FileMood

Download The IACR

The IACR

Name

The IACR

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

79.0 GB

Total Files

5077

Hash

F19D954AD7C6E9CF77F06AD798A36558CC9C3305

/

IACR Crypt thank you.txt

1.8 KB

IACR logo.png

41.4 KB

RealWorldCrypto logo.jpg

3.3 KB

/Asiacrypt/Asiacrypt 2016/

A General Polynomial Selection Method and New Asymptotic Complexities for ....mp4

33.1 MB

A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.mp4

30.7 MB

A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4

40.2 MB

A Shuffle Argument Secure in the Generic Model.mp4

35.1 MB

A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4

33.2 MB

Adaptive Oblivious Transfer and Generalization.mp4

10.4 MB

Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ....mp4

26.9 MB

Asiacrypt 2016 Rump Session.mp4

81.3 MB

Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4

75.2 MB

Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4

29.7 MB

Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4

31.0 MB

Authenticated Encryption with Variable Stretch.mp4

28.5 MB

Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4

43.3 MB

Characterisation and Estimation of the Key Rank Distribution in the context of side channel ....mp4

30.0 MB

Cliptography Clipping the Power of Kleptographic Attacks.mp4

36.6 MB

Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4

38.2 MB

Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ....mp4

42.8 MB

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4

42.7 MB

Cryptography in Vietnam in the French and American Wars.mp4

76.0 MB

Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4

30.5 MB

Efficient and Provable White Box Primitives.mp4

26.4 MB

Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting - .mp4

18.6 MB

Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4

18.1 MB

Efficient Public Key Distance Bounding Protocol.mp4

37.2 MB

Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4

33.9 MB

Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.mp4

49.7 MB

From 5 pass MQ based identification to MQ based signatures.mp4

29.2 MB

From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4

32.2 MB

General IACR Business Meeting.mp4

52.1 MB

How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4

32.4 MB

How to Generate and use Universal Samplers.mp4

22.6 MB

How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4

21.7 MB

Indistinguishable Proofs of Work or Knowledge.mp4

41.3 MB

Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4

39.3 MB

Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4

45.5 MB

MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4

36.7 MB

More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4

20.0 MB

Multi Input Functional Encryption with Unbounded Message Security.mp4

35.6 MB

Multi Key Homomorphic Authenticators.mp4

30.5 MB

Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4

110.3 MB

NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4

25.8 MB

Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4

38.8 MB

On the Security of Supersingular Isogeny Cryptosystems.mp4

30.9 MB

Optimization of LPN Solving Algorithms.mp4

35.6 MB

Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4

32.0 MB

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4

34.2 MB

Reactive Garbling Foundation, Instantiation, Application.mp4

23.6 MB

Reverse Cycle Walking and Its Applications.mp4

35.1 MB

Selective Opening Security from Simulatable Data Encapsulation.mp4

28.5 MB

Selective Opening Security in the Presence of Randomness Failures.mp4

28.6 MB

Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4

65.6 MB

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4

30.1 MB

Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4

45.1 MB

Size-Hiding Computation for Multiple Parties.mp4

36.4 MB

Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4

23.2 MB

Structure Preserving Smooth Projective Hashing.mp4

3.9 MB

Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4

31.2 MB

The Kernel Matrix Diffie Hellman Assumption.mp4

43.7 MB

The Reality of Cryptographic Deployments on the Internet.mp4

10.2 MB

Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4

38.0 MB

Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4

36.5 MB

Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4

29.2 MB

Universal Composition with Responsive Environments.mp4

26.3 MB

Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4

24.5 MB

Unknown-Input Attacks in the Parallel Setting - Improving the Security of the ....mp4

24.9 MB

Verifiable Functional Encryption.mp4

32.6 MB

Welcome to Asiacrypt.mp4

21.1 MB

When are Fuzzy Extractors Possible.mp4

31.2 MB

Zero Knowledge Accumulators and Set Algebra.mp4

20.5 MB

Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4

35.4 MB

/Asiacrypt/Asiacrypt 2017/

A simple and compact algorithm for SIDH with arbitrary degree isogenies.mp4

36.0 MB

A Subversion-Resistant SNARK.mp4

25.0 MB

ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.mp4

850.4 KB

Access Control Encryption for General Policies from Standard Assumptions.mp4

29.1 MB

Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.mp4

24.6 MB

Amortizing Randomness Complexity in Private Circuits.mp4

32.0 MB

An Efficient Pairing Based Shuffle Argument.mp4

22.2 MB

An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.mp4

29.4 MB

An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.mp4

27.6 MB

Analyzing Multi Key Security Degradation.mp4

44.2 MB

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.mp4

45.4 MB

Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.mp4

31.5 MB

Blockcipher based MACs Beyond the Birthday Bound without Message Length.mp4

41.5 MB

Coded BKW with Sieving.mp4

23.7 MB

Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.mp4

29.3 MB

Combinatorics in Information theoretic cryptography.mp4

36.0 MB

Consolidating Inner product Masking.mp4

40.9 MB

Cycle slicer An algorithm for building permutations on special domains.mp4

46.2 MB

Efficient Ring Signatures in the Standard Model.mp4

23.2 MB

Efficient Scalable Constant Round MPC via Garbled Circuits.mp4

19.6 MB

Faster Algorithms for Isogeny Problems using Torsion Point Images.mp4

25.4 MB

Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.mp4

28.9 MB

Full state keyed duplex with built in multi user support.mp4

31.1 MB

Grover Meets Simon - Quantumly Attacking the FX construction.mp4

36.2 MB

Homomorphic Encryption for Arithmetic of Approximate Numbers.mp4

22.6 MB

How to use Metaheuristics for Design of Symmetric Key primitives.mp4

46.0 MB

IACR Business Meeting.mp4

80.9 MB

Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.mp4

17.2 MB

Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.mp4

26.9 MB

Improved Security for OCB3.mp4

30.4 MB

Instantaneous Decentralized Poker.mp4

42.1 MB

JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes - YouTube.mp4

26.9 MB

Kummer for Genus One over Prime Order Fields.mp4

19.3 MB

Linear Cryptanalysis of DES with Asymmetries.mp4

23.0 MB

Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.mp4

17.7 MB

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.mp4

18.8 MB

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.mp4

23.6 MB

More Efficient Universal Circuit Constructions.mp4

25.1 MB

New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.mp4

24.4 MB

Non interactive multiparty computation without correlated randomness.mp4

39.9 MB

On the Depth of Oblivious Parallel RAM.mp4

23.2 MB

On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.mp4

25.0 MB

Opening remarks at Asiacrypt 2017.mp4

29.0 MB

Optimal rate non committing encryption.mp4

38.8 MB

Overlaying Conditional Circuit Clauses for Secure Computation.mp4

33.4 MB

Post Quantum Security of Fiat Shamir.mp4

38.1 MB

Preventing CLT Attacks on Obfuscation with Linear Overhead.mp4

29.2 MB

qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.mp4

22.3 MB

Quantum Fully Homomorphic Encryption with Verification.mp4

35.4 MB

Quantum Multicollision Finding Algorithm.mp4

31.2 MB

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.mp4

40.2 MB

Revisiting the Expected Cost of Solving uSVP and Applications to LWE.mp4

22.0 MB

Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.mp4

34.9 MB

Strengthening Access Control Encryption.mp4

30.3 MB

Succinct Spooky Free Compilers Are Not Black Box Sound.mp4

33.9 MB

Symmetrically and Asymmetrically Hard Cryptography.mp4

44.8 MB

The first thorough side channel hardware trojan.mp4

44.6 MB

The Iterated Random Function Problem.mp4

46.3 MB

The Minimum Number of Cards in Practical Card based Protocols (2).mp4

20.0 MB

The Minimum Number of Cards in Practical Card based Protocols.mp4

29.3 MB

The ship has sailed - the NIST Post-Quantum Cryptography - competition.mp4

53.2 MB

The Sleepy Model of Consensus.mp4

43.5 MB

Tightly secure signatures from five move identification protocols.mp4

22.8 MB

Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.mp4

32.7 MB

Two Round PAKE from Approximate SPH and Instantiations from Lattices.mp4

22.8 MB

White-box Cryptomania, Pascal Paillier.mp4

45.3 MB

Yoyo Tricks with AES.mp4

29.9 MB

Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.mp4

33.6 MB

/Asiacrypt/Asiacrypt 2021/

(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.eng.srt

57.0 KB

(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.mp4

21.9 MB

A formula for disaster a unified approach to elliptic curve special-point-based attacks.eng.srt

25.1 KB

A formula for disaster a unified approach to elliptic curve special-point-based attacks.mp4

9.3 MB

A Geometric Approach to Linear Cryptanalysis.mp4

20.0 MB

A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.mp4

12.0 MB

A Practical Key-Recovery Attack on 805-Round Trivium.eng.srt

28.6 KB

A Practical Key-Recovery Attack on 805-Round Trivium.mp4

14.9 MB

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.eng.srt

34.2 KB

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.mp4

14.1 MB

Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.eng.srt

40.8 KB

Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.mp4

11.8 MB

Algebraic Adversaries in the Universal Composability Framework.eng.srt

32.0 KB

Algebraic Adversaries in the Universal Composability Framework.mp4

11.4 MB

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.eng.srt

33.9 KB

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.mp4

16.9 MB

Asiacrypt 2021 closing remarks.eng.srt

6.1 KB

Asiacrypt 2021 closing remarks.mp4

6.1 MB

Astrolabous A Universally Composable Time Lock Encryption Scheme.mp4

22.3 MB

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.eng.srt

15.5 KB

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.mp4

9.0 MB

Balanced Non-Adjacent Forms.eng.srt

26.9 KB

Balanced Non-Adjacent Forms.mp4

9.3 MB

Batching Base Oblivious Transfers.eng.srt

67.1 KB

Batching Base Oblivious Transfers.mp4

22.1 MB

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.eng.srt

37.3 KB

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.mp4

13.2 MB

Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.eng.srt

54.4 KB

Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.mp4

20.9 MB

Bit Security as Computational Cost for Winning Games with High Probability.eng.srt

31.0 KB

Bit Security as Computational Cost for Winning Games with High Probability.mp4

11.2 MB

Boosting the Security of Blind Signature Schemes.eng.srt

21.7 KB

Boosting the Security of Blind Signature Schemes.mp4

6.9 MB

Bounded Collusion ABE for TMs from IBE.eng.srt

30.8 KB

Bounded Collusion ABE for TMs from IBE.mp4

9.9 MB

Categorization of Faulty Nonce Misuse Resistant Message Authentication.eng.srt

28.2 KB

Categorization of Faulty Nonce Misuse Resistant Message Authentication.mp4

10.2 MB

Chain Reductions for Multi-Signatures and the HBMS Scheme.eng.srt

50.7 KB

Chain Reductions for Multi-Signatures and the HBMS Scheme.mp4

23.7 MB

Clustering Effect in Simon and Simeck.eng.srt

41.8 KB

Clustering Effect in Simon and Simeck.mp4

17.4 MB

Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.mp4

16.9 MB

ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.eng.srt

34.1 KB

ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.mp4

20.4 MB

Convexity of division property transitions theory, algorithms and compact models.eng.srt

41.4 KB

Convexity of division property transitions theory, algorithms and compact models.mp4

13.1 MB

Cryptanalysis of an oblivious PRF from supersingular isogenies.eng.srt

45.6 KB

Cryptanalysis of an oblivious PRF from supersingular isogenies.mp4

14.3 MB

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.eng.srt

25.4 KB

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.mp4

7.2 MB

DEFAULT Cipher Level Resistance Against Differential Fault Attack.eng.srt

32.6 KB

DEFAULT Cipher Level Resistance Against Differential Fault Attack.mp4

12.1 MB

Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.eng.srt

43.4 KB

Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.mp4

18.6 MB

Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.eng.srt

42.2 KB

Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.mp4

19.6 MB

Double-Block-Length Hash Function for Minimum Memory Size.eng.srt

23.4 KB

Double-Block-Length Hash Function for Minimum Memory Size.mp4

10.2 MB

Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.eng.srt

64.5 KB

Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.mp4

23.4 MB

Efficient Boolean Search over Encrypted Data with Reduced Leakage.eng.srt

39.8 KB

Efficient Boolean Search over Encrypted Data with Reduced Leakage.mp4

14.7 MB

Efficient Leakage-Resilient MACs without Idealized Assumptions.mp4

15.7 MB

Efficient NIZKs for Algebraic Sets.mp4

23.9 MB

FAST Secure and High Performance Format-Preserving Encryption and Tokenization.mp4

14.0 MB

Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.eng.srt

34.8 KB

Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.mp4

11.7 MB

Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.mp4

26.4 MB

Fine-tuning the ISO IEC Standard LightMAC.mp4

11.8 MB

Franchised Quantum Money.eng.srt

24.0 KB

Franchised Quantum Money.mp4

8.4 MB

Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.eng.srt

42.3 KB

Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.mp4

15.3 MB

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.eng.srt

60.4 KB

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.mp4

20.3 MB

Generic Framework for Key-Guessing Improvements.mp4

6.4 MB

Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.eng.srt

55.5 KB

Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.mp4

25.4 MB

Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.eng.srt

53.2 KB

Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.mp4

17.4 MB

Gladius LWR based efficient hybrid public key encryption with distributed decryption.eng.srt

40.1 KB

Gladius LWR based efficient hybrid public key encryption with distributed decryption.mp4

