPC from LPN.mp4
|
11.1 MB
|
Signatures - Closing Remarks (session-23).eng.srt
|
123.8 KB
|
Signatures - Closing Remarks (session-23).mp4
|
59.1 MB
|
SNARKs and NIZKs - Key Exchange (session-74).eng.srt
|
101.4 KB
|
SNARKs and NIZKs - Key Exchange (session-74).mp4
|
51.9 MB
|
Storing and Retrieving Secrets on a blockchain.eng.srt
|
31.8 KB
|
Storing and Retrieving Secrets on a blockchain.mp4
|
8.5 MB
|
Syndrome Decoding Estimator.eng.srt
|
46.3 KB
|
Syndrome Decoding Estimator.mp4
|
13.5 MB
|
Test of Time Award Ceremony.eng.srt
|
12.3 KB
|
Test of Time Award Ceremony.mp4
|
8.4 MB
|
The Direction of Updatable Encryption Does Matter.eng.srt
|
31.4 KB
|
The Direction of Updatable Encryption Does Matter.mp4
|
14.6 MB
|
Theory.eng.srt
|
44.0 KB
|
Theory.mp4
|
17.9 MB
|
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.eng.srt
|
47.7 KB
|
Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.mp4
|
13.1 MB
|
Towards a Simpler Lattice Gadget Toolkit.eng.srt
|
26.7 KB
|
Towards a Simpler Lattice Gadget Toolkit.mp4
|
12.7 MB
|
Traceable PRFs Full Collusion Resistance and Active Security.eng.srt
|
41.9 KB
|
Traceable PRFs Full Collusion Resistance and Active Security.mp4
|
15.0 MB
|
Two-Round Oblivious Linear Evaluation from Learning with Errors.eng.srt
|
22.3 KB
|
Two-Round Oblivious Linear Evaluation from Learning with Errors.mp4
|
9.7 MB
|
/PKC 2023/
|
Invited Talk by Chris Peikert.eng.srt
|
115.8 KB
|
Invited Talk by Chris Peikert.mp4
|
40.4 MB
|
Opening Remarks.eng.srt
|
8.2 KB
|
Opening Remarks.mp4
|
5.0 MB
|
Session on Attacks.eng.srt
|
104.6 KB
|
Session on Attacks.mp4
|
36.4 MB
|
Session on Crypto for Crypto.eng.srt
|
180.1 KB
|
Session on Crypto for Crypto.mp4
|
56.5 MB
|
Session on Homomorphic Cryptography and Other Topics.eng.srt
|
115.2 KB
|
Session on Homomorphic Cryptography and Other Topics.mp4
|
42.5 MB
|
Session on Isogenies.eng.srt
|
112.3 KB
|
Session on Isogenies.mp4
|
39.0 MB
|
Session on Key Exchange and Messaging.eng.srt
|
125.0 KB
|
Session on Key Exchange and Messaging.mp4
|
44.3 MB
|
Session on Pairings.eng.srt
|
96.6 KB
|
Session on Pairings.mp4
|
34.9 MB
|
Session on Post Quantum Cryptography.eng.srt
|
166.8 KB
|
Session on Post Quantum Cryptography.mp4
|
63.3 MB
|
Session on Signatures.eng.srt
|
139.8 KB
|
Session on Signatures.mp4
|
50.0 MB
|
Test of time and best paper awards.eng.srt
|
11.6 KB
|
Test of time and best paper awards.mp4
|
7.7 MB
|
/.../Real World Crypto 2017/
|
Anja Lehmann.mp4
|
29.1 MB
|
Anja Lehmann.srt
|
66.8 KB
|
Aurelie Phesso.mp4
|
21.1 MB
|
Aurelie Phesso.srt
|
25.1 KB
|
Ben Kreuter.mp4
|
33.7 MB
|
Ben Kreuter.srt
|
72.5 KB
|
Christian Cachin.mp4
|
33.1 MB
|
Cristina Onete.mp4
|
20.6 MB
|
Cristina Onete.srt
|
38.0 KB
|
Daniel Franke.mp4
|
27.3 MB
|
Daniel Franke.srt
|
52.4 KB
|
David Cash.mp4
|
9.4 MB
|
David McGrew.mp4
|
21.8 MB
|
David McGrew.srt
|
55.4 KB
|
Elaine Shi.mp4
|
29.3 MB
|
Elaine Shi.srt
|
69.8 KB
|
Eva Sarafianou.mp4
|
13.1 MB
|
Eva Sarafianou.srt
|
23.8 KB
|
Evan Jeffrey.mp4
|
38.2 MB
|
Evan Jeffrey.srt
|
67.0 KB
|
Felix Gunther.mp4
|
23.3 MB
|
Felix Gunther.srt
|
38.2 KB
|
Filippo Valsorda and George Tankersley.mp4
|
27.3 MB
|
Filippo Valsorda and George Tankersley.srt
|
40.0 KB
|
Helena Handschuh.mp4
|
33.2 MB
|
Helena Handschuh.srt
|
68.7 KB
|
Hugo Krawczyk.mp4
|
35.2 MB
|
Hugo Krawczyk.srt
|
59.3 KB
|
Jean Camp.mp4
|
28.5 MB
|
Jean Camp.srt
|
41.4 KB
|
Jeremiah Blocki.mp4
|
39.4 MB
|
Jeremiah Blocki.srt
|
67.3 KB
|
Jon Millican.mp4
|
31.7 MB
|
Jon Millican.srt
|
57.8 KB
|
Joppe Bos.mp4
|
37.8 MB
|
Joppe Bos.srt
|
61.6 KB
|
Laurent Simon.mp4
|
19.0 MB
|
Laurent Simon.srt
|
37.9 KB
|
Leonid Reyzin.mp4
|
20.2 MB
|
Leonid Reyzin.srt
|
49.8 KB
|
Luke Garratt.mp4
|
18.9 MB
|
Luke Garratt.srt
|
36.8 KB
|
Michael Naehrig.mp4
|
21.7 MB
|
Michael Naehrig.srt
|
47.7 KB
|
Mike Hamburg.mp4
|
28.7 MB
|
Mike Hamburg.srt
|
53.9 KB
|
Mitch Stoltz.mp4
|
26.4 MB
|
Mitch Stoltz.srt
|
56.8 KB
|
Moti Yung.mp4
|
27.6 MB
|
Moti Yung.srt
|
45.3 KB
|
Olivier Levillain.mp4
|
16.0 MB
|
Olivier Levillain.srt
|
28.4 KB
|
Patrick Longa.mp4
|
30.5 MB
|
Patrick Longa.srt
|
62.8 KB
|
Paul Grubbs.mp4
|
31.7 MB
|
Paul Grubbs.srt
|
55.4 KB
|
Pedro Moreno Sanchez.mp4
|
22.9 MB
|
Quan Nguyen.mp4
|
12.5 MB
|
Quan Nguyen.srt
|