19.8 MB

Hierarchical Integrated Signature and Encryption.eng.srt

33.4 KB

Hierarchical Integrated Signature and Encryption.mp4

17.0 MB

Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.eng.srt

37.6 KB

Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.mp4

18.4 MB

How to Build a Trapdoor Function from an Encryption Scheme.eng.srt

37.3 KB

How to Build a Trapdoor Function from an Encryption Scheme.mp4

14.7 MB

IACR Distinguished Lecture by Professor Andrew Yao.eng.srt

82.7 KB

IACR Distinguished Lecture by Professor Andrew Yao.mp4

37.0 MB

Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.eng.srt

24.4 KB

Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.mp4

9.6 MB

Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.eng.srt

54.7 KB

Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.mp4

17.2 MB

Improved single-round secure multiplication using regenerating codes.eng.srt

99.5 KB

Improved single-round secure multiplication using regenerating codes.mp4

38.0 MB

Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.eng.srt

41.2 KB

Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.mp4

18.0 MB

Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.eng.srt

40.9 KB

Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.mp4

16.4 MB

Lattice sieving via quantum random walks.eng.srt

39.2 KB

Lattice sieving via quantum random walks.mp4

17.4 MB

Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.mp4

14.9 MB

Luby-Rackoff Backwards with More Users and More Security.eng.srt

62.0 KB

Luby-Rackoff Backwards with More Users and More Security.mp4

22.2 MB

Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.eng.srt

42.0 KB

Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.mp4

17.9 MB

Massive Superpoly Recovery with Nested Monomial Predictions.eng.srt

24.0 KB

Massive Superpoly Recovery with Nested Monomial Predictions.mp4

10.6 MB

Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.eng.srt

30.2 KB

Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.mp4

17.3 MB

New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.eng.srt

50.0 KB

New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.mp4

20.1 MB

NTRU Fatigue How Stretched is Overstretched.eng.srt

38.0 KB

NTRU Fatigue How Stretched is Overstretched.mp4

11.8 MB

On the hardness of the NTRU problem.eng.srt

58.5 KB

On the hardness of the NTRU problem.mp4

19.0 MB

On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.eng.srt

40.6 KB

On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.mp4

16.3 MB

On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.eng.srt

85.2 KB

On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.mp4

35.8 MB

Onion Routing with Replies.eng.srt

40.0 KB

Onion Routing with Replies.mp4

12.1 MB

Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.mp4

16.4 MB

Private Join and Compute from PIR with Default.eng.srt

54.9 KB

Private Join and Compute from PIR with Default.mp4

17.4 MB

Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.eng.srt

32.0 KB

Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.mp4

16.2 MB

Proofs for Inner Pairing Products and Applications.eng.srt

47.0 KB

Proofs for Inner Pairing Products and Applications.mp4

23.3 MB

PrORAM Fast O(log n) Authenticated Shares ZK ORAM.eng.srt

44.8 KB

PrORAM Fast O(log n) Authenticated Shares ZK ORAM.mp4

12.4 MB

Public Key Encryption with Flexible Pattern Matching.eng.srt

30.8 KB

Public Key Encryption with Flexible Pattern Matching.mp4

12.9 MB

QCB Efficient Quantum-secure Authenticated Encryption.eng.srt

41.3 KB

QCB Efficient Quantum-secure Authenticated Encryption.mp4

17.1 MB

Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.eng.srt

36.0 KB

Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.mp4

20.8 MB

Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.eng.srt

35.8 KB

Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.mp4

13.8 MB

Quantum Linearization Attacks.eng.srt

45.4 KB

Quantum Linearization Attacks.mp4

17.5 MB

Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.eng.srt

46.6 KB

Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.mp4

14.0 MB

Reverse Firewalls for Adaptively Secure MPC without Setup.eng.srt

38.1 KB

Reverse Firewalls for Adaptively Secure MPC without Setup.mp4

11.8 MB

Revisiting Homomorphic Encryption Schemes for Finite Fields.mp4

14.0 MB

Secure and Efficient Software Masking on Superscalar Pipelined Processors.eng.srt

52.4 KB

Secure and Efficient Software Masking on Superscalar Pipelined Processors.mp4

23.7 MB

Security Analysis of CPace.eng.srt

28.5 KB

Security Analysis of CPace.mp4

31.3 MB

Session on Enhanced PKE and Time-Lock Puzzles.eng.srt

105.4 KB

Session on Enhanced PKE and Time-Lock Puzzles.mp4

44.8 MB

Session on Homomorphic Encryption and Encrypted Search.eng.srt

80.7 KB

Session on Homomorphic Encryption and Encrypted Search.mp4

31.9 MB

Session on Lattice Cryptanalysis.eng.srt

73.4 KB

Session on Lattice Cryptanalysis.mp4

37.5 MB

Session on NIZK and SNARKs.eng.srt

72.5 KB

Session on NIZK and SNARKs.mp4

38.4 MB

Session on Quantum Security.eng.srt

109.4 KB

Session on Quantum Security.mp4

50.6 MB

Session on Real World Protocols.eng.srt

119.2 KB

Session on Real World Protocols.mp4

52.7 MB

Session on Symmetric Cryptanalysis (I).eng.srt

97.0 KB

Session on Symmetric Cryptanalysis (I).mp4

45.2 MB

Session on Symmetric Cryptanalysis (II).eng.srt

96.4 KB

Session on Symmetric Cryptanalysis (II).mp4

37.4 MB

Session on Symmetric-Key constructions.eng.srt

118.5 KB

Session on Symmetric-Key constructions.mp4

50.0 MB

Session on Zero-Knowledge Proofs, Threshold and Multi-Signatures.eng.srt

98.0 KB

Session on Zero-Knowledge Proofs, Threshold and Multi-Signatures.mp4

34.1 MB

session-1 Opening Remarks.eng.srt

9.3 KB

session-1 Opening Remarks.mp4

7.0 MB

session-5 Post-Quantum Cryptography.eng.srt

96.3 KB

session-5 Post-Quantum Cryptography.mp4

43.7 MB

session-6 Multiparty Computation.eng.srt

101.8 KB

session-6 Multiparty Computation.mp4

39.6 MB

session-13 Physical Attacks, Leakage and Countermeasures.eng.srt

107.4 KB

session-13 Physical Attacks, Leakage and Countermeasures.mp4

42.4 MB

session-14 Theory.eng.srt

115.0 KB

session-14 Theory.mp4

38.5 MB

session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.eng.srt

96.0 KB

session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.mp4

48.6 MB

session-17 Advanced Encryption and Signatures.eng.srt

100.4 KB

session-17 Advanced Encryption and Signatures.mp4

44.1 MB

session-23 Rump Session.eng.srt

34.9 KB

session-23 Rump Session.mp4

24.6 MB

session-34 Award Papers.eng.srt

154.9 KB

session-34 Award Papers.mp4

72.7 MB

session-36 IACR Distinguished Lecture by Andrew Yao.eng.srt

82.3 KB

session-36 IACR Distinguished Lecture by Andrew Yao.mp4

42.7 MB

session-37 Invited Talk by Kazue Sako.eng.srt

100.7 KB

session-37 Invited Talk by Kazue Sako.mp4

66.3 MB

session-39 Invited Talk 2 by Yu Yu.eng.srt

102.1 KB

session-39 Invited Talk 2 by Yu Yu.mp4

48.9 MB

session-48 Closing Remarks.eng.srt

6.0 KB

session-48 Closing Remarks.mp4

6.5 MB

session-53 Test-of-Time Award Program Chair Address.eng.srt

31.9 KB

session-53 Test-of-Time Award Program Chair Address.mp4

26.0 MB

SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.mp4

27.8 MB

Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.eng.srt

40.9 KB

Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.mp4

17.6 MB

Simulation-Based Bi-Selective Opening Security for Public Key Encryption.eng.srt

34.2 KB

Simulation-Based Bi-Selective Opening Security for Public Key Encryption.mp4

13.4 MB

Snarky Ceremonies.eng.srt

54.3 KB

Snarky Ceremonies.mp4

22.2 MB

Strong and Tight Security Guarantees against Integral Distinguishers.eng.srt

45.6 KB

Strong and Tight Security Guarantees against Integral Distinguishers.mp4

16.2 MB

Symmetric Key Exchange with Full Forward Security and Robust Synchronization.eng.srt

43.5 KB

Symmetric Key Exchange with Full Forward Security and Robust Synchronization.mp4

14.6 MB

Séta Supersingular Encryption from Torsion Attacks.eng.srt

51.4 KB

Séta Supersingular Encryption from Torsion Attacks.mp4

22.7 MB

Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.eng.srt

26.4 KB

Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.mp4

7.2 MB

The One-More Discrete Logarithm Assumption in the Generic Group Model.mp4

19.3 MB

Tight adaptive reprogramming in the QROM.eng.srt

46.2 KB

Tight adaptive reprogramming in the QROM.mp4

14.4 MB

Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.eng.srt

32.7 KB

Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.mp4

14.0 MB

Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.eng.srt

21.6 KB

Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.mp4

9.4 MB

Transciphering Framework for Approximate Homomorphic Encryption.eng.srt

28.9 KB

Transciphering Framework for Approximate Homomorphic Encryption.mp4

14.7 MB

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.eng.srt

41.5 KB

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.mp4

16.0 MB

Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.eng.srt

27.6 KB

Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.mp4

9.5 MB

/Asiacrypt/Asiacrypt 2022/

A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.eng.srt

8.6 KB

A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.mp4

4.3 MB

A Modular Approach to the Security Analysis of Two-Permutation Constructions.eng.srt