21.9 KB
|
Raluca Ada Popa.mp4
|
35.6 MB
|
Raluca Ada Popa.srt
|
67.7 KB
|
Rene Peralta.mp4
|
23.9 MB
|
Rene Peralta.srt
|
29.3 KB
|
Rich Saltz.mp4
|
29.7 MB
|
Rich Saltz.srt
|
54.6 KB
|
Sharon Goldberg.mp4
|
34.2 MB
|
Sharon Goldberg.srt
|
76.2 KB
|
Stefano Tessaro.mp4
|
28.8 MB
|
Stefano Tessaro.srt
|
71.8 KB
|
Tancrede Lepoint.mp4
|
45.8 MB
|
Tancrede Lepoint.srt
|
67.1 KB
|
Thai Duong.mp4
|
34.2 MB
|
Thai Duong.srt
|
41.7 KB
|
Trevor Perrin.mp4
|
29.5 MB
|
Trevor Perrin.srt
|
72.2 KB
|
Valeria Nikolaenko.mp4
|
29.9 MB
|
Valeria Nikolaenko.srt
|
68.3 KB
|
Yehuda Lindell.mp4
|
21.8 MB
|
Yehuda Lindell.srt
|
40.1 KB
|
/.../Real World Crypto 2018/
|
A faulty PRNG in a voting system - Kristian Gjosteen.mp4
|
23.4 MB
|
Achieving high availability in the internal Google key management system KMS - Anand Kanagala.mp4
|
29.0 MB
|
An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).mp4
|
15.5 MB
|
An attack on the FF3 format preserving encryption - F. Betul Durak.mp4
|
28.9 MB
|
AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).mp4
|
13.2 MB
|
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.mp4
|
27.2 MB
|
Building and deploying encrypted search systems - Seny Kamara.mp4
|
39.5 MB
|
Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).mp4
|
26.0 MB
|
Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.mp4
|
23.1 MB
|
Finding collisions for SHA 1 - Pierre Karpman.mp4
|
30.6 MB
|
Geo manager - Nick Sullivan (Cloudflare).mp4
|
33.8 MB
|
HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).mp4
|
30.4 MB
|
How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.mp4
|
25.2 MB
|
InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.mp4
|
22.2 MB
|
Is Certificate Transparency usable - Emily Stark (Google).mp4
|
38.8 MB
|
Levchin Prize - Award ceremony.mp4
|
26.9 MB
|
Lightning talks - Short talks by the participants.mp4
|
47.0 MB
|
Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).mp4
|
33.1 MB
|
Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.mp4
|
7.3 MB
|
On the end to end security of group chats - Paul Rösler (U. Bochum).mp4
|
20.9 MB
|
Post quantum signatures - Melissa Chase (Microsoft Research).mp4
|
31.4 MB
|
Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).mp4
|
32.6 MB
|
Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.mp4
|
7.2 MB
|
Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).mp4
|
22.5 MB
|
Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).mp4
|
26.1 MB
|
Secrets at Scale - Manish Mehta (Netflix).mp4
|
25.4 MB
|
Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.mp4
|
33.4 MB
|
Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).mp4
|
29.5 MB
|
Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).mp4
|
18.0 MB
|
The Noise protocol framework - - Trevor Perrin.mp4
|
30.8 MB
|
The problem of private identification protocols - Ruxandra F. Olimid (NTNU).mp4
|
14.4 MB
|
TLS ecosystem woes - David Benjamin (Google).mp4
|
41.0 MB
|
UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.mp4
|
26.0 MB
|
Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.mp4
|
28.0 MB
|
Verificatum - Douglas Wikstrom (KTH).mp4
|
36.0 MB
|
Welcome - RWC steering committee.mp4
|
16.4 MB
|
ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).mp4
|
26.2 MB
|
Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.mp4
|
21.4 MB
|
/.../Real World Crypto 2019/
|
Day 1 - Session 1 - Morning - part 1.eng.srt
|
182.0 KB
|
Day 1 - Session 1 - Morning - part 1.mp4
|
157.6 MB
|
Day 1 - Session 1 - Morning - part 2.eng.srt
|
145.0 KB
|
Day 1 - Session 1 - Morning - part 2.mp4
|
157.8 MB
|
Day 1 - Session 2 - Afternoon.eng.srt
|
316.0 KB
|
Day 1 - Session 2 - Afternoon.mp4
|
174.3 MB
|
Day 2 - Session 1 - Morning.eng.srt
|
355.7 KB
|
Day 2 - Session 1 - Morning.mp4
|
390.3 MB
|
Day 2 - Session 2 - Afternoon - Part 1.eng.srt
|
106.2 KB
|
Day 2 - Session 2 - Afternoon - Part 1.mp4
|
117.2 MB
|
Day 2 - Session 2 - Afternoon - Part 2.eng.srt
|
49.9 KB
|
Day 2 - Session 2 - Afternoon - Part 2.mp4
|
49.9 MB
|
Day 2 - Session 2 - Afternoon - Part 3.eng.srt
|
174.1 KB
|
Day 2 - Session 2 - Afternoon - Part 3.mp4
|
161.9 MB
|
Day 3 - Session 1 - Morning - Part 1.eng.srt
|
184.0 KB
|
Day 3 - Session 1 - Morning - Part 1.mp4
|
159.3 MB
|
Day 3 - Session 1 - Morning Part 2.eng.srt
|
158.8 KB
|
Day 3 - Session 1 - Morning Part 2.mp4
|
146.2 MB
|
Day 3 - Session 2 - Afternoon.eng.srt
|
240.4 KB
|
Day 3 - Session 2 - Afternoon.mp4
|
303.6 MB
|
/.../Real World Crypto 2020/
|
Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.mp4
|
83.3 MB
|
Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.mp4
|
95.3 MB
|
Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.mp4
|
87.0 MB
|
Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.mp4
|
103.4 MB
|
MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.mp4
|
77.8 MB
|
Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.mp4
|
40.8 MB
|
Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.mp4
|
28.3 MB
|
Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.mp4
|
130.0 MB
|
Real World Crypto 2020 Program.html
|
53.9 KB
|
Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.mp4
|
94.2 MB
|
Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.mp4
|
119.5 MB
|
The Evolving Crypto War - Jennifer Granick.mp4
|
94.8 MB
|
TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS .mp4
|
80.9 MB
|
Welcome.mp4
|
8.9 MB
|
Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.mp4
|
83.6 MB
|
/.../Real World Crypto 2020 Program_files/
|
bootstrap.css
|
131.2 KB
|
bootstrap.js
|
37.0 KB
|
css.css
|
4.9 KB
|
handlebars.js
|
75.5 KB
|
iacr-logo.png
|
16.8 KB
|
jasny-bootstrap.css
|
16.9 KB
|
jasny-bootstrap.js
|
30.9 KB
|
jquery-3.js
|
86.7 KB
|
main.css
|
5.1 KB
|
menus.js
|
0.9 KB
|
navmenu.css
|
0.7 KB
|
navTitleFade.js
|
0.2 KB
|
presentation.svg
|
0.4 KB
|
program.js
|
1.7 KB
|
theme.css
|
1.1 KB
|
tooltips.js
|
0.1 KB
|
/.../Real World Crypto 2021/
|
Anonymity - Closing Remarks.eng.srt
|
99.7 KB
|
Anonymity - Closing Remarks.mp4
|
38.8 MB
|
Contact Tracing.eng.srt
|
81.8 KB
|
Contact Tracing.mp4
|
40.7 MB
|
Crypto for the Cloud.eng.srt
|
81.5 KB
|
Crypto for the Cloud.mp4
|
38.7 MB
|
Cryptocurrency.eng.srt
|
102.2 KB
|
Cryptocurrency.mp4
|
44.0 MB
|
Formal Analysis.eng.srt
|
72.9 KB
|
Formal Analysis.mp4
|
32.0 MB
|
From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.eng.srt
|
82.0 KB
|
From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.mp4
|
31.7 MB
|
Group Messaging.eng.srt
|
92.9 KB
|
Group Messaging.mp4
|
40.1 MB
|
Hardware.eng.srt
|
117.4 KB
|
Hardware.mp4
|
62.7 MB
|
Humans, Policy, and Crypto.eng.srt
|
68.2 KB
|
Humans, Policy, and Crypto.mp4
|
28.1 MB
|
ignatures.eng.srt
|
92.2 KB
|
ignatures.mp4
|
36.5 MB
|
Invited talk by Anna Lysyanskaya.eng.srt
|
65.8 KB
|
Invited talk by Anna Lysyanskaya.mp4
|
26.1 MB
|
Invited talk by Carmela Troncoso.eng.srt
|
70.7 KB
|
Invited talk by Carmela Troncoso.mp4
|
38.5 MB
|
Invited talk by Dustin Moody - Post-quantum Cryptography.eng.srt
|
152.6 KB
|
Invited talk by Dustin Moody - Post-quantum Cryptography.mp4
|
81.6 MB
|
Invited talk by Eli Ben-Sasson.eng.srt
|
70.1 KB
|
Invited talk by Eli Ben-Sasson.mp4
|
37.9 MB
|
Invited talk by Luca De Feo.eng.srt
|
64.7 KB
|
Invited talk by Luca De Feo.mp4
|
40.3 MB
|
Invited talk by Vanessa Teague.eng.srt
|
52.0 KB
|
Invited talk by Vanessa Teague.mp4
|
24.1 MB
|
Levchin Award Ceremony.eng.srt
|
49.3 KB
|
Levchin Award Ceremony.mp4
|
27.9 MB
|
Multiparty Computation.eng.srt
|
83.7 KB
|
Multiparty Computation.mp4
|
35.9 MB
|
Opening Remarks for RWC 2021 - Secure Channels.eng.srt
|
139.2 KB
|
Opening Remarks for RWC 2021 - Secure Channels.mp4
|
66.1 MB
|
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.eng.srt
|
27.9 KB
|
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.mp4
|
26.9 MB
|
RWC 2021 Lightning talks.eng.srt
|
38.0 KB
|
RWC 2021 Lightning talks.mp4
|
29.8 MB
|
/.../Real World Crypto 2022/
|
Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.eng.srt
|
61.1 KB
|
Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.mp4
|
53.0 MB
|
Attacks Cryptography in the Ads Ecosystem II discussion (see description).eng.srt
|
250.3 KB
|
Attacks Cryptography in the Ads Ecosystem II discussion (see description).mp4
|
131.2 MB
|
Cryptographic Attacks on Privacy.eng.srt
|
151.3 KB
|
Cryptographic Attacks on Privacy.mp4
|
77.9 MB
|
Levchin Award Ceremony.eng.srt
|
33.2 KB
|
Levchin Award Ceremony.mp4
|
24.6 MB
|
Privacy.eng.srt
|
140.6 KB
|