11.2 KB

A Modular Approach to the Security Analysis of Two-Permutation Constructions.mp4

4.3 MB

A New Isogeny Representation and Applications to Cryptography.eng.srt

6.6 KB

A New Isogeny Representation and Applications to Cryptography.mp4

2.0 MB

A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.eng.srt

8.0 KB

A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.mp4

4.4 MB

A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.eng.srt

5.4 KB

A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.mp4

2.9 MB

A Universally Composable Non-Interactive Aggregate Cash System.eng.srt

7.4 KB

A Universally Composable Non-Interactive Aggregate Cash System.mp4

4.4 MB

Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.eng.srt

7.5 KB

Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.mp4

3.0 MB

Algebraic Meet-in-the-Middle Attack on LowMC.eng.srt

8.2 KB

Algebraic Meet-in-the-Middle Attack on LowMC.mp4

4.1 MB

An Analysis of the Algebraic Group Model.eng.srt

2.8 KB

An Analysis of the Algebraic Group Model.mp4

1.4 MB

Anonymous Public Key Encryption under Corruptions.eng.srt

7.5 KB

Anonymous Public Key Encryption under Corruptions.mp4

3.2 MB

Attaining GOD Beyond Honest Majority With Friends and Foes.eng.srt

10.0 KB

Attaining GOD Beyond Honest Majority With Friends and Foes.mp4

3.6 MB

Authenticated Encryption with Key Identification.eng.srt

8.3 KB

Authenticated Encryption with Key Identification.mp4

2.9 MB

BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.eng.srt

3.9 KB

BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.mp4

12.6 MB

Classically Verifiable NIZK for QMA with Preprocessing.eng.srt

6.9 KB

Classically Verifiable NIZK for QMA with Preprocessing.mp4

3.3 MB

Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.eng.srt

8.4 KB

Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.mp4

3.1 MB

Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.eng.srt

7.6 KB

Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.mp4

3.0 MB

Concurrently Composable Non-Interactive Secure Computation.eng.srt

9.4 KB

Concurrently Composable Non-Interactive Secure Computation.mp4

3.2 MB

Continuously Non-Malleable Codes against Bounded-Depth Tampering.eng.srt

8.8 KB

Continuously Non-Malleable Codes against Bounded-Depth Tampering.mp4

2.9 MB

Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.eng.srt

8.0 KB

Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.mp4

3.1 MB

Cryptographic Primitives with Hinting Property.eng.srt

10.8 KB

Cryptographic Primitives with Hinting Property.mp4

4.4 MB

DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.eng.srt

7.3 KB

DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.mp4

4.0 MB

Efficient Adaptively-Secure Byzantine Agreement for Long Messages.eng.srt

9.1 KB

Efficient Adaptively-Secure Byzantine Agreement for Long Messages.mp4

4.0 MB

Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.eng.srt

7.8 KB

Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.mp4

3.3 MB

Efficient Searchable Symmetric Encryption for Join Queries.eng.srt

5.9 KB

Efficient Searchable Symmetric Encryption for Join Queries.mp4

2.3 MB

Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.eng.srt

4.2 KB

Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.mp4

2.2 MB

Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.eng.srt

9.9 KB

Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.mp4

3.2 MB

Enhancing Differential-Neural Cryptanalysis.eng.srt

7.2 KB

Enhancing Differential-Neural Cryptanalysis.mp4

4.1 MB

EvalRound Algorithm in CKKS Bootstrapping.eng.srt

10.4 KB

EvalRound Algorithm in CKKS Bootstrapping.mp4

3.1 MB

Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.eng.srt

5.3 KB

Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.mp4

4.2 MB

Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.eng.srt

8.3 KB

Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.mp4

3.6 MB

FINAL Faster FHE instantiated with NTRU and LWE.eng.srt

8.7 KB

FINAL Faster FHE instantiated with NTRU and LWE.mp4

3.5 MB

Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.eng.srt

4.6 KB

Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.mp4

2.4 MB

Full Quantum Equivalence of Group Action DLog and CDH, and More.eng.srt

8.4 KB

Full Quantum Equivalence of Group Action DLog and CDH, and More.mp4

3.7 MB

Functional Encryption with Secure Key Leasing.eng.srt

4.9 KB

Functional Encryption with Secure Key Leasing.mp4

2.1 MB

General Properties of Quantum Bit Commitments (Extended Abstract).eng.srt

7.5 KB

General Properties of Quantum Bit Commitments (Extended Abstract).mp4

4.6 MB

Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.eng.srt

7.1 KB

Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.mp4

2.0 MB

GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.mp4

3.5 MB

Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.eng.srt

5.9 KB

Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.mp4

2.3 MB

Horizontal racewalking using radical isogenies.eng.srt

7.3 KB

Horizontal racewalking using radical isogenies.mp4

2.2 MB

Identity-Based Matchmaking Encryption from Standard Assumptions.eng.srt

5.7 KB

Identity-Based Matchmaking Encryption from Standard Assumptions.mp4

1.8 MB

Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.eng.srt

7.4 KB

Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.mp4

2.3 MB

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.eng.srt

3.9 KB

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.mp4

2.7 MB

invited talk by Damien Stehlé.eng.srt

75.4 KB

invited talk by Damien Stehlé.mp4

39.9 MB

Invited talk by Jian Guo.eng.srt

66.5 KB

Invited talk by Jian Guo.mp4

36.8 MB

Jammin' on the deck.eng.srt

8.8 KB

Jammin' on the deck.mp4

3.8 MB

Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.eng.srt

6.4 KB

Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.mp4

3.0 MB

Key-schedule Security for the TLS 1.3 Standard.eng.srt

9.0 KB

Key-schedule Security for the TLS 1.3 Standard.mp4

3.6 MB

Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.eng.srt

9.0 KB

Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.mp4

4.5 MB

Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.eng.srt

7.3 KB

Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.mp4

2.6 MB

Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.eng.srt

3.4 KB

Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.mp4

1.6 MB

Linear-map Vector Commitments and their Practical Applications.eng.srt

9.0 KB

Linear-map Vector Commitments and their Practical Applications.mp4

3.0 MB

Memory-Tight Multi-Challenge Security of Public-Key Encryption.eng.srt

7.5 KB

Memory-Tight Multi-Challenge Security of Public-Key Encryption.mp4

3.3 MB

Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.mp4

3.9 MB

Multi-Client Functional Encryption with Fine-Grained Access Control.eng.srt

7.8 KB

Multi-Client Functional Encryption with Fine-Grained Access Control.mp4

2.4 MB

Multi-User Security of the Sum of Truncated Random Permutations.eng.srt

5.4 KB

Multi-User Security of the Sum of Truncated Random Permutations.mp4

3.3 MB

New Algorithms and Analyses for Sum-Preserving Encryption.eng.srt

7.3 KB

New Algorithms and Analyses for Sum-Preserving Encryption.mp4

2.9 MB

Non-interactive Mimblewimble transactions, revisited.eng.srt

12.2 KB

Non-interactive Mimblewimble transactions, revisited.mp4

5.1 MB

Non-Interactive Secure Computation of Inner-Product from LPN and LWE.eng.srt

9.5 KB

Non-Interactive Secure Computation of Inner-Product from LPN and LWE.mp4

4.6 MB

Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.eng.srt

7.1 KB

Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.mp4

3.9 MB

Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.eng.srt

8.3 KB

Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.mp4

3.2 MB

Nostradamus goes Quantum.eng.srt

7.3 KB

Nostradamus goes Quantum.mp4

3.2 MB

On Module Unique-SVP and NTRU.eng.srt

4.9 KB

On Module Unique-SVP and NTRU.mp4

1.4 MB

On Rejection Sampling in Lyubashevsky's Signature Scheme.eng.srt

3.4 KB

On Rejection Sampling in Lyubashevsky's Signature Scheme.mp4

5.1 MB

On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.eng.srt

6.3 KB

On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.mp4

3.4 MB

Opening remarks.eng.srt

4.3 KB

Opening remarks.mp4

4.9 MB

Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.eng.srt

7.6 KB

Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.mp4

3.6 MB

Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.eng.srt

5.5 KB

Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.mp4

2.3 MB

Practical Provably Secure Flooding for Blockchains.eng.srt

6.7 KB

Practical Provably Secure Flooding for Blockchains.mp4

2.8 MB

Privacy-Preserving Authenticated Key Exchange in the Standard Model.eng.srt

8.6 KB

Privacy-Preserving Authenticated Key Exchange in the Standard Model.mp4

4.0 MB

Puncturable Key Wrapping and Its Applications.eng.srt

8.8 KB

Puncturable Key Wrapping and Its Applications.mp4

5.4 MB

Random Sources in Private Computation.eng.srt

10.5 KB

Random Sources in Private Computation.mp4

4.9 MB

Recovering the tight security proof of SPHINCS.eng.srt

7.5 KB

Recovering the tight security proof of SPHINCS.mp4

3.3 MB

Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.eng.srt

4.9 KB

Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.mp4

3.7 MB

Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.eng.srt

7.4 KB

Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.mp4

1.6 MB

rump session 1.eng.srt

51.9 KB

rump session 1.mp4

25.9 MB

rump session 2.eng.srt

26.2 KB

rump session 2.mp4

13.7 MB

rump session 3.eng.srt

22.6 KB

rump session 3.mp4

24.2 MB

Security of Truncated Permutation Without Initial Value.eng.srt

9.4 KB

Security of Truncated Permutation Without Initial Value.mp4

4.2 MB

Session for award papers.eng.srt

122.8 KB

Session for award papers.mp4

44.7 MB

Session on advanced encryption 1.eng.srt

114.0 KB

Session on advanced encryption 1.mp4

39.4 MB

Session on Advanced Encryption 2.eng.srt

136.4 KB

Session on Advanced Encryption 2.mp4

52.4 MB

Session on Blockchains and Cryptocurrencies.eng.srt

101.5 KB

Session on Blockchains and Cryptocurrencies.mp4

33.2 MB

Session on Commitments.eng.srt

152.9 KB

Session on Commitments.mp4

55.6 MB

Session on Cryptanalysis.eng.srt

136.8 KB

Session on Cryptanalysis.mp4

59.2 MB

Session on Functional and Witness Encryption.eng.srt

140.3 KB

Session on Functional and Witness Encryption.mp4

59.1 MB

Session on Homomorphic Encryption.eng.srt

146.0 KB

Session on Homomorphic Encryption.mp4

52.6 MB

Session on Isogeny Based Cryptography.eng.srt

93.4 KB

Session on Isogeny Based Cryptography.mp4

33.2 MB

Session on Lattice Algorithms and Cryptanalysis.eng.srt

106.6 KB

Session on Lattice Algorithms and Cryptanalysis.mp4

54.4 MB

Session on Multiparty Computation 1.eng.srt

138.6 KB

Session on Multiparty Computation 1.mp4

59.4 MB

Session on multiparty computation 2.eng.srt

106.4 KB

Session on multiparty computation 2.mp4

40.0 MB

Session on non interactive zero knowledge.eng.srt

101.3 KB

Session on non interactive zero knowledge.mp4

36.7 MB

Session on practical cryptography 1.eng.srt

92.3 KB

Session on practical cryptography 1.mp4

35.8 MB

Session on Practical Cryptography 2.eng.srt

102.4 KB

Session on Practical Cryptography 2.mp4

45.3 MB

Session on Practical Cryptography 3 and Closing Remarks.eng.srt

99.0 KB

Session on Practical Cryptography 3 and Closing Remarks.mp4

36.8 MB

Session on Proofs and SNARKs.eng.srt

148.2 KB

Session on Proofs and SNARKs.mp4

53.4 MB

Session on quantum algorithms.eng.srt

90.9 KB

Session on quantum algorithms.mp4

42.1 MB

Session on Quantum Cryptography.eng.srt

95.1 KB

Session on Quantum Cryptography.mp4

50.8 MB

Session on Real World Protocols.eng.srt

133.9 KB

Session on Real World Protocols.mp4

49.1 MB

Session on Signatures.eng.srt

122.3 KB

Session on Signatures.mp4

55.1 MB

Session on symmetric cryptography 1.eng.srt

105.0 KB

Session on symmetric cryptography 1.mp4

41.3 MB

Session on symmetric cryptography 2.eng.srt

87.2 KB

Session on symmetric cryptography 2.mp4

29.3 MB

Session on symmetric key cryptanalysis 2.eng.srt

101.1 KB

Session on symmetric key cryptanalysis 2.mp4

38.5 MB

Session on Symmetric Key Cryptanalysis I.eng.srt

128.8 KB

Session on Symmetric Key Cryptanalysis I.mp4

56.5 MB

Session on Theory 1.eng.srt

156.7 KB

Session on Theory 1.mp4

51.5 MB

Session on Theory 2.eng.srt

107.0 KB

Session on Theory 2.mp4

39.5 MB

Session on zero knowledge 1.eng.srt

98.1 KB

Session on zero knowledge 1.mp4

40.1 MB

Session on zero knowledge 2.eng.srt

72.7 KB

Session on zero knowledge 2.mp4

41.1 MB

Short-lived zero-knowledge proofs and signatures.eng.srt

8.8 KB

Short-lived zero-knowledge proofs and signatures.mp4

3.1 MB

SIDH Proof of Knowledge.eng.srt

9.1 KB

SIDH Proof of Knowledge.mp4

2.9 MB

SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.eng.srt

9.1 KB

SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.mp4

2.9 MB

State Machine Replication under Changing Network Conditions.eng.srt

10.7 KB

State Machine Replication under Changing Network Conditions.mp4

3.5 MB

Statistical Decoding 2.0 Reducing Decoding to LPN.mp4

2.9 MB

Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.eng.srt

7.3 KB

Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.mp4

3.8 MB

SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.eng.srt

10.7 KB

SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.mp4

3.7 MB

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.eng.srt

7.9 KB

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.mp4

4.5 MB

The Abe-Okamoto Partially Blind Signature Scheme Revisited.eng.srt

7.6 KB

The Abe-Okamoto Partially Blind Signature Scheme Revisited.mp4

2.4 MB

Threshold Linearly Homomorphic Encryption on Z 2kZ.eng.srt

5.2 KB

Threshold Linearly Homomorphic Encryption on Z 2kZ.mp4

1.7 MB

Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.eng.srt

3.5 KB

Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.mp4

1.1 MB

Towards Practical Topology-Hiding Computation.mp4

4.5 MB

Towards Tight Security Bounds for OMAC, XCBC and TMAC.eng.srt

4.1 KB

Towards Tight Security Bounds for OMAC, XCBC and TMAC.mp4

1.6 MB

Triply Adaptive UC NIZK.eng.srt

13.7 KB

Triply Adaptive UC NIZK.mp4

4.8 MB

Unconditionally Secure NIZK in the Fine-Grained Setting.eng.srt

8.1 KB

Unconditionally Secure NIZK in the Fine-Grained Setting.mp4

3.0 MB

Universal Ring Signatures in the Standard Model.eng.srt

7.1 KB

Universal Ring Signatures in the Standard Model.mp4

2.3 MB

YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.eng.srt

14.9 KB

YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.mp4

4.7 MB

Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.eng.srt

6.8 KB

Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.mp4

3.1 MB

/Crypto/Crypto 2011/

1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).mp4

15.9 MB

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.mp4

16.2 MB

A New Variant of PMAC - Beyond the Birthday Bound.mp4

36.4 MB

Analyzing Blockwise Lattice Algorithms using Dynamical Systems.mp4

16.6 MB

Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.mp4

15.6 MB

Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).mp4

18.4 MB

Bi-Deniable Public-Key Encryption.mp4

21.1 MB

Classical Cryptographic Protocols in a Quantum World.mp4

16.8 MB

Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).mp4

23.9 MB

Constant-Rate Oblivious Transfer from Noisy Channels.mp4

17.6 MB

Cryptanalysis of PrintCIPHER.mp4

15.7 MB

Cryptography with Tamperable and Leaky Memory (Crypto 2011).mp4

17.9 MB

Fully Homomorphic Encryption over the Integers with Shorter Public Keys.mp4

19.6 MB

Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).mp4

17.7 MB

Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4

53.7 MB

Inverting HFE Systems is Quasi-Polynomial for All Fields.mp4

21.0 MB

Leakage-Resilient Zero Knowledge (Crypto 2011).mp4

17.6 MB

Leftover Hash Lemma, Revisited (Crypto 2011).mp4

24.4 MB

McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.mp4

16.5 MB

Memory Delegation (Crypto 2011).mp4

17.5 MB

Merkle Puzzles in a Quantum World.mp4

18.1 MB

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.mp4

19.4 MB

Optimal Verification of Operations on Dynamic Sets (Crypto 2011).mp4

18.5 MB

Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.mp4

19.0 MB

Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).mp4

18.3 MB

Physically Uncloneable Functions in the Universal Composition Framework.mp4

18.5 MB

Position-Based Quantum Cryptography - Impossibility and Constructions.mp4

22.4 MB

Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.mp4

34.5 MB

Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.mp4

19.9 MB

Random Oracle Reducibility (Crypto 2011).mp4

13.7 MB

Round Optimal Blind Signatures in the Standard Model.mp4

18.1 MB

Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).mp4

20.7 MB

Smaller Decoding Exponents - Ball-Collision Decoding.mp4

20.9 MB

The Collision Security of Tandem-DM in the Ideal Cipher Model.mp4