Privacy.mp4
|
51.0 MB
|
Secure Messaging.eng.srt
|
162.5 KB
|
Secure Messaging.mp4
|
76.1 MB
|
session-5 Symmetric Cryptography.eng.srt
|
86.0 KB
|
session-5 Symmetric Cryptography.mp4
|
49.1 MB
|
TLS.eng.srt
|
114.9 KB
|
TLS.mp4
|
48.8 MB
|
Useful Primitives Cryptography in the Ads Ecosystem I Lightning Rounds.eng.srt
|
209.2 KB
|
Useful Primitives Cryptography in the Ads Ecosystem I Lightning Rounds.mp4
|
109.1 MB
|
Welcome to RWC 2022 Side-Channel Attacks.eng.srt
|
147.2 KB
|
Welcome to RWC 2022 Side-Channel Attacks.mp4
|
77.8 MB
|
Zero Knowledge and Forward Secrecy RWC 2022 Closing Remarks.eng.srt
|
139.5 KB
|
Zero Knowledge and Forward Secrecy RWC 2022 Closing Remarks.mp4
|
74.5 MB
|
/.../Real World Crypto 2023/
|
2023 Levchin Prize.eng.srt
|
37.4 KB
|
2023 Levchin Prize.mp4
|
21.9 MB
|
Advanced Encryption.eng.srt
|
110.9 KB
|
Advanced Encryption.mp4
|
46.2 MB
|
Building and Breaking Secure Systems.eng.srt
|
147.3 KB
|
Building and Breaking Secure Systems.mp4
|
46.7 MB
|
Crypto for people.eng.srt
|
132.4 KB
|
Crypto for people.mp4
|
49.5 MB
|
FHE and MPC.eng.srt
|
139.8 KB
|
FHE and MPC.mp4
|
51.3 MB
|
Lightning talks.eng.srt
|
45.0 KB
|
Lightning talks.mp4
|
25.7 MB
|
Messaging and Encryption.eng.srt
|
215.6 KB
|
Messaging and Encryption.mp4
|
75.0 MB
|
Network Security and Key Exchange.eng.srt
|
149.9 KB
|
Network Security and Key Exchange.mp4
|
53.4 MB
|
Opening remarks.eng.srt
|
16.5 KB
|
Opening remarks.mp4
|
8.7 MB
|
PQC Protocols and Agility.eng.srt
|
137.3 KB
|
PQC Protocols and Agility.mp4
|
51.1 MB
|
PQC.eng.srt
|
120.1 KB
|
PQC.mp4
|
48.4 MB
|
Privacy and ZKP.eng.srt
|
180.7 KB
|
Privacy and ZKP.mp4
|
70.3 MB
|
RWC 2023 Closing Remarks.eng.srt
|
11.2 KB
|
RWC 2023 Closing Remarks.mp4
|
6.6 MB
|
Secure Implementations.eng.srt
|
124.9 KB
|
Secure Implementations.mp4
|
48.5 MB
|
Side Channels and Backdoors.eng.srt
|
124.8 KB
|
Side Channels and Backdoors.mp4
|
47.9 MB
|
Threshold Cryptography.eng.srt
|
170.0 KB
|
Threshold Cryptography.mp4
|
58.6 MB
|
Updates on Standardization.eng.srt
|
42.8 KB
|
Updates on Standardization.mp4
|
20.5 MB
|
/TCC 2021/
|
Acyclicity Programming for Sigma-Protocols.eng.srt
|
42.2 KB
|
Acyclicity Programming for Sigma-Protocols.mp4
|
11.9 MB
|
Adaptive Security of Multi-Party Protocols, Revisited.eng.srt
|
32.1 KB
|
Adaptive Security of Multi-Party Protocols, Revisited.mp4
|
11.4 MB
|
Amortizing Rate-1 OT and Applications to PIR and PSI.eng.srt
|
39.0 KB
|
Amortizing Rate-1 OT and Applications to PIR and PSI.mp4
|
14.6 MB
|
BKW Meets Fourier New Algorithms for LPN with Sparse Parities.eng.srt
|
36.5 KB
|
BKW Meets Fourier New Algorithms for LPN with Sparse Parities.mp4
|
16.3 MB
|
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.eng.srt
|
48.3 KB
|
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.mp4
|
17.7 MB
|
Blockchains Enable Non-Interactive MPC.eng.srt
|
40.3 KB
|
Blockchains Enable Non-Interactive MPC.mp4
|
13.6 MB
|
Classical Binding for Quantum Commitments.eng.srt
|
32.2 KB
|
Classical Binding for Quantum Commitments.mp4
|
12.1 MB
|
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.eng.srt
|
49.5 KB
|
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.mp4
|
19.7 MB
|
Concurrent Composition of Differential Privacy.eng.srt
|
43.9 KB
|
Concurrent Composition of Differential Privacy.mp4
|
19.9 MB
|
Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.eng.srt
|
32.6 KB
|
Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.mp4
|
11.5 MB
|
Covert Learning How to Learn with an Untrusted Intermediary.eng.srt
|
76.8 KB
|
Covert Learning How to Learn with an Untrusted Intermediary.mp4
|
23.9 MB
|
Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.eng.srt
|
35.1 KB
|
Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.mp4
|
13.2 MB
|
Direct Product Hardness Amplification.eng.srt
|
33.4 KB
|
Direct Product Hardness Amplification.mp4
|
12.4 MB
|
Disappearing Cryptography in the Bounded Storage Model.eng.srt
|
66.3 KB
|
Disappearing Cryptography in the Bounded Storage Model.mp4
|
20.9 MB
|
Distributed Merkle's Puzzles.eng.srt
|
28.6 KB
|
Distributed Merkle's Puzzles.mp4
|
13.3 MB
|
Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.eng.srt
|
81.6 KB
|
Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.mp4