18.0 MB

The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).mp4

21.6 MB

The PHOTON Family of Lightweight Hash Functions (Crypto 2011).mp4

17.5 MB

The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.mp4

19.2 MB

Time-Lock Puzzles in the Random Oracle Model.mp4

19.1 MB

Tor and Circumvention - Lessons Learned, by Roger Dingledine.mp4

64.4 MB

Verifiable Delegation of Computation over Large Datasets (Crypto 2011).mp4

18.9 MB

/.../Crypto 2011 Rump Sessions/

(More) Efficient Secure Computation from Garbled Circuits.mp4

5.1 MB

A brief chat about approximate GCDs.mp4

4.3 MB

A silent competition for ultra-fast public key cryptography.mp4

3.2 MB

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.mp4

4.7 MB

An Application Of Frequency Shift Keying To Communication Resynchronisation.mp4

1.6 MB

An historical call for papers.mp4

5.2 MB

An update about HiDalgo.mp4

4.3 MB

Biclique cryptanalysis of the full AES.mp4

7.0 MB

Blinding ballot copying in Helios - from Condorcet to IACR.mp4

4.2 MB

Bounds on Cloud File Retrievability.mp4

3.2 MB

Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.mp4

6.4 MB

Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.mp4

5.8 MB

Extreme Threshold Cryptosystems.mp4

5.3 MB

FlipIt and the Cramér-Rao bound.mp4

3.7 MB

HBN - An HB-like protocol secure against Man-in-the-Middle attacks.mp4

5.3 MB

Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).mp4

5.8 MB

Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.mp4

4.8 MB

NIST Announcements.mp4

5.0 MB

Non-Malleable Codes in the Split-State Model.mp4

4.0 MB

Observations on H-PRESENT-128.mp4

3.8 MB

Panel discussion on leakage.mp4

2.2 MB

Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.mp4

2.4 MB

Predicate Encryption for Inner Products from LWE.mp4

3.3 MB

Pseudorandom Functions and Lattices.mp4

4.8 MB

Remotegrity.mp4

5.2 MB

Rethinking IDEA.mp4

4.0 MB

Robust Coin Flipping.mp4

5.9 MB

Secure Computation with Sublinear Amortized Work.mp4

4.7 MB

Secure Verification of Delegated Presentation Delivery.mp4

3.1 MB

The 2011 IACR Fellowship Induction Ceremony.mp4

13.1 MB

The Garden-Hose Model.mp4

4.8 MB

The Hunting of the SNARK.mp4

4.8 MB

Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.mp4

4.8 MB

Variants of Sponge-like Construction.mp4

3.3 MB

/Crypto/Crypto 2012/

A New Approach to Practical Active-Secure Two-Party Comp.mp4

10.5 MB

Actively Secure Two-Party Evaluation of Any Quantum Oper.mp4

19.1 MB

Adaptively Secure Multi-Party Computation with Dishonest.mp4

14.5 MB

An Enciphering Scheme Based on a Card Shuffle.mp4

17.8 MB

Black-Box Constructions of Composable Protocols without.mp4

15.4 MB

Breaking and Repairing GCM Security Proofs.mp4

18.5 MB

Collusion-Preserving Computation.mp4

22.7 MB

Crowd-Blending Privacy.mp4

12.6 MB

Differential Privacy with Imperfect Randomness.mp4

19.5 MB

Dynamic Credentials and Ciphertext Delegation for Attrib.mp4

14.6 MB

Efficient Dissection of Composite Problems, with Applica.mp4

29.2 MB

Efficient Padding Oracle Attacks on Cryptographic Hardware.mp4

19.1 MB

Fully Homomorphic Encryption without Modulus Switching f.mp4

21.2 MB

Functional Encryption for Regular Languages.mp4

12.1 MB

Functional Encryption with Bounded Collusions via Multi-.mp4

17.5 MB

Hardness of Computing Individual Bits for One-Way Functi.mp4

17.0 MB

Hash Functions Based on Three Permutations - A Generic Se.mp4

16.4 MB

Homomorphic Evaluation of the AES Circuit.mp4

22.0 MB

Multi-instance Security and Its Application to Password-.mp4

14.3 MB

Multiparty Computation from Somewhat Homomorphic Encryption.mp4

12.3 MB

Must You Know the Code of f to Securely Compute f.mp4

19.1 MB

Near-Linear Unconditionally-Secure Multiparty Computatio.mp4

19.5 MB

New Impossibility Results for Concurrent Composition and.mp4

10.4 MB

New Preimage Attacks against Reduced SHA-1.mp4

7.9 MB

On the Distribution of Linear Biases - Three Instructive.mp4

15.8 MB

On the Impossibility of Constructing Efficient Key Encap.mp4

17.4 MB

On the Security of TLS-DHE in the Standard Model.mp4

16.5 MB

Pinning Down - Privacy - in Statistical Databases.mp4

87.4 MB

Public Keys.mp4

17.2 MB

Quantum to Classical Randomness Extractors.mp4

16.5 MB

Resistance against Iterated Attacks by Decorrelation Rev.mp4

16.2 MB

Secret Sharing Schemes for Very Dense Graphs.mp4

18.6 MB

Secure Identity-Based Encryption in the Quantum Random O.mp4

16.4 MB

Securing Circuits against Constant-Rate Tampering.mp4

15.7 MB

Semantic Security for the Wiretap Channel.mp4

12.9 MB

Stam's Conjecture and Threshold Phenomena in Collision R.mp4

12.6 MB

Substitution-Permutation Networks, Pseudorandom Function.mp4

25.4 MB

Succinct Arguments from Multi-prover Interactive Proofs.mp4

17.8 MB

Tamper and Leakage Resilience in the Split-State Model.mp4

14.9 MB

The Curious Case of Non-Interactive Commitments - On the.mp4

18.4 MB

The End of Crypto.mp4

72.4 MB

Tightly Secure Signatures and Public-Key Encryption.mp4

13.8 MB

To Hash or Not to Hash Again (In)Differentiability Resu.mp4

15.8 MB

Tweakable Blockciphers with Beyond Birthday-Bound Security.mp4

15.9 MB

Universal Composability from Essentially Any Trusted Setup.mp4

16.5 MB

Welcome to Crypto 2012.mp4

5.0 MB

/Crypto/Crypto 2013/

A Uniform Min-Max Theorem with Applications in Cryptography.mp4

22.9 MB

Accuracy-Privacy Tradeoffs for Two-Party Differentially.mp4

14.2 MB

Achieving the Limits of the Noisy-Storage Model Using En.mp4

25.9 MB

An Algebraic Framework for Diffie-Hellman Assumptions.mp4

28.1 MB

Attribute-Based Encryption for Circuits from Multilinear.mp4

24.3 MB

Construction of Differential Characteristics in ARX Desi.mp4

26.6 MB

Counter-Cryptanalysis.mp4

36.5 MB

Digital Signatures with Minimal Overhead from Indifferen.mp4

28.5 MB

Efficient Multiparty Protocols via Log-Depth Threshold F.mp4

26.2 MB

Encoding Functions with Constant Online Rate or How to C.mp4

30.7 MB

Everlasting Multi-party Computation.mp4

31.2 MB

Fast Cut-and-Choose Based Protocols for Malicious and Co.mp4

15.6 MB

Full Domain Hash from (Leveled) Multilinear Maps and Ide.mp4

21.0 MB

Functional Encryption - New Perspectives and Lower Bounds.mp4

22.4 MB

Hard-Core Predicates for a Diffie-Hellman Problem over F.mp4

27.7 MB

Hardness of SIS and LWE with Small Parameters.mp4

27.4 MB

Highly-Scalable Searchable Symmetric Encryption with Sup.mp4

35.7 MB

Homomorphic Encryption from Learning with Errors - Concep.mp4

28.2 MB

How to Run Turing Machines on Encrypted Data.mp4

26.9 MB

Improved OT Extension for Transferring Short Secrets.mp4

18.0 MB

Instantiating Random Oracles via UCEs.mp4

24.2 MB

Leakage-Resilient Symmetric Cryptography under Empirical.mp4

30.2 MB

Learning with Rounding, Revisited - New Reduction, Prope.mp4

20.8 MB

Limits of Provable Security for Homomorphic Encryption.mp4

25.0 MB

Limits on the Power of Cryptographic Cheap Talk.mp4

19.3 MB

New Techniques for SPHFs and Efficient One-Round PAKE Pr.mp4

28.7 MB

Non-malleable Codes from Two-Source Extractors.mp4

21.1 MB

On Fair Exchange, Fair Coins and Fair Sampling - YouTube.mp4

15.2 MB

On the Achievability of Simulation-Based Security for Fu.mp4

22.7 MB

On the Indifferentiability of Key-Alternating Ciphers.mp4

27.0 MB

Optimal Coding for Streaming Authentication and Interact.mp4

19.5 MB

Plain versus Randomized Cascading-Based Key-Length Exten.mp4

25.7 MB

Practical Bootstrapping in Quasilinear Time.mp4

22.3 MB

Practical Multilinear Maps over the Integers.mp4

25.5 MB

Programmable Hash Functions in the Multilinear Setting.mp4

23.7 MB

Quantum One-Time Programs - (Extended Abstract).mp4

26.2 MB

Real Time Cryptanalysis of Bluetooth Encryption with Con.mp4

36.2 MB

Secret Sharing, Rank Inequalities and Information Inequa.mp4

26.5 MB

Secure Computation against Adaptive Auxiliary Information.mp4

26.7 MB

Secure Signatures and Chosen Ciphertext Security in a Qu.mp4

21.7 MB

Sieve-in-the-Middle - Improved MITM Attacks.mp4

29.3 MB

SNARKs for C - Verifying Program Executions Succinctly an.mp4

27.8 MB

The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.mp4

28.6 MB

Time-Optimal Interactive Proofs for Circuit Evaluation.mp4

28.6 MB

What Information Is Leaked under Concurrent Composition.mp4

22.7 MB

/.../Crypto 2013 Rump Session/

Spying NSA (reprise)..mp4

8.7 MB

Spying NSA.mp4

8.6 MB

Under Surveillance.mp4

7.0 MB

/Crypto/Crypto 2014/

Algorithms in HElib.mp4

11.6 MB

Amplifying Privacy in Privacy Amplification.mp4

16.2 MB

Automated Analysis of Cryptographic Assumptions in Generic Group Models.mp4

16.4 MB

Block Ciphers - Focus on the Linear Layer (feat. PRIDE).mp4

13.6 MB

Breaking '128-bit Secure' Supersingular Binary Curves.mp4

15.3 MB

Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.mp4

12.6 MB

Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.mp4

17.7 MB

Cryptography from Compression Functions - The UCE Bridge to the ROM.mp4

18.0 MB

Cryptography with Streaming Algorithms.mp4

13.6 MB

Dishonest Majority Multi-Party Computation for Binary Circuits.mp4

11.1 MB

Faster Bootstrapping with Polynomial Error.mp4

12.7 MB

FleXOR - Flexible garbling for XOR gates that beats free-XOR.mp4

14.4 MB

Hardness of k-LWE and Applications in Traitor Tracing.mp4

17.3 MB

Hierarchical Identity Based Encryption from Affine Messafe Authentication.mp4

10.4 MB

Homomorphic Signatures with Efficient Verification for Polynomial Functions.mp4

17.5 MB

How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.mp4

10.4 MB

How to Use Bitcoin to Design Fair Protocols.mp4

19.5 MB

IACR Distinguished Lecture - Caught in Between Theory and Practice.mp4

65.6 MB

Improved Generic Attacks against Hash-Based MACs and HAIFA.mp4

17.5 MB

Improved Short Lattice Signatures in the Standard Model.mp4

13.7 MB

Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.mp4

18.3 MB

Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.mp4

6.7 MB

Interactive Proofs under Continual Memory Leakage.mp4

15.7 MB

Invited Talk - How to delegate computations - the power of no-signaling proofs.mp4

38.1 MB

Leakage-Tolerant Computation with Input-Independent Preprocessing.mp4

15.4 MB

Low Overhead Broadcast Encryption from Multilinear Maps.mp4

19.8 MB

Maliciously Circuit-Private FHE.mp4

10.8 MB

Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.mp4

13.4 MB

Minimizing the Two-Round Even-Mansour Cipher.mp4

16.8 MB

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.mp4

5.7 MB

New and Improved Key-Homomorphic Pseudorandom Functions.mp4

15.5 MB

Non-Interactive Secure Multiparty Computation.mp4

15.2 MB

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.mp4

8.9 MB

On Virtual Grey Box Obfuscation for General Circuits.mp4

13.7 MB

Optimal Non-perfect Uniform Secret Sharing Schemes.mp4

15.8 MB

Physical Zero-Knowledge Proofs of Physical Properties.mp4

15.8 MB

Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.mp4

19.6 MB

Proving the TLS Handshake Secure (As It Is).mp4

15.7 MB

Quantum Position Verification in the Random Oracle Model.mp4

10.3 MB

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.mp4

9.0 MB

Round-Efficient Black-Box Construction of Composable Multi-Party Computation.mp4

15.0 MB

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.mp4

20.0 MB

Scalable Zero Knowledge via Cycles of Elliptic Curves.mp4

15.0 MB

Secure Multi-Party Computation with Identifiable Abort.mp4

17.6 MB

Security Analysis of Multilinear Maps over the Integers.mp4

19.2 MB

Security of Symmetric Encryption against Mass Surveillance.mp4

16.9 MB

Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.mp4

13.0 MB

Single-Shot Security for One-Time Memories in the Isolated Qubits Model.mp4

13.6 MB

Structure-Preserving Signatures from Type II Pairings.mp4

13.6 MB

The Exact PRF-Security of NMAC and HMAC.mp4

19.3 MB

The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.mp4

15.8 MB

The Security of Multiple Encryption in the Ideal Cipher Model.mp4

12.5 MB

Updates on Generic Attacks against HMAC and NMAC.mp4

18.0 MB

/Crypto/Crypto 2015/

A Punctured Programming Approach to Adaptive Security in Functional Encryption.mp4

12.9 MB

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.mp4

19.7 MB

Algebriac Decomposition for Probing Security.mp4

20.1 MB

Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.mp4

22.1 MB

An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.mp4

9.9 MB

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.mp4

16.0 MB

Arguments of Proximity.mp4

16.0 MB

Bilinear Entropy Expansion from the Decisional Linear Assumption.mp4

11.8 MB

Bit Commitment schemes with Non Signaling Adversaries.mp4

11.4 MB

Bloom Filters in Adversarial Environments.mp4

15.7 MB

Capacity and Data Complexity in Multidimensional Linear Attack.mp4

16.9 MB

Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.mp4

10.8 MB

Concurrent Secure Computation via Non Black Box Simulation.mp4

15.6 MB

Concurrent Secure Computation with Optimal Query Complexity.mp4

18.7 MB

Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.mp4

11.7 MB

Constant Round MPC with Fairness and Guarantee of Output Delivery.mp4

14.2 MB

Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.mp4

22.9 MB

Cryptanalysis of the Co ACD Assumption.mp4

16.1 MB

Cryptography with One Way Communication.mp4

14.3 MB

Cryptography, Security, and Public Safety A Policy Perspective.mp4

24.2 MB

Data Is a Stream Security of Stream Based Channels.mp4

18.1 MB

Decaf Eliminating Cofactors Through Quotients and Isogenies.mp4

14.6 MB

Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.mp4

17.0 MB

Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.mp4

18.6 MB

Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.mp4

16.3 MB

Efficient Pseudorandom Functions via On the Fly Adaptation.mp4

10.7 MB

Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.mp4

13.2 MB

Explicit Non malleable Codes against Bit wise Tampering adn Permutations.mp4

12.8 MB

Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.mp4

20.9 MB

From Selective to Adaptive Security in Functional Encryption.mp4

14.1 MB

Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.mp4

9.9 MB

Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.mp4

13.9 MB

Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.mp4

18.7 MB

Indistinguishability Obfuscation from Compact Functional Encryption.mp4

12.7 MB

Integral Cryptanalysis on Full MISTY1.mp4

21.6 MB

Known key Distinguisher on Full PRESENT.mp4

15.3 MB

Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.mp4

16.1 MB

Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.mp4

13.7 MB

Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.mp4

17.4 MB

Malicious for free OT Extension The Pipe is the Limit.mp4

13.9 MB

Multi Identity and Multi Key Leveled FHE from Learning with Errors.mp4

25.4 MB

Multi Key Security The Even Mansour Construction Revisted.mp4

12.1 MB

New Attacks on Feistel Structures with Improved Memory Complexities.mp4

26.3 MB

Observations on the SIMON Block Cipher Family.mp4

10.1 MB

Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.mp4

21.5 MB

Parallel Hashing via List Recoverability.mp4

15.2 MB

PoW Based Distributed Cryptography with no Trusted Setup.mp4

16.2 MB

Practical Free Start Collision Attacks on the 76 Step SHA 1.mp4

16.6 MB

Practical Round Optimal Blind Signatures in the Standard Model.mp4

13.2 MB

Predicate Encryption for Circuits from LWE.mp4

15.7 MB

Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.mp4

17.4 MB

Proofs of Space.mp4

17.4 MB

Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.mp4

15.1 MB

Secure Computation from Leaky Correlated Randomness.mp4

14.3 MB

Secure Computation with Minimal Interaction, Revisited.mp4

23.9 MB

Statistical Concurrent Non malleable Zero knowledfe from One way Functions.mp4

20.3 MB

The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.mp4

17.4 MB

The Iterated Random Permutation Problem with Applications to Cascade Encryption.mp4

12.6 MB

The State of Cryptographic Multilinear Maps.mp4

36.8 MB

Tweaking Even Mansour Ciphers.mp4

15.7 MB

Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.mp4

15.1 MB

/Crypto/Crypto 2016/

A 270 Attack on the Full MISTY1.eng.srt

16.5 KB

A 270 Attack on the Full MISTY1.mp4

22.2 MB

A Practical Cryptanalysis of the Algebraic Eraser.eng.srt

38.8 KB

A Practical Cryptanalysis of the Algebraic Eraser.mp4

29.6 MB

A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.mp4

35.1 MB

Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.mp4

35.3 MB

Adaptively Secure Garbled Circuits from One Way Functions.eng.srt

39.0 KB

Adaptively Secure Garbled Circuits from One Way Functions.mp4

44.3 MB

Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.mp4

28.3 MB

Akamai Faster Forward - Crypto at Scale.eng.srt

93.9 KB

Akamai Faster Forward - Crypto at Scale.mp4

57.4 MB

Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.eng.srt

42.1 KB

Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.mp4

43.2 MB

Another View of the Division Property.eng.srt

38.8 KB

Another View of the Division Property.mp4

34.4 MB

Automatic Search of Meet in the Middle and Impossible Differential Attacks.eng.srt

28.3 KB

Automatic Search of Meet in the Middle and Impossible Differential Attacks.mp4

33.0 MB

Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.eng.srt

39.1 KB

Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.mp4

24.9 MB

Big Key Symmetric Encryption - Resisting Key Exfiltration.eng.srt

39.6 KB

Big Key Symmetric Encryption - Resisting Key Exfiltration.mp4

22.0 MB

Bounded Indistinguishability and the Complexity of Recovering Secrets.eng.srt

38.8 KB

Bounded Indistinguishability and the Complexity of Recovering Secrets.mp4

42.3 MB

Breaking Symmetric Cryptosystems using Quantum Period Finding.eng.srt

42.2 KB

Breaking Symmetric Cryptosystems using Quantum Period Finding.mp4

37.9 MB

Breaking the Circuit Size Barrier for Secure Computation Under DDH.eng.srt

47.2 KB

Breaking the Circuit Size Barrier for Secure Computation Under DDH.mp4

29.9 MB

Concurrent Non Malleable Commitments and More in 3 Rounds.mp4

33.5 MB

Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.eng.srt

38.4 KB

Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.mp4

42.7 MB

Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.eng.srt

26.4 KB

Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.mp4

36.7 MB

Cryptanalysis of GGH15 Multilinear Maps.eng.srt

38.6 KB

Cryptanalysis of GGH15 Multilinear Maps.mp4

48.4 MB

Cryptanalysis of the FLIP Family of Stream Ciphers.eng.srt

30.0 KB

Cryptanalysis of the FLIP Family of Stream Ciphers.mp4

19.2 MB

Crypto 2016 Rump Session Part 1.eng.srt

79.7 KB

Crypto 2016 Rump Session Part 1.mp4

74.9 MB

Crypto 2016 Rump session part 2..eng.srt

75.9 KB

Crypto 2016 Rump session part 2.mp4

78.1 MB

Crypto 2016 Rump session part 3..eng.srt

88.1 KB

Crypto 2016 Rump session part 3.mp4

83.1 MB

Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.mp4

22.4 MB

Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.mp4

36.4 MB

Efficient Algorithms for Supersingular Isogeny Diffie Hellman.eng.srt

52.6 KB

Efficient Algorithms for Supersingular Isogeny Diffie Hellman.mp4

49.9 MB

Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.mp4

27.9 MB

Efficiently Computing Data Independent Memory Hard Functions.eng.srt

41.5 KB

Efficiently Computing Data Independent Memory Hard Functions.mp4

35.9 MB

Encryption Switching Protocols.eng.srt

39.6 KB

Encryption Switching Protocols.mp4

32.6 MB

EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.eng.srt

26.3 KB

EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.mp4

37.7 MB

Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.mp4

44.8 MB

FHE Circuit Privacy Almost For Free.eng.srt

24.5 KB

FHE Circuit Privacy Almost For Free.mp4

23.1 MB

Fine grained Cryptography.mp4

27.5 MB

How to Prove Knowledge of Small Secrets.eng.srt

34.6 KB

How to Prove Knowledge of Small Secrets.mp4

42.3 MB

Indifferentiability of 8 Round Feistel Networks.eng.srt

30.3 KB

Indifferentiability of 8 Round Feistel Networks.mp4

27.2 MB

Key Wrapping for Cryptographic APIs.mp4

48.4 MB

Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.eng.srt

25.1 KB

Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.mp4

29.1 MB

Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.mp4

21.9 MB

Lightweight Multiplication in GF2n with Applications to MDS Matrices.eng.srt

27.8 KB

Lightweight Multiplication in GF2n with Applications to MDS Matrices.mp4

26.8 MB

Linicrypt - A Model for Practical Cryptography.eng.srt

35.7 KB

Linicrypt - A Model for Practical Cryptography.mp4

43.2 MB

Memory Efficient Algorithms for Finding Needles in Haystacks.mp4

31.2 MB

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.eng.srt

45.8 KB

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.mp4

24.1 MB

Network Hiding Communication and Applications to Multi Party Protocols.eng.srt

33.7 KB

Network Hiding Communication and Applications to Multi Party Protocols.mp4

39.6 MB

Network Oblivious Transfer.eng.srt

35.9 KB

Network Oblivious Transfer.mp4

40.3 MB

New Insights on AES Like SPN Ciphers.eng.srt

21.9 KB

New Insights on AES Like SPN Ciphers.mp4

25.7 MB

Obfuscation Combiners.eng.srt

35.7 KB

Obfuscation Combiners.mp4

38.9 MB

Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.eng.srt

125.5 KB

Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.mp4

122.0 MB

On Statistically Secure Obfuscation with Approximate Correctness.eng.srt

32.0 KB

On Statistically Secure Obfuscation with Approximate Correctness.mp4

34.4 MB

On the Communication required for Unconditionally Secure Multiplication.mp4

42.9 MB

On the Power of Secure Two Party Computation.eng.srt

40.5 KB

On the Power of Secure Two Party Computation.mp4

45.3 MB

On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.eng.srt

43.9 KB

On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.mp4

37.9 MB

Optimal Security Proofs for Signatures from Identification Schemes.eng.srt

32.2 KB

Optimal Security Proofs for Signatures from Identification Schemes.mp4

29.7 MB

ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.eng.srt

11.0 KB

ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.mp4

21.5 MB

Probabilistic Termination and Composability of Cryptographic Protocols.mp4

52.7 MB

Programmable Hash Functions from Lattices.mp4

45.6 MB

Quantum Homomorphic Encryption for Polynomial sized Circuits.eng.srt

39.5 KB

Quantum Homomorphic Encryption for Polynomial sized Circuits.mp4

36.7 MB

Rate 1, Linear Time and Additively Homomorphic UC Commitments.eng.srt

38.2 KB

Rate 1, Linear Time and Additively Homomorphic UC Commitments.mp4

44.5 MB

Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.mp4

41.7 MB

Secure Protocol Transformations.eng.srt

19.8 KB

Secure Protocol Transformations.mp4

31.2 MB

Semantic Security and Indistinguishability in the Quantum World.eng.srt

37.3 KB

Semantic Security and Indistinguishability in the Quantum World.mp4

47.8 MB

Separate Separations of CPA and Circular Security for Any Cycle Length.eng.srt

34.2 KB

Separate Separations of CPA and Circular Security for Any Cycle Length.mp4

33.6 MB

The Magic of ELFs.eng.srt

37.2 KB

The Magic of ELFs.mp4

27.9 MB

The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.eng.srt

45.6 KB

The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.mp4

31.9 MB

The SKINNY Family of Lightweight Tweakable Block Ciphers.eng.srt

32.4 KB

The SKINNY Family of Lightweight Tweakable Block Ciphers.mp4

34.9 MB

Towards Sound Fresh Re Keying with Hard Physical Learning Problems.eng.srt

28.6 KB

Towards Sound Fresh Re Keying with Hard Physical Learning Problems.mp4

23.7 MB

Two Message Oblivious Evaluation of Cryptographic Functionalities.eng.srt

29.8 KB

Two Message Oblivious Evaluation of Cryptographic Functionalities.mp4

46.9 MB

TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.eng.srt

39.7 KB

TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.mp4

44.2 MB

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.mp4

44.0 MB

Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.eng.srt

37.3 KB

Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.mp4

43.3 MB

XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.eng.srt

41.1 KB

XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.mp4

30.2 MB

/.../Crypto 2016 Rump Session/

Crypto 2016 Rump Session Part 1.mp4

74.9 MB

Crypto 2016 Rump session part 2..mp4

76.8 MB

Crypto 2016 Rump session part 3..mp4

81.5 MB

/Crypto/Crypto 2017/

A Formal Treatment of Multi key Channels.eng.srt

31.5 KB

A Formal Treatment of Multi key Channels.mp4

31.4 MB

A New Approach to Round Optimal Secure Multiparty Computation.eng.srt

34.7 KB

A New Approach to Round Optimal Secure Multiparty Computation.mp4

27.4 MB

A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.eng.srt

45.8 KB

A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.mp4

41.6 MB

Amortization with Fewer Equations for Proving Knowledge of Small Secrets.eng.srt

30.6 KB

Amortization with Fewer Equations for Proving Knowledge of Small Secrets.mp4

29.2 MB

Anonymous Attestation with Subverted TPMs.eng.srt

34.1 KB

Anonymous Attestation with Subverted TPMs.mp4

39.0 MB

Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.eng.srt

30.2 KB

Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.mp4

46.5 MB

Be Adaptive, Avoid Overcommitting.eng.srt

38.6 KB

Be Adaptive, Avoid Overcommitting.mp4

41.6 MB

Bitcoin as a Transaction Ledger - A Composable Treatment.eng.srt

30.8 KB

Bitcoin as a Transaction Ledger - A Composable Treatment.mp4

26.3 MB

Black Box Parallel Garbled RAM.eng.srt

47.8 KB

Black Box Parallel Garbled RAM.mp4

39.9 MB

Boosting Authenticated Encryption Robustness With Minimal Modifications.eng.srt

41.0 KB

Boosting Authenticated Encryption Robustness With Minimal Modifications.mp4

52.8 MB

Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.eng.srt

41.0 KB

Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.mp4

41.8 MB

Compact Structure Preserving Signatures with Almost Tight Security.eng.srt

30.6 KB

Compact Structure Preserving Signatures with Almost Tight Security.mp4

41.9 MB

Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.eng.srt

44.9 KB

Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.mp4

42.3 MB

Conditional Disclosure of Secrets via Non Linear Reconstruction.eng.srt

26.4 KB

Conditional Disclosure of Secrets via Non Linear Reconstruction.mp4

35.3 MB

Cube Attacks on Non Blackbox Polynomials Based on Division Property.eng.srt

29.7 KB

Cube Attacks on Non Blackbox Polynomials Based on Division Property.mp4

44.0 MB

Degree Evaluation of NFSR Based Cryptosystems.eng (2).eng.srt

22.0 KB

Degree Evaluation of NFSR Based Cryptosystems.mp4

34.6 MB

Distinguisher Dependent Simulation in Two Rounds and Its Applications.mp4

45.5 MB

Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.eng.srt

42.5 KB

Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.mp4

42.1 MB

Encryption switching protocols revisited - switching modulo p.eng.srt

28.3 KB

Encryption switching protocols revisited - switching modulo p.mp4

36.2 MB

Fast Secure Two Party ECDSA Signing.eng.srt

43.0 KB

Fast Secure Two Party ECDSA Signing.mp4

45.8 MB

Four Round Concurrent Non Malleable Commitments from One Way Functions.eng.srt

46.6 KB

Four Round Concurrent Non Malleable Commitments from One Way Functions.mp4

47.0 MB

From Obfuscation to the Security of Fiat Shamir for Proofs.eng.srt

44.6 KB

From Obfuscation to the Security of Fiat Shamir for Proofs.mp4

57.5 MB

Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.eng.srt

26.9 KB

Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.mp4

37.1 MB

Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.eng.srt

37.4 KB

Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.mp4

40.1 MB

Generic Transformations of Predicate Encodings - Constructions and Applications.eng.srt

36.7 KB

Generic Transformations of Predicate Encodings - Constructions and Applications.mp4

39.1 MB

Hedging Public Key Encryption in the Real World.eng.srt

38.3 KB

Hedging Public Key Encryption in the Real World.mp4

28.0 MB

Identity based Encryption from Codes with Rank Metric.eng.srt

27.4 KB

Identity based Encryption from Codes with Rank Metric.mp4

33.0 MB

Identity Based Encryption from the Diffie Hellman Assumption.eng.srt

38.3 KB

Identity Based Encryption from the Diffie Hellman Assumption.mp4

29.1 MB

Incremental Program Obfuscation.eng.srt

44.2 KB

Incremental Program Obfuscation.mp4

43.9 MB

Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.eng.srt

40.9 KB

Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.mp4

34.3 MB

Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.eng.srt

48.2 KB

Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.mp4

54.8 MB

Information theoretic Indistinguishability via the Chi squared Method.eng.srt

47.8 KB

Information theoretic Indistinguishability via the Chi squared Method.mp4

48.0 MB

Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.eng.srt

45.5 KB

Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.mp4

48.2 MB

Joint presentation.eng.srt

32.1 KB

Joint presentation.mp4

48.4 MB

Key Rotation for Authenticated Encryption.eng.srt

43.4 KB

Key Rotation for Authenticated Encryption.mp4

41.7 MB

Kurosawa Desmedt Meets Tight Security.eng.srt

36.0 KB

Kurosawa Desmedt Meets Tight Security.mp4

37.7 MB

Laconic Oblivious Transfer and its Applications.eng.srt

37.1 KB

Laconic Oblivious Transfer and its Applications.mp4

39.1 MB

Lower Bounds on Obfuscation from All or Nothing Encryption.eng.srt

37.6 KB

Lower Bounds on Obfuscation from All or Nothing Encryption.mp4

32.9 MB

LPN Decoded.eng.srt

38.3 KB

LPN Decoded.mp4

35.9 MB

Memory Tight Reductions.eng.srt

34.1 KB

Memory Tight Reductions.mp4

32.4 MB

Message Franking via Committing Authenticated Encryption.eng.srt

42.3 KB

Message Franking via Committing Authenticated Encryption.mp4

41.0 MB

Middle Product Learning With Errors.mp4

30.2 MB

New security notions and feasibility results for authentication of quantum data.eng.srt

41.0 KB

New security notions and feasibility results for authentication of quantum data.mp4

41.1 MB

Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.eng.srt

22.0 KB

Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.mp4

32.4 MB

Non Malleable Codes for Space Bounded Tampering.eng.srt

32.3 KB

Non Malleable Codes for Space Bounded Tampering.mp4

31.7 MB

Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.eng.srt

38.1 KB

Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.mp4

48.5 MB

Ouroboros - A Provably Secure Proof of Stake Protocol.eng.srt

45.8 KB

Ouroboros - A Provably Secure Proof of Stake Protocol.mp4

35.1 MB

Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.eng.srt

33.4 KB

Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.mp4

27.0 MB

PRF ODH - Relations, Instantiations, and Impossibility Results.eng.srt

31.1 KB

PRF ODH - Relations, Instantiations, and Impossibility Results.mp4

28.9 MB

Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.eng.srt

25.8 KB

Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.mp4

20.3 MB

Private Multiplication over Finite Fields.eng.srt

40.2 KB

Private Multiplication over Finite Fields.mp4

31.8 MB

Prospects for a Quantum Factoring Machine.eng.srt

79.2 KB

Prospects for a Quantum Factoring Machine.mp4

65.0 MB

Proving Resistance against Invariant Attacks - How to Choose the Round Constants.mp4

43.7 MB

Quantum non malleability and authentication.eng.srt

37.9 KB

Quantum non malleability and authentication.mp4

47.8 MB

Quantum Security of NMAC and Related Constructions.eng.srt

41.9 KB

Quantum Security of NMAC and Related Constructions.mp4

51.5 MB

Ratcheted Encryption and Key Exchange - The Security of Messaging.eng.srt

36.4 KB

Ratcheted Encryption and Key Exchange - The Security of Messaging.mp4

41.0 MB

Robust Non Interactive Multiparty Computation Against Constant Size Collusion.mp4