|
25.4 MB
|
Efficient Perfectly Secure Computation with Optimal Resilience.eng.srt
|
49.0 KB
|
Efficient Perfectly Secure Computation with Optimal Resilience.mp4
|
23.7 MB
|
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.eng.srt
|
35.5 KB
|
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.mp4
|
18.9 MB
|
Forward Secret Encrypted RAM Lower Bounds and Applications.eng.srt
|
66.8 KB
|
Forward Secret Encrypted RAM Lower Bounds and Applications.mp4
|
23.1 MB
|
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.eng.srt
|
74.5 KB
|
Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.mp4
|
27.3 MB
|
Generalized Proofs of Knowledge with Fully Dynamic Setup.eng.srt
|
55.3 KB
|
Generalized Proofs of Knowledge with Fully Dynamic Setup.mp4
|
29.9 MB
|
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.eng.srt
|
55.0 KB
|
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.mp4
|
22.1 MB
|
Grafting Key Trees Efficient Key Management for Overlapping Groups.eng.srt
|
65.0 KB
|
Grafting Key Trees Efficient Key Management for Overlapping Groups.mp4
|
21.5 MB
|
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.eng.srt
|
92.0 KB
|
Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.mp4
|
30.6 MB
|
Laconic Private Set Intersection and Applications.eng.srt
|
29.2 KB
|
Laconic Private Set Intersection and Applications.mp4
|
12.3 MB
|
Multi-Party Functional Encryption.eng.srt
|
105.1 KB
|
Multi-Party Functional Encryption.mp4
|
35.5 MB
|
Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.eng.srt
|
29.4 KB
|
Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.mp4
|
13.5 MB
|
Non-Malleable Time-Lock Puzzles and Applications.eng.srt
|
62.6 KB
|
Non-Malleable Time-Lock Puzzles and Applications.mp4
|
24.5 MB
|
Non-Malleable Vector Commitments via Local Equivocability.eng.srt
|
45.5 KB
|
Non-Malleable Vector Commitments via Local Equivocability.mp4
|
15.7 MB
|
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.eng.srt
|
53.6 KB
|
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.mp4
|
16.4 MB
|
On Actively-Secure Elementary MPC Reductions.eng.srt
|
43.2 KB
|
On Actively-Secure Elementary MPC Reductions.mp4
|
18.6 MB
|
On Communication Models and Best-Achievable Security in Two-Round MPC.eng.srt
|
38.5 KB
|
On Communication Models and Best-Achievable Security in Two-Round MPC.mp4
|
17.2 MB
|
On Communication-Efficient Asynchronous MPC with Adaptive Security.eng.srt
|
29.3 KB
|
On Communication-Efficient Asynchronous MPC with Adaptive Security.mp4
|
13.1 MB
|
On Derandomizing Yao’s Weak-to-Strong OWF Construction.eng.srt
|
73.4 KB
|
On Derandomizing Yao’s Weak-to-Strong OWF Construction.mp4
|
35.7 MB
|
On expected polynomial runtime in cryptography.eng.srt
|
47.9 KB
|
On expected polynomial runtime in cryptography.mp4
|
15.9 MB
|
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.eng.srt
|
51.9 KB
|
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.mp4
|
17.3 MB
|
On the Impossibility of Purely Algebraic Signatures.eng.srt
|
52.1 KB
|
On the Impossibility of Purely Algebraic Signatures.mp4
|
16.9 MB
|
On Treewidth, Separators and Yao’s Garbling.eng.srt
|
54.1 KB
|
On Treewidth, Separators and Yao’s Garbling.mp4
|
19.9 MB
|
Policy-Compliant Signatures.eng.srt
|
69.5 KB
|
Policy-Compliant Signatures.mp4
|
13.5 MB
|
Polynomial-time targeted attacks on coin-tossing for any number of corruptions.eng.srt
|
41.1 KB
|
Polynomial-time targeted attacks on coin-tossing for any number of corruptions.mp4
|
18.8 MB
|
Quantum Key-length Extension.eng.srt
|
52.2 KB
|
Quantum Key-length Extension.mp4
|
20.5 MB
|
Random-Index PIR and Applications.eng.srt
|
71.0 KB
|
Random-Index PIR and Applications.mp4
|
26.8 MB
|
Rate-1 Quantum Fully Homomorphic Encryption.eng.srt
|
44.9 KB
|
Rate-1 Quantum Fully Homomorphic Encryption.mp4
|
14.6 MB
|
Relationships between quantum IND-CPA notions.eng.srt
|
28.3 KB
|
Relationships between quantum IND-CPA notions.mp4
|
10.8 MB
|
Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.eng.srt
|
41.2 KB
|
Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.mp4
|
21.9 MB
|
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.eng.srt
|
57.6 KB
|
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.mp4
|
16.7 MB
|
Secure Quantum Computation with Classical Communication.eng.srt
|
84.8 KB
|
Secure Quantum Computation with Classical Communication.mp4
|
26.4 MB
|
Secure Software Leasing from Standard Assumptions.eng.srt
|
35.6 KB
|
Secure Software Leasing from Standard Assumptions.mp4
|
14.9 MB
|
Secure Software Leasing Without Assumptions.eng.srt
|
48.0 KB
|
Secure Software Leasing Without Assumptions.mp4
|
17.1 MB
|
session-1 Welcome - Foundations I.eng.srt
|
72.0 KB
|
session-1 Welcome - Foundations I.mp4
|
50.9 MB
|
session-4 ABE, FE, Obfuscation and Non Traditional Models.eng.srt
|
132.6 KB
|
session-4 ABE, FE, Obfuscation and Non Traditional Models.mp4
|
54.9 MB
|
session-7 Invited talk by Abhishek Jain.eng.srt
|
135.4 KB
|
session-7 Invited talk by Abhishek Jain.mp4
|
50.1 MB
|
session-9 Zero Knowledge and Proof Systems.eng.srt
|
80.1 KB
|
session-9 Zero Knowledge and Proof Systems.mp4
|
36.3 MB
|
session-12 Multi-party Computation II.eng.srt
|
97.2 KB
|
session-12 Multi-party Computation II.mp4
|
40.7 MB
|
session-14 PIR, Encrypted RAM, Commitments.eng.srt
|
105.3 KB
|
session-14 PIR, Encrypted RAM, Commitments.mp4
|
46.9 MB
|
session-20 Zero Knowledge, OT, Key Management.eng.srt
|
102.1 KB
|
session-20 Zero Knowledge, OT, Key Management.mp4
|
44.9 MB
|
session-22 Routing, Signatures, Commitments, Timelock.eng.srt
|
88.0 KB
|
session-22 Routing, Signatures, Commitments, Timelock.mp4
|
37.0 MB
|
session-98 Quantum I.eng.srt
|
54.8 KB
|
session-98 Quantum I.mp4
|
28.3 MB
|
session-109 Multi-party Computation I.eng.srt
|
124.3 KB
|
session-109 Multi-party Computation I.mp4
|
54.0 MB
|
session-111 Quantum II.eng.srt
|
96.8 KB
|
session-111 Quantum II.mp4
|
44.8 MB
|
session-113 Foundations II.eng.srt
|
108.8 KB
|
session-113 Foundations II.mp4
|
54.9 MB
|
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.eng.srt
|
54.1 KB
|
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.mp4
|
18.4 MB
|
Simple Constructions from (Almost) Regular One-Way Functions.mp4
|
11.3 MB
|
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.eng.srt
|
42.6 KB
|
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.mp4
|
13.6 MB
|
Statistical ZAPs from Group-Based Assumptions.mp4
|
18.8 MB
|
Succinct LWE Sampling, Random Polynomials, and Obfuscation.eng.srt
|
31.3 KB
|
Succinct LWE Sampling, Random Polynomials, and Obfuscation.mp4
|
10.9 MB
|
The Cost of Adaptivity in Security Games on Graphs.mp4
|
17.8 MB
|
The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.eng.srt
|
22.2 KB
|
The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.mp4
|
10.0 MB
|
The Round Complexity of Quantum Zero-Knowledge.eng.srt
|
58.5 KB
|
The Round Complexity of Quantum Zero-Knowledge.mp4
|
16.0 MB
|
Tight Security Bounds for Micali’s SNARGs.eng.srt
|
71.7 KB
|
Tight Security Bounds for Micali’s SNARGs.mp4
|
28.4 MB
|
Towards Tight Adaptive Security of Non-Interactive Key Exchange.eng.srt
|
39.4 KB
|
Towards Tight Adaptive Security of Non-Interactive Key Exchange.mp4
|
15.0 MB
|
Trojan-Resilience without Cryptography.eng.srt
|
53.0 KB
|
Trojan-Resilience without Cryptography.mp4
|
26.3 MB
|
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.eng.srt
|
55.7 KB
|
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.mp4
|
24.8 MB
|
Unclonable Encryption, Revisited.eng.srt
|
42.2 KB
|
Unclonable Encryption, Revisited.mp4
|
14.2 MB
|
Unifying Presampling via Concentration Bounds.eng.srt
|
25.8 KB
|
Unifying Presampling via Concentration Bounds.mp4
|
8.7 MB
|
Updatable Public Key Encryption in the Standard Model.eng.srt
|
73.8 KB
|
Updatable Public Key Encryption in the Standard Model.mp4
|
27.0 MB
|
Vector and Functional Commitments from Lattices.eng.srt
|
31.3 KB
|
Vector and Functional Commitments from Lattices.mp4
|
10.1 MB
|
/TCC 2022/
|
business meeting.eng.srt
|
16.2 KB
|
business meeting.mp4
|
10.0 MB
|
Invited talk by Eran Tromer.eng.srt
|
110.0 KB
|
Invited talk by Eran Tromer.mp4
|
52.1 MB
|
opening remarks and session on Post-Quantum Cryptography.eng.srt
|
117.5 KB
|
opening remarks and session on Post-Quantum Cryptography.mp4
|
57.8 MB
|
session on ABE and FE.eng.srt
|
65.3 KB
|
session on ABE and FE.mp4
|
27.9 MB
|
session on Anonymity Verifiability and Robustness.eng.srt
|
114.9 KB