32.5 MB

Secure Computation based on Leaky Correlations - High Resilience Setting.eng.srt

24.3 KB

Secure Computation based on Leaky Correlations - High Resilience Setting.mp4

30.2 MB

Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.mp4

36.0 MB

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.mp4

34.9 MB

Structure vs Hardness through the Obfuscation Lens.eng.srt

34.0 KB

Structure vs Hardness through the Obfuscation Lens.mp4

33.4 MB

The Bitcoin Backbone Protocol with Chains of Variable Difficulty.mp4

41.3 MB

The first collision for full SHA 1.eng.srt

52.1 KB

The first collision for full SHA 1.mp4

40.5 MB

The Price of Low Communication in Secure Multi Party Computation.eng.srt

50.4 KB

The Price of Low Communication in Secure Multi Party Computation.mp4

45.8 MB

The TinyTable protocol or - Gate scrambling Revisited.eng.srt

26.0 KB

The TinyTable protocol or - Gate scrambling Revisited.mp4

23.4 MB

Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.eng.srt

37.0 KB

Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.mp4

46.4 MB

Topology Hiding Computation on All Graphs.eng.srt

34.5 KB

Topology Hiding Computation on All Graphs.mp4

30.9 MB

Two papers on Indistinguishability Obfuscation (soft merge).eng.srt

42.2 KB

Two papers on Indistinguishability Obfuscation (soft merge).mp4

44.5 MB

Verified Drop in Replacements for TLS&HTTPS.mp4

77.5 MB

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.eng.srt

60.4 KB

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.mp4

43.0 MB

ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.eng.srt

32.0 KB

ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.mp4

43.3 MB

/.../Crypto 2017 Rump Session/

Blockchains and consensus protocols Snake oil warning.mp4

8.9 MB

Browser Security with a Grain of Salt.mp4

7.9 MB

Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.mp4

7.5 MB

Delegatable Anonymous Credentials from Mercurial Signatures.mp4

7.6 MB

Forty years and still running.mp4

14.5 MB

From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.mp4

6.6 MB

How not to pay with Bitcoin.mp4

8.3 MB

IACR Award Ceremony.mp4

14.7 MB

Implementing Provably Secure Detection of Direct Injection Attacks.mp4

8.1 MB

Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.mp4

3.9 MB

Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.mp4

3.5 MB

Lockable Obfuscation.mp4

9.1 MB

Magallanes.mp4

7.7 MB

Make Crypto Not Maps.mp4

5.8 MB

May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.mp4

10.8 MB

NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.mp4

9.5 MB

Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.mp4

7.1 MB

Program Chair's Report by Jonathan Katz.mp4

8.6 MB

Proofs of Work for Blockchain Protocols.mp4

3.0 MB

Quantum Computing Threat or Menace.mp4

3.8 MB

Real world zkSNARKs updates on Zcash, libsnark.mp4

11.6 MB

Report from ECC 2017.mp4

5.0 MB

Security and Composition of Rational Cryptographic Protocols.mp4

5.7 MB

Self Correcting Random Oracles and Its Cliptographic Applications.mp4

7.9 MB

Separable Statistics, New Extension to Linear Cryptanalysis.mp4

5.7 MB

Test of Time Award for the best Rump Session Presentation.mp4

9.3 MB

The early history of blockchains.mp4

8.2 MB

The JMAC MAC.mp4

5.4 MB

The Sound of Quantum.mp4

2.9 MB

Top secret A world of codes and ciphers an exhibition.mp4

3.1 MB

/Crypto/Crypto 2018/

A Key recovery Attack on 855 round Trivium.eng.srt

19.1 KB

A Key recovery Attack on 855 round Trivium.mp4

15.8 MB

A New Public Key Cryptosystem via Mersenne Numbers.eng.srt

47.2 KB

A New Public Key Cryptosystem via Mersenne Numbers.mp4

28.9 MB

A Simple Obfuscation Scheme for Pattern Matching with Wildcards.eng.srt

65.1 KB

A Simple Obfuscation Scheme for Pattern Matching with Wildcards.mp4

31.5 MB

Amortized Complexity of Information Theoretically Secure MPC Revisted.eng.srt

55.8 KB

Amortized Complexity of Information Theoretically Secure MPC Revisted.mp4

37.1 MB

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.eng.srt

50.2 KB

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.mp4

38.2 MB

Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.eng.srt

65.6 KB

Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.mp4

34.8 MB

CAPA The Spirit of Beaver Against Physical Attacks.eng.srt

59.5 KB

CAPA The Spirit of Beaver Against Physical Attacks.mp4

54.3 MB

Combiners for Backdoored Random Oracles.eng.srt

43.7 KB

Combiners for Backdoored Random Oracles.mp4

19.7 MB

Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.mp4

42.5 MB

Contrained PRFs for NC1 in Traditional Groups.eng.srt

58.9 KB

Contrained PRFs for NC1 in Traditional Groups.mp4

34.6 MB

Correcting Subverted Random Oracles.eng.srt

65.0 KB

Correcting Subverted Random Oracles.mp4

42.1 MB

Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.eng.srt

58.8 KB

Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.mp4

39.8 MB

Cryptanalysis via Algebraic Spans.eng.srt

57.8 KB

Cryptanalysis via Algebraic Spans.mp4

35.3 MB

Crypto - A Key Ingredient to Building Respectful Products.eng.srt

131.8 KB

Crypto - A Key Ingredient to Building Respectful Products.mp4

70.9 MB

Dissection BKW.eng.srt

55.1 KB

Dissection BKW.mp4

29.2 MB

Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.eng.srt

56.0 KB

Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.mp4

29.3 MB

Fast Correlation Attack Revisted.eng.srt

46.3 KB

Fast Correlation Attack Revisted.mp4

28.1 MB

Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.eng.srt

58.0 KB

Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.mp4

32.1 MB

Fast Homomorphic Evaluation of Deep Discretized Neural Networks.eng.srt

61.9 KB

Fast Homomorphic Evaluation of Deep Discretized Neural Networks.mp4

35.1 MB

Fast Large Scale Honest Majority MPC for Malicious Adversaries.eng.srt

61.6 KB

Fast Large Scale Honest Majority MPC for Malicious Adversaries.mp4

36.6 MB

Fast Message Franking From Invisible Salamanders to Encryptment.eng.srt

63.5 KB

Fast Message Franking From Invisible Salamanders to Encryptment.mp4

40.9 MB

Faster Homomorphic Linear Transformations in HElib.eng.srt

63.4 KB

Faster Homomorphic Linear Transformations in HElib.mp4

42.7 MB

From Idea to Impact, the Crypto Story - What's Next.eng.srt

207.1 KB

From Idea to Impact, the Crypto Story - What's Next.mp4

109.5 MB

From Laconic Zero Knowledge to Public Key Cryptography.eng.srt

58.9 KB

From Laconic Zero Knowledge to Public Key Cryptography.mp4

33.7 MB

Generic Attacks Against Beyond Birthday Bound MACs.mp4

38.7 MB

GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.eng.srt

65.3 KB

GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.mp4

35.2 MB

Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.eng.srt

83.8 KB

Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.mp4

32.4 MB

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.eng.srt

52.2 KB

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.mp4

9.7 MB

IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.eng.srt

35.1 KB

IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.mp4

23.0 MB

Indifferentiable Authenticated Encryption.eng.srt

47.9 KB

Indifferentiable Authenticated Encryption.mp4

28.8 MB

Lattice Based Zero Knowledge Arguments for Integer Relations.eng.srt

58.6 KB

Lattice Based Zero Knowledge Arguments for Integer Relations.mp4

48.4 MB

Limits of Practical Sublinear Secure Computation.eng.srt

64.2 KB

Limits of Practical Sublinear Secure Computation.mp4

20.7 MB

Limits on the Power of Garbling Techniques for Public Key Encryption.eng.srt

60.4 KB

Limits on the Power of Garbling Techniques for Public Key Encryption.mp4

33.5 MB

Lower Bounds on Lattice Enumeration with Extreme Pruning.mp4

37.5 MB

Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.eng.srt

55.2 KB

Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.mp4

32.5 MB

Multi Theorem Preprocessing NIZKs from Lattices.eng.srt

70.6 KB

Multi Theorem Preprocessing NIZKs from Lattices.mp4

32.4 MB

Must the Communication Graph of MPC Protocols be an Expander.eng.srt

46.5 KB

Must the Communication Graph of MPC Protocols be an Expander.mp4

33.5 MB

Non Interactive Zero Knowledge Proofs for Composite Statements.eng.srt

57.1 KB

Non Interactive Zero Knowledge Proofs for Composite Statements.mp4

25.5 MB

Non Malleable Codes for Partial Functions with Manipulation Detection.eng.srt

55.1 KB

Non Malleable Codes for Partial Functions with Manipulation Detection.mp4

32.8 MB

Non Malleable Secret Sharing for General Access Structures.mp4

42.2 MB

Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.eng.srt

54.7 KB

Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.mp4

23.3 MB

On Distributional Collision Resistant Hashing.eng.srt

58.2 KB

On Distributional Collision Resistant Hashing.mp4

35.5 MB

On the Complexity of Compressing Obfuscation.eng.srt

60.9 KB

On the Complexity of Compressing Obfuscation.mp4

34.2 MB

On the Exact Round Complexity of Secure Three Party Computation.eng.srt

63.4 KB

On the Exact Round Complexity of Secure Three Party Computation.mp4

33.0 MB

On the Local Leakage Resilience of Linear Secret Sharing Schemes.eng.srt

61.5 KB

On the Local Leakage Resilience of Linear Secret Sharing Schemes.mp4

27.9 MB

On the Round Complexity of OT Extension.eng.srt

57.4 KB

On the Round Complexity of OT Extension.mp4

28.9 MB

On Tightly Secure Non Interactive Key Exchange.eng.srt

56.4 KB

On Tightly Secure Non Interactive Key Exchange.mp4

41.4 MB

Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.eng.srt

47.3 KB

Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.mp4

41.2 MB

Optimizing Authenticated Garbling for Faster Secure Two Party Computation.eng.srt

69.7 KB

Optimizing Authenticated Garbling for Faster Secure Two Party Computation.mp4

31.2 MB

Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.eng.srt

66.4 KB

Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.mp4

20.5 MB

Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.eng.srt

51.2 KB

Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.mp4

38.9 MB

Private Circuits A Modular Approach.eng.srt

57.3 KB

Private Circuits A Modular Approach.mp4

26.9 MB

Promise Zero Knowledge and its Applications to Round Optimal MPC.mp4

16.2 MB

Proofs of Work from Worst Case Assumptions.eng.srt

63.2 KB

Proofs of Work from Worst Case Assumptions.mp4

34.1 MB

Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.eng.srt

51.5 KB

Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.mp4

24.0 MB

Pseudorandom Quantum States.eng.srt

49.7 KB

Pseudorandom Quantum States.mp4

33.7 MB

Quantum FHE Almost As Secure As Classical.eng.srt

81.6 KB

Quantum FHE Almost As Secure As Classical.mp4

38.3 MB

Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.eng.srt

43.2 KB

Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.mp4

23.8 MB

Round Optimal Secure Multi Party Computation.eng.srt

30.0 KB

Round Optimal Secure Multi Party Computation.mp4

18.7 MB

Round Optimal Secure Multiparty Computation with Honest Majority.eng.srt

50.1 KB

Round Optimal Secure Multiparty Computation with Honest Majority.mp4

23.4 MB

Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.mp4

28.0 MB

Simplifying Game Based Definitions.eng.srt

48.6 KB

Simplifying Game Based Definitions.mp4

33.5 MB

SPDZ2k Efficient MPC mod 2k for Dishonest Majority.eng.srt

83.8 KB

SPDZ2k Efficient MPC mod 2k for Dishonest Majority.mp4

35.6 MB

Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.eng.srt

55.5 KB

Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.mp4

22.7 MB

The Algebraic Group Model and its Applications.mp4

24.2 MB

The Curse of Small Domains New Attacks on Format Preserving Encryption.eng.srt

42.8 KB

The Curse of Small Domains New Attacks on Format Preserving Encryption.mp4

41.2 MB

Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.eng.srt

56.6 KB

Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.mp4

15.2 MB

Tight Tradeoffs in Searchable Symmetric Encryption.eng.srt

24.5 KB

Tight Tradeoffs in Searchable Symmetric Encryption.mp4

17.9 MB

TinyKeys A New Approach to Efficient Multi Party Computation.eng.srt

57.8 KB

TinyKeys A New Approach to Efficient Multi Party Computation.mp4

36.8 MB

Towards Bidirectional Ratcheted Key Exchange.eng.srt

58.7 KB

Towards Bidirectional Ratcheted Key Exchange.mp4

40.5 MB

Trapdoor Functions from the Computational Diffie Hellman Assumption.eng.srt

50.8 KB

Trapdoor Functions from the Computational Diffie Hellman Assumption.mp4

19.0 MB

Two Round Multiparty Secure Computation Minimizing Public Key Operations.eng.srt

55.3 KB

Two Round Multiparty Secure Computation Minimizing Public Key Operations.mp4

36.9 MB

Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.eng.srt

47.5 KB

Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.mp4

27.1 MB

Verifiable Delay Functions.eng.srt

56.7 KB

Verifiable Delay Functions.mp4

30.0 MB

Yes, There is an Oblivious RAM Lower Bound.mp4

32.2 MB

Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.eng.srt

44.0 KB

Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.mp4

18.3 MB

/.../Crypto 2018 Rump Session/

A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.eng.srt

6.6 KB

A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.mp4

3.1 MB

A small problem Regarding permutations.mp4

3.3 MB

Account Management and Stake Pools in Proof of Stake Ledgers.eng.srt

11.5 KB

Account Management and Stake Pools in Proof of Stake Ledgers.mp4

7.6 MB

Adversarial Correctness Favors Laziness.mp4

4.2 MB

Attestation as a Service (AaaS).eng.srt

21.0 KB

Attestation as a Service (AaaS).mp4

11.6 MB

Blockchain and the Identity Problem.eng.srt

4.0 KB

Blockchain and the Identity Problem.mp4

4.2 MB

Blockchain.eng.srt

5.8 KB

Blockchain.mp4

6.3 MB

Bodka Not V, But B.eng.srt

5.9 KB

Bodka Not V, But B.mp4

3.9 MB

Computational Ring LWR problem.mp4

2.7 MB

Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.eng.srt

4.8 KB

Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.mp4

3.4 MB

Empowering Protocols Secure reporting of serial perpetrators of sexual assault.eng.srt

12.6 KB

Empowering Protocols Secure reporting of serial perpetrators of sexual assault.mp4