|
session on Anonymity Verifiability and Robustness.mp4
|
37.5 MB
|
session on encryption galore.eng.srt
|
69.9 KB
|
session on encryption galore.mp4
|
30.4 MB
|
session on IBE and FE.eng.srt
|
85.5 KB
|
session on IBE and FE.mp4
|
32.0 MB
|
session on interactive proofs.eng.srt
|
105.5 KB
|
session on interactive proofs.mp4
|
43.1 MB
|
session on Lattices.eng.srt
|
107.4 KB
|
session on Lattices.mp4
|
38.7 MB
|
session on multi party computation I.eng.srt
|
106.7 KB
|
session on multi party computation I.mp4
|
40.8 MB
|
session on multi party computation II.eng.srt
|
101.9 KB
|
session on multi party computation II.mp4
|
37.4 MB
|
session on OT, PIR, and Secret Sharing.eng.srt
|
103.8 KB
|
session on OT, PIR, and Secret Sharing.mp4
|
39.4 MB
|
session on Protocols Key Agreement and Commitments.eng.srt
|
116.1 KB
|
session on Protocols Key Agreement and Commitments.mp4
|
42.2 MB
|
session on quantum cryptography.eng.srt
|
79.2 KB
|
session on quantum cryptography.mp4
|
28.4 MB
|
session on secret sharing and ORAM.eng.srt
|
71.7 KB
|
session on secret sharing and ORAM.mp4
|
29.8 MB
|
session on succinct proofs.mp4
|
58.7 MB
|
session on Theory I Sampling and Friends.eng.srt
|
93.3 KB
|
session on Theory I Sampling and Friends.mp4
|
38.8 MB
|
session on Theory II and Closing Remarks.eng.srt
|
126.3 KB
|
session on Theory II and Closing Remarks.mp4
|
44.1 MB
|
test of time award session.eng.srt
|
130.1 KB
|
test of time award session.mp4
|
61.2 MB
|
/Workshops/ACS 2019/
|
A perspective on standardization of advanced cryptography at NIST.eng.srt
|
76.7 KB
|
A perspective on standardization of advanced cryptography at NIST.mp4
|
66.1 MB
|
Advanced Cryptography on the Way to Practice.eng.srt
|
67.2 KB
|
Advanced Cryptography on the Way to Practice.mp4
|
54.0 MB
|
BLS signatures, hashing to curves, and more dispatches from the IETF.eng.srt
|
59.9 KB
|
BLS signatures, hashing to curves, and more dispatches from the IETF.mp4
|
12.7 MB
|
Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.eng.srt
|
69.8 KB
|
Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.mp4
|
16.3 MB
|
HomomorphicEncryption.org - a community effort.eng.srt
|
68.2 KB
|
HomomorphicEncryption.org - a community effort.mp4
|
54.4 MB
|
Lessons about Standardization.eng.srt
|
52.1 KB
|
Lessons about Standardization.mp4
|
35.4 MB
|
Panel & Further Discussion.eng.srt
|
133.4 KB
|
Panel & Further Discussion.mp4
|
32.7 MB
|
Towards Standardizing Zero Knowledge.eng.srt
|
71.6 KB
|
Towards Standardizing Zero Knowledge.mp4
|
47.5 MB
|
/.../Beyond Crypto - A TCS Perspective (At Crypto 2018)/
|
A Fine Grained Approach to Complexity.eng.srt
|
132.1 KB
|
A Fine Grained Approach to Complexity.mp4
|
83.5 MB
|
Certified Randomness from Quantum Supremacy.eng.srt
|
144.3 KB
|
Certified Randomness from Quantum Supremacy.mp4
|
87.1 MB
|
Cryptography, Local Decoding, and Distributed Storage.eng.srt
|
155.3 KB
|
Cryptography, Local Decoding, and Distributed Storage.mp4
|
48.9 MB
|
Machine Learning and Security The Good, the Bad, and the Hopeful.eng.srt
|
174.1 KB
|
Machine Learning and Security The Good, the Bad, and the Hopeful.mp4
|
71.5 MB
|
On Optimal Algorithms and Assumption Factories.eng.srt
|
130.4 KB
|
On Optimal Algorithms and Assumption Factories.mp4
|
73.8 MB
|
Theory for Society Crypto on Steroids.eng.srt
|
119.7 KB
|
Theory for Society Crypto on Steroids.mp4
|
78.8 MB
|
/Workshops/CFAIL 2021/
|
Keynote by Eli Ben-Sasson.eng.srt
|
98.2 KB
|
Keynote by Eli Ben-Sasson.mp4
|
55.1 MB
|
on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.eng.srt
|
52.6 KB
|
on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.mp4
|
27.1 MB
|
Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-....eng.srt
|
63.6 KB
|
Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-....mp4
|
35.2 MB
|
Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.eng.srt
|
46.7 KB
|
Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.mp4
|
19.6 MB
|
Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.eng.srt
|
12.2 KB
|
Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.mp4
|
24.2 MB
|
Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.eng.srt
|
43.8 KB
|
Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.mp4
|
18.0 MB
|