6.0 MB

How to Mimic Nakamoto's Design via Proof of stake and more.eng.srt

10.9 KB

How to Mimic Nakamoto's Design via Proof of stake and more.mp4

7.5 MB

IACR Award Ceremony.eng.srt

44.9 KB

IACR Award Ceremony.mp4

51.6 MB

In memory attacks at crypto currency wallets.eng.srt

8.6 KB

In memory attacks at crypto currency wallets.mp4

5.4 MB

Kahn Ni Melm - John Steinbeck's Secret Language.eng.srt

19.0 KB

Kahn Ni Melm - John Steinbeck's Secret Language.mp4

9.3 MB

Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.mp4

7.4 MB

Laconic Function Evaluation.eng.srt

10.2 KB

Laconic Function Evaluation.mp4

5.1 MB

Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.eng.srt

9.9 KB

Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.mp4

6.5 MB

NIST Update.eng.srt

23.3 KB

NIST Update.mp4

11.6 MB

nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.eng.srt

8.7 KB

nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.mp4

5.5 MB

Obfuscation Using Tensor Products.eng.srt

12.3 KB

Obfuscation Using Tensor Products.mp4

9.0 MB

PQCzoo Post Quantum Beasts and Where to Find Them.eng.srt

5.5 KB

PQCzoo Post Quantum Beasts and Where to Find Them.mp4

3.1 MB

Prime and Prejudice Primality Testing Under Adversarial Conditions.eng.srt

12.7 KB

Prime and Prejudice Primality Testing Under Adversarial Conditions.mp4

7.0 MB

RISC V Foundation Security Standing Committee Call to action.eng.srt

7.6 KB

RISC V Foundation Security Standing Committee Call to action.mp4

4.8 MB

Robust Property Preserving Hashes.eng.srt

7.8 KB

Robust Property Preserving Hashes.mp4

4.4 MB

RSA-OAEP without Random Oracles, Featuring Eminem.eng.srt

15.4 KB

RSA-OAEP without Random Oracles, Featuring Eminem.mp4

7.5 MB

Secure MPC Laziness Leads to GOD.eng.srt

10.6 KB

Secure MPC Laziness Leads to GOD.mp4

4.6 MB

Setup Free SNARKs from Hidden Order Groups.eng.srt

9.6 KB

Setup Free SNARKs from Hidden Order Groups.mp4

5.8 MB

SoK A Consensus Taxonomy in the Blockchain Era.eng.srt

20.9 KB

SoK A Consensus Taxonomy in the Blockchain Era.mp4

11.6 MB

Stand up Crypto Comedy.eng.srt

8.2 KB

Stand up Crypto Comedy.mp4

5.5 MB

Statistical Ineffective Fault Attacks.mp4

3.2 MB

Surveillance from Brussels Privacy at UCSB CAM for fun.eng.srt

7.0 KB

Surveillance from Brussels Privacy at UCSB CAM for fun.mp4

4.3 MB

Synesthesia.eng.srt

10.1 KB

Synesthesia.mp4

6.2 MB

The CERES Project Campaign to Enhance Research Experience.eng.srt

7.6 KB

The CERES Project Campaign to Enhance Research Experience.mp4

3.8 MB

The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.eng.srt

7.1 KB

The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.mp4

4.2 MB

The Danish Crypto Choir - Don't Worry, Be Happy.eng.srt

5.6 KB

The Danish Crypto Choir - Don't Worry, Be Happy.mp4

11.4 MB

Theory of Cryptography Conference Test-of-Time Award Recipients.mp4

3.8 MB

Towards a general classification framework for cryptocurrency.mp4

9.9 MB

What does the SHARK say.eng.srt

12.4 KB

What does the SHARK say.mp4

7.2 MB

Zero Knowledge Standardization.eng.srt

6.3 KB

Zero Knowledge Standardization.mp4

3.7 MB

/Crypto/Crypto 2019/

ABE for DFA from k-Lin.eng.srt

27.1 KB

ABE for DFA from k-Lin.mp4

15.9 MB

Adaptively Secure MPC with Sublinear Communication Complexity.eng.srt

46.0 KB

Adaptively Secure MPC with Sublinear Communication Complexity.mp4

29.9 MB

Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.eng.srt

39.2 KB

Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.mp4

28.8 MB

Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.eng.srt

42.2 KB

Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.mp4

25.0 MB

BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.eng.srt

34.3 KB

BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.mp4

23.9 MB

BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.eng.srt

37.0 KB

BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.mp4

26.9 MB

BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.eng.srt

41.1 KB

BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.mp4

32.9 MB

Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.eng.srt

37.3 KB

Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.mp4

24.4 MB

CCA Security and Trapdoor Functions via Key-Dependent-Message Security.mp4

24.7 MB

Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.eng.srt

45.5 KB

Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.mp4

41.8 MB

Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.eng.srt

29.0 KB

Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.mp4

29.7 MB

Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.eng.srt

37.8 KB

Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.mp4

41.0 MB

Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.eng.srt

29.2 KB

Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.mp4

22.2 MB

Cryptographic Sensing.mp4

31.4 MB

Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.eng.srt

42.9 KB

Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.mp4

42.8 MB

Efficient Collision Attack Frameworks for RIPEMD-160.eng.srt

22.8 KB

Efficient Collision Attack Frameworks for RIPEMD-160.mp4

16.4 MB

Efficient Pseudorandom Correlation Generators Silent OT Extension and More.eng.srt

43.3 KB

Efficient Pseudorandom Correlation Generators Silent OT Extension and More.mp4

46.3 MB

Explicit Rate-1 Non-malleable Codes for Local Tampering.eng.srt

30.3 KB

Explicit Rate-1 Non-malleable Codes for Local Tampering.mp4

24.3 MB

Exploring Constructions of Compact NIZKs from Various Assumptions.eng.srt

38.2 KB

Exploring Constructions of Compact NIZKs from Various Assumptions.mp4

36.9 MB

Highly Efficient Key Exchange Protocols with Optimal Tightness.eng.srt

36.2 KB

Highly Efficient Key Exchange Protocols with Optimal Tightness.mp4

27.0 MB

Homomorphic Time-Lock Puzzles and Applications.eng.srt

37.5 KB

Homomorphic Time-Lock Puzzles and Applications.mp4

33.0 MB

How to Build Pseudorandom Functions from Public Random Permutations.eng.srt

26.6 KB

How to Build Pseudorandom Functions from Public Random Permutations.mp4

17.9 MB

How to Record Quantum Queries, and Applications to Quantum Indifferentiability.eng.srt

34.7 KB

How to Record Quantum Queries, and Applications to Quantum Indifferentiability.mp4

30.4 MB

Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.eng.srt

38.6 KB

Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.mp4

22.8 MB

Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.eng.srt

42.1 KB

Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.mp4

38.8 MB

Invited talk Contextual Integrity.eng.srt

98.2 KB

Invited talk Contextual Integrity.mp4

41.8 MB

Invited talk Secure computation When theory meets.eng.srt

115.4 KB

Invited talk Secure computation When theory meets.mp4

108.4 MB

It Wasn't Me.eng.srt

41.5 KB

It Wasn't Me.mp4

29.8 MB

Joint Presentation on Lattices at Crypto 2019.eng.srt

39.5 KB

Joint Presentation on Lattices at Crypto 2019.mp4

48.7 MB

Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.eng.srt

42.2 KB

Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.mp4

42.1 MB

Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.eng.srt

44.6 KB

Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.mp4

8.6 MB

Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.eng.srt

37.9 KB

Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.mp4

30.8 MB

Match Me if You Can Matchmaking Encryption and Its Applications.eng.srt

34.2 KB

Match Me if You Can Matchmaking Encryption and Its Applications.mp4

18.6 MB

Memory-Hard Functions from Cryptographic Primitives.eng.srt

46.0 KB

Memory-Hard Functions from Cryptographic Primitives.mp4

40.0 MB

New Constructions of Reusable Designated-Verifier NIZKs.eng.srt

44.8 KB

New Constructions of Reusable Designated-Verifier NIZKs.mp4

33.1 MB

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.eng.srt

20.5 KB

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.mp4

36.4 MB

Non-interactive Non-malleability from Quantum Supremacy.eng.srt

42.1 KB

Non-interactive Non-malleability from Quantum Supremacy.mp4

30.1 MB

Non-malleable Codes for Decision Trees.eng.srt

36.4 KB

Non-malleable Codes for Decision Trees.mp4

35.3 MB

Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.eng.srt

35.6 KB

Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.mp4

19.7 MB

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.eng.srt

45.2 KB

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.mp4

24.3 MB

Nonces Are Noticed AEAD Revisited.eng.srt

33.7 KB

Nonces Are Noticed AEAD Revisited.mp4

22.3 MB

Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.eng.srt

37.5 KB

Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.mp4

41.0 MB

On Round Optimal Statistical Zero Knowledge Arguments.eng.srt

34.7 KB

On Round Optimal Statistical Zero Knowledge Arguments.mp4

30.0 MB

On the Plausibility of Fully Homomorphic Encryption for RAMs.eng.srt

35.9 KB

On the Plausibility of Fully Homomorphic Encryption for RAMs.mp4

45.9 MB

On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.eng.srt

38.4 KB

On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.mp4

34.4 MB

Proofs of Replicated Storage Without Timing Assumptions.eng.srt

36.7 KB

Proofs of Replicated Storage Without Timing Assumptions.mp4

15.5 MB

Public-Key Cryptography in the Fine-Grained Setting.eng.srt

40.0 KB

Public-Key Cryptography in the Fine-Grained Setting.mp4

31.5 MB

Quantum Indistinguishability of Random Sponges.eng.srt

30.1 KB

Quantum Indistinguishability of Random Sponges.mp4

22.1 MB

Quantum Security Proofs Using Semi-classical Oracles.eng.srt

48.7 KB

Quantum Security Proofs Using Semi-classical Oracles.mp4

34.9 MB

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.eng.srt

43.4 KB

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.mp4

18.6 MB

Reusable Non-Interactive Secure Computation.eng.srt

37.8 KB

Reusable Non-Interactive Secure Computation.mp4

27.0 MB

Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.eng.srt

37.4 KB

Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.mp4

24.1 MB

Seedless Fruit Is the Sweetest Random Number Generation, Revisited.eng.srt

39.8 KB

Seedless Fruit Is the Sweetest Random Number Generation, Revisited.mp4

24.1 MB

Shared presentation at Crypto 2019.eng.srt

56.2 KB

Shared presentation at Crypto 2019.mp4

34.5 MB

Shared presentation on Fiat-Shamir security at Crypto 2019.eng.srt

44.9 KB

Shared presentation on Fiat-Shamir security at Crypto 2019.mp4

46.9 MB

Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..eng.srt

51.8 KB

Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019..mp4

29.1 MB

Shared presentation on Zero Knowledge at Crypto 2019.eng.srt

36.6 KB

Shared presentation on Zero Knowledge at Crypto 2019.mp4

38.5 MB

Simple Proofs of Space-Time and Rational Proofs of Storage.eng.srt

33.2 KB

Simple Proofs of Space-Time and Rational Proofs of Storage.mp4

19.7 MB

Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.eng.srt

37.2 KB

Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.mp4

35.2 MB

SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.eng.srt

24.7 KB

SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.mp4

39.5 MB

Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.eng.srt

25.8 KB

Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.mp4

18.0 MB

Strong Asymmetric PAKE Based on Trapdoor CKEM.eng.srt

39.0 KB

Strong Asymmetric PAKE Based on Trapdoor CKEM.mp4

25.0 MB

Symmetric Primitives with Structured Secrets.eng.srt

33.8 KB

Symmetric Primitives with Structured Secrets.mp4

21.3 MB

Synchronous, with a Chance of Partition Tolerance.eng.srt

34.0 KB

Synchronous, with a Chance of Partition Tolerance.mp4

18.6 MB

The Communication Complexity of Threshold Private Set Intersection.eng.srt

41.3 KB

The Communication Complexity of Threshold Private Set Intersection.mp4

33.5 MB

The Distinction Between Fixed and Random Generators in Group-Based Assumptions.eng.srt

46.7 KB

The Distinction Between Fixed and Random Generators in Group-Based Assumptions.mp4