The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.eng.srt
|
39.9 KB
|
The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.mp4
|
21.2 MB
|
/Workshops/PPML 2021/
|
Contributed talks.eng.srt
|
152.9 KB
|
Contributed talks.mp4
|
53.9 MB
|
Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.eng.srt
|
119.4 KB
|
Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.mp4
|
42.3 MB
|
Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.eng.srt
|
106.8 KB
|
Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.mp4
|
37.3 MB
|
Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.eng.srt
|
116.3 KB
|
Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.mp4
|
44.5 MB
|
PPML Contributed Talks.eng(translated).eng(translated).srt
|
99.4 KB
|
PPML Contributed Talks.mp4
|
43.8 MB
|
Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.mp4
|
40.3 MB
|
/.../TASER 2021 Workshop/
|
An overview of security topics within RISC-V, by Helena Handschuh.eng.srt
|
54.2 KB
|
An overview of security topics within RISC-V, by Helena Handschuh.mp4
|
26.0 MB
|
Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.eng.srt
|
45.0 KB
|
Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.mp4
|
15.9 MB
|
CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.eng.srt
|
51.7 KB
|
CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.mp4
|
21.9 MB
|
Closing remarks at TASER 2021, by Dan Page of Bristol University.eng.srt
|
2.0 KB
|
Closing remarks at TASER 2021, by Dan Page of Bristol University.mp4
|
1.7 MB
|
Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.eng.srt
|
42.3 KB
|
Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.mp4
|
17.6 MB
|
Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.eng.srt
|
46.1 KB
|
Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.mp4
|
19.0 MB
|
Opening remarks at TASER 2021, by Dan Page, Bristol University.eng.srt
|
10.5 KB
|
Opening remarks at TASER 2021, by Dan Page, Bristol University.mp4
|
5.8 MB
|
RISC-V cryptography extensions current status and future plans, Ben Marshall.eng.srt
|
47.9 KB
|
RISC-V cryptography extensions current status and future plans, Ben Marshall.mp4
|
25.6 MB
|
/Workshops/WAC 2 2019/
|
Automating the Development of Chosen Ciphertext Attacks.eng.srt
|
96.6 KB
|
Automating the Development of Chosen Ciphertext Attacks.mp4
|
33.3 MB
|
Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.eng.srt
|
75.6 KB
|
Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.mp4
|
59.5 MB
|
Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.eng.srt
|
63.0 KB
|
Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.mp4
|
57.0 MB
|
Dragonblood A Security Analysis of WPA3's SAE Handshake.eng.srt
|
80.7 KB
|
Dragonblood A Security Analysis of WPA3's SAE Handshake.mp4
|
58.9 MB
|
Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4
|
41.4 MB
|
RAMBleed Leaking Keys Across Address Spaces.mp4
|
152.1 MB
|
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.eng.srt
|
76.9 KB
|
Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.mp4
|
49.5 MB
|
The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.eng.srt
|
72.2 KB
|
The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.mp4
|
58.1 MB
|
/Workshops/WAC 2021 4/
|
A Side Journey To Titan.eng.srt
|
9.5 KB
|
A Side Journey To Titan.mp4
|
11.0 MB
|
Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.eng.srt
|
66.7 KB
|
Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.mp4
|
17.5 MB
|
Fault Attacks on CCA-secure Lattice KEMs.eng.srt
|
73.7 KB
|
Fault Attacks on CCA-secure Lattice KEMs.mp4
|
33.9 MB
|
FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.eng.srt
|
69.6 KB
|
FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.mp4
|
35.9 MB
|
PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.eng.srt
|
55.0 KB
|
PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.mp4
|
18.4 MB
|
Partitioning Oracle Attacks.eng.srt
|
66.1 KB
|
Partitioning Oracle Attacks.mp4
|
22.2 MB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).eng.srt
|
77.4 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).mp4
|
29.1 MB
|
The Role of Integrity in Attestation and Isolation.eng.srt
|
37.5 KB
|
The Role of Integrity in Attestation and Isolation.mp4
|
18.6 MB
|
Total files 5077
|