40.4 MB

The Privacy Blanket of the Shuffle Model.eng.srt

37.0 KB

The Privacy Blanket of the Shuffle Model.mp4

38.1 MB

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.eng.srt

34.1 KB

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.mp4

26.7 MB

Trapdoor Hash Functions and Their Applications.eng.srt

40.9 KB

Trapdoor Hash Functions and Their Applications.mp4

31.9 MB

Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.eng.srt

38.4 KB

Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.mp4

31.1 MB

Unconditionally Secure Computation Against Low-Complexity Leakage.eng.srt

42.1 KB

Unconditionally Secure Computation Against Low-Complexity Leakage.mp4

24.1 MB

Unifying Computational Entropies via Kullback-Leibler Divergence.eng.srt

43.3 KB

Unifying Computational Entropies via Kullback-Leibler Divergence.mp4

37.8 MB

Unifying Leakage Models on a Renyi Day.mp4

22.6 MB

Universally Composable Secure Computation with Corrupted Tokens.eng.srt

33.9 KB

Universally Composable Secure Computation with Corrupted Tokens.mp4

39.3 MB

Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.eng.srt

46.8 KB

Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.mp4

31.8 MB

Watermarking Public-Key Cryptographic Primitives.eng.srt

41.8 KB

Watermarking Public-Key Cryptographic Primitives.mp4

19.5 MB

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.eng.srt

45.0 KB

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.mp4

35.4 MB

/.../Crypto 2019 Rump Session/

48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.eng.srt

9.5 KB

48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.mp4

7.7 MB

A new Paradigm Shift for the Crypto BlockChain Proof of Ability.mp4

4.9 MB

Algebraically Structured LWE, Revisited.mp4

6.6 MB

Asymmetric distributed trust.eng.srt

10.0 KB

Asymmetric distributed trust.mp4

8.8 MB

Bringing Verifiable Delay Functions Into Production.mp4

4.6 MB

Cards Against Cryptography.eng.srt

3.5 KB

Cards Against Cryptography.mp4

3.3 MB

Collusion Preserving Computation without a Mediator.eng.srt

6.3 KB

Collusion Preserving Computation without a Mediator.mp4

8.0 MB

Cryptanalyzing the Legendre PRF.eng.srt

4.5 KB

Cryptanalyzing the Legendre PRF.mp4

4.1 MB

DARPA Cryptographic Research.eng.srt

8.6 KB

DARPA Cryptographic Research.mp4

6.6 MB

decodingchallenge org.eng.srt

2.8 KB

decodingchallenge org.mp4

3.5 MB

DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.mp4

6.9 MB

He Gives C Sieves on the CSIDH.eng.srt

12.2 KB

He Gives C Sieves on the CSIDH.mp4

8.4 MB

Implementing Signal.mp4

8.7 MB

International Olympiad in Cryptography NSUCRYPTO.eng.srt

2.7 KB

International Olympiad in Cryptography NSUCRYPTO.mp4

3.7 MB

Key Words.eng.srt

8.1 KB

Key Words.mp4

8.9 MB

Microsoft's ElectionGuard.eng.srt

8.9 KB

Microsoft's ElectionGuard.mp4

8.6 MB

New Conference on Information Theoretic Cryptography (ITC).eng.srt

4.0 KB

New Conference on Information Theoretic Cryptography (ITC).mp4

3.3 MB

NIST Update.eng.srt

10.3 KB

NIST Update.mp4

9.1 MB

On parameter choices of Round5.eng.srt

3.0 KB

On parameter choices of Round5.mp4

4.1 MB

On the Round Complexity of Randomized Byzantine Agreement.eng.srt

4.3 KB

On the Round Complexity of Randomized Byzantine Agreement.mp4

4.6 MB

OPA.eng.srt

6.5 KB

OPA.mp4

7.5 MB

Opening and Borg Early Career Award (BECA) for Nadia Heninger.eng.srt

8.7 KB

Opening and Borg Early Career Award (BECA) for Nadia Heninger.mp4

9.4 MB

PQC Wiki.eng.srt

4.8 KB

PQC Wiki.mp4

4.1 MB

RSA Encraption.eng.srt

6.1 KB

RSA Encraption.mp4

5.8 MB

STARK friendly hash challenge.eng.srt

0.7 KB

STARK friendly hash challenge.mp4

1.2 MB

Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.eng.srt

6.1 KB

Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.mp4

4.7 MB

The Chia Proof of Space construction and implementation competition.eng.srt

1.5 KB

The Chia Proof of Space construction and implementation competition.mp4

1.4 MB

The Grand Unified Theory of Cryptology.eng.srt

3.3 KB

The Grand Unified Theory of Cryptology.mp4

3.2 MB

Trivial Real World Crypto.eng.srt

6.2 KB

Trivial Real World Crypto.mp4

5.7 MB

Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.eng.srt

11.0 KB

Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.mp4

6.6 MB

You are strong, FALCON, but we will break you.eng.srt

6.2 KB

You are strong, FALCON, but we will break you.mp4

6.0 MB

/Crypto/Crypto 2020/

A Classification of Computational Assumptions in the Algebraic Group Model.mp4

10.6 MB

A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.eng.srt

43.9 KB

A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.mp4

16.1 MB

A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.eng.srt

35.1 KB

A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.mp4

19.3 MB

A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.mp4

11.0 MB

A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.mp4

14.5 MB

Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.eng.srt

40.5 KB

Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.mp4

20.4 MB

Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.eng.srt

31.4 KB

Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.mp4

12.4 MB

Alzette a 64-bit ARX-box (feat. CRAX and TRAX).eng.srt

64.8 KB

Alzette a 64-bit ARX-box (feat. CRAX and TRAX).mp4

31.3 MB

Amplifying the Security of Functional Encryption, Unconditionally.eng.srt

49.3 KB

Amplifying the Security of Functional Encryption, Unconditionally.mp4

17.2 MB

Anonymous Tokens with Private Metadata Bit.eng.srt

42.0 KB

Anonymous Tokens with Private Metadata Bit.mp4

9.0 MB

Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.eng.srt

43.6 KB

Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.mp4

15.8 MB

Automatic Verification of Differential Characteristics Application to Reduced Gimli.eng.srt

31.4 KB

Automatic Verification of Differential Characteristics Application to Reduced Gimli.mp4

24.7 MB

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).eng.srt

32.0 KB

Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).mp4

12.3 MB

Black-Box Transformations from Passive to Covert Security with Public Verifiability.eng.srt

35.9 KB

Black-Box Transformations from Passive to Covert Security with Public Verifiability.mp4

8.3 MB

Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.eng.srt

44.0 KB

Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.mp4

19.9 MB

Collusion Resistant Watermarkable PRFs from Standard Assumptions.eng.srt

33.7 KB

Collusion Resistant Watermarkable PRFs from Standard Assumptions.mp4

12.9 MB

Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.eng.srt

46.3 KB

Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.mp4

38.8 MB

Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.eng.srt

38.5 KB

Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.mp4

12.3 MB

Cryptanalysis of LEDAcrypt.eng.srt

34.0 KB

Cryptanalysis of LEDAcrypt.mp4

19.5 MB

Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.eng.srt

41.9 KB

Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.mp4

23.5 MB

Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.eng.srt

42.4 KB

Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.mp4

18.0 MB

Cryptanalytic Extraction of Neural Network Models.eng.srt

55.5 KB

Cryptanalytic Extraction of Neural Network Models.mp4

20.1 MB

Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.eng.srt

137.3 KB

Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.mp4

58.2 MB

Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.eng.srt

33.5 KB

Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.mp4

15.0 MB

Dynamic Decentralized Functional Encryption.eng.srt

49.4 KB

Dynamic Decentralized Functional Encryption.mp4

20.9 MB

Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.eng.srt

48.7 KB

Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.mp4

16.5 MB

Efficient Pseudorandom Correlation Generators from Ring-LPN.eng.srt

42.3 KB

Efficient Pseudorandom Correlation Generators from Ring-LPN.mp4

10.3 MB

Fast and Secure Updatable Encryption.eng.srt

29.8 KB

Fast and Secure Updatable Encryption.mp4

10.7 MB

Fast reduction of algebraic lattices over cyclotomic fields.eng.srt

43.4 KB

Fast reduction of algebraic lattices over cyclotomic fields.mp4

20.5 MB

Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 o(k.eng.srt

50.5 KB

Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 o(k.mp4

17.6 MB

Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.eng.srt

65.3 KB

Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.mp4

19.7 MB

Fully Deniable Interactive Encryption.mp4

14.1 MB

Functional Encryption for Attribute-Weighted Sums from k-Lin.eng.srt

33.4 KB

Functional Encryption for Attribute-Weighted Sums from k-Lin.mp4

12.5 MB

Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.eng.srt

59.9 KB

Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.mp4

21.4 MB

Guaranteed Output Delivery Comes Free in Honest Majority MPC.eng.srt

45.9 KB

Guaranteed Output Delivery Comes Free in Honest Majority MPC.mp4

20.4 MB

Handling Adaptive Compromise for Practical Encryption Schemes.eng.srt

40.4 KB

Handling Adaptive Compromise for Practical Encryption Schemes.mp4

20.3 MB

Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.mp4

16.0 MB

Incompressible Encodings.eng.srt

53.1 KB

Incompressible Encodings.mp4

13.9 MB

Indifferentiability for Public Key Cryptosystems.eng.srt

40.7 KB

Indifferentiability for Public Key Cryptosystems.mp4

12.3 MB

Interactive Proofs for Social Graphs.eng.srt

46.1 KB

Interactive Proofs for Social Graphs.mp4

19.2 MB

Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.eng.srt

39.4 KB

Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.mp4

16.7 MB

Lattice-Based Blind Signatures, Revisited.mp4

9.8 MB

Leakage-Resilient Key Exchange and Two-Seed Extractors.mp4

18.4 MB

Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.eng.srt

60.3 KB

Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.mp4

18.9 MB

LWE with Side Information Attacks and Concrete Security Estimation.eng.srt

31.7 KB

LWE with Side Information Attacks and Concrete Security Estimation.mp4

18.4 MB

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.eng.srt

36.1 KB

Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.mp4

13.0 MB

MPC with Friends and Foes.eng.srt

38.2 KB

MPC with Friends and Foes.mp4

15.4 MB

Multiparty Generation of an RSA Modulus.eng.srt

53.3 KB

Multiparty Generation of an RSA Modulus.mp4

19.5 MB

Nearly Optimal Robust Secret Sharing against Rushing Adversaries.eng.srt

41.7 KB

Nearly Optimal Robust Secret Sharing against Rushing Adversaries.mp4

15.9 MB

New Constructions of Hinting PRGs, OWFs with Encryption, and more.mp4

15.9 MB

New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.eng.srt

49.0 KB

New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.mp4

20.2 MB

New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.eng.srt

43.8 KB

New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.mp4

16.0 MB

NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.eng.srt

54.7 KB

NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.mp4

23.1 MB

Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.eng.srt

51.3 KB

Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.mp4

12.3 MB

Non-Malleability against Polynomial Tampering.eng.srt

46.3 KB

Non-Malleability against Polynomial Tampering.mp4

15.0 MB

Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.eng.srt

36.1 KB

Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.mp4

12.8 MB

On Succinct Arguments and Witness Encryption from Groups.mp4

15.2 MB

Order-Fairness for Byzantine Consensus.eng.srt

53.7 KB

Order-Fairness for Byzantine Consensus.mp4

15.1 MB

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.eng.srt

56.6 KB

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.mp4

21.3 MB

Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.eng.srt

39.8 KB

Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.mp4

18.1 MB

Practical Product Proofs for Lattice Commitments.eng.srt

41.7 KB

Practical Product Proofs for Lattice Commitments.mp4

9.9 MB

Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.eng.srt

36.6 KB

Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.mp4

21.1 MB

Quantifying the Security Cost of Migrating Protocols to Practice.eng.srt

52.2 KB

Quantifying the Security Cost of Migrating Protocols to Practice.mp4

19.2 MB

Random Probing Security Verification, Composition, Expansion and New Constructions.eng.srt

45.5 KB

Random Probing Security Verification, Composition, Expansion and New Constructions.mp4

16.8 MB

Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.mp4

17.0 MB

Reverse Firewalls for Actively Secure MPCs.eng.srt

51.7 KB

Reverse Firewalls for Actively Secure MPCs.mp4

17.2 MB

Round-optimal Black-box Commit-and-prove with Succinct Communication.eng.srt

34.7 KB

Round-optimal Black-box Commit-and-prove with Succinct Communication.mp4

13.7 MB

Rounding in the Rings.eng.srt

45.5 KB

Rounding in the Rings.mp4

15.3 MB

s-1 Opening remarks Security Models.eng.srt

136.7 KB

s-1 Opening remarks Security Models.mp4

68.2 MB

s-4 Our Models and Us.eng.srt

113.9 KB

s-4 Our Models and Us.mp4

59.4 MB

s-6 Public-key, Functional, & Witness Encryption.eng.srt

126.1 KB

s-6 Public-key, Functional, & Witness Encryption.mp4

56.5 MB

s-10 Rump Session.eng.srt

279.7 KB

s-10 Rump Session.mp4

180.9 MB

s-12 Multiparty Computation 1.mp4

51.2 MB

s-14 Real-world Crypto.eng.srt

108.8 KB

s-14 Real-world Crypto.mp4

47.4 MB

s-16 Zero Knowledge Proofs.eng.srt

136.9 KB

s-16 Zero Knowledge Proofs.mp4

58.4 MB

s-20 NIZKs, Consensus, Delay Functions.eng.srt

92.4 KB

s-20 NIZKs, Consensus, Delay Functions.mp4

40.7 MB

s-22 Leakage and Outsourced Encryption.eng.srt

131.1 KB

s-22 Leakage and Outsourced Encryption.mp4

47.8 MB

s-26 Cryptanalysis 2.eng.srt

93.9 KB

s-26 Cryptanalysis 2.mp4

44.4 MB

s-28 Constructions.eng.srt

101.4 KB

s-28 Constructions.mp4

44.6 MB

s-30 Multiparty Computation 2.eng.srt

74.7 KB

s-30 Multiparty Computation 2.mp4

28.3 MB

s-118 Best Paper Awards Session.eng.srt

168.7 KB

s-118 Best Paper Awards Session.mp4

70.8 MB

s-121 Multiparty Computation 3.eng.srt

101.4 KB

s-121 Multiparty Computation 3.mp4

39.2 MB

s-124 Lattices and Related Problems.eng.srt

116.9 KB

s-124 Lattices and Related Problems.mp4

54.9 MB

s-126 Post Quantum Crypto 2.eng.srt

75.6 KB

s-126 Post Quantum Crypto 2.mp4

31.6 MB

s-128 Post Quantum Crypto 1.eng.srt

78.8 KB

s-128 Post Quantum Crypto 1.mp4

48.2 MB

s-130 Test of Time Award Ceremony Cryptanalysis 1.mp4

73.7 MB

Scalable Pseudorandom Quantum States.eng.srt

51.6 KB

Scalable Pseudorandom Quantum States.mp4

19.9 MB

Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.eng.srt

42.6 KB

Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.mp4

15.5 MB

Security Analysis of NIST CTR-DRBG.eng.srt

23.2 KB

Security Analysis of NIST CTR-DRBG.mp4

8.7 MB

Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.eng.srt

52.6 KB

Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.mp4

15.4 MB

Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.eng.srt

7.8 KB

Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.mp4

14.4 MB

Spartan Efficient and general-purpose zkSNARKs without trusted setup.eng.srt

29.5 KB

Spartan Efficient and general-purpose zkSNARKs without trusted setup.mp4

10.1 MB

Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.eng.srt

47.4 KB

Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.mp4

11.6 MB

The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.eng.srt

28.8 KB

The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.mp4

8.1 MB

The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.eng.srt

40.5 KB

The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.mp4

12.6 MB

The Memory-Tightness of Authenticated Encryption.eng.srt

42.7 KB

The Memory-Tightness of Authenticated Encryption.mp4

12.1 MB

The Summation-Truncation Hybrid Reusing Discarded Bits for Free.mp4

10.0 MB

Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.mp4

17.5 MB

Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.eng.srt

56.8 KB

Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.mp4

19.3 MB

Universally Composable Relaxed Password Authenticated Key Exchange.eng.srt

36.8 KB

Universally Composable Relaxed Password Authenticated Key Exchange.mp4

15.9 MB

Verifiable Registration-Based Encryption.mp4

18.5 MB

/Crypto/Crypto 2021/

A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.eng.srt

38.3 KB

A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.mp4

15.3 MB

A Compressed Sigma-Protocol Theory for Lattices.eng.srt

48.0 KB

A Compressed Sigma-Protocol Theory for Lattices.mp4

19.9 MB

A Logarithmic Lower Bound for Oblivious RAM (for all parameters).eng.srt

36.8 KB

A Logarithmic Lower Bound for Oblivious RAM (for all parameters).mp4

21.3 MB

A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.eng.srt

52.0 KB

A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.mp4

28.6 MB

A Rational Protocol Treatment of 51% Attacks.eng.srt

32.4 KB

A Rational Protocol Treatment of 51% Attacks.mp4

16.5 MB

Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.eng.srt

28.3 KB

Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.mp4

8.2 MB

An Algebraic Framework for Universal and Updatable SNARKs.eng.srt

43.3 KB

An Algebraic Framework for Universal and Updatable SNARKs.mp4

13.0 MB

Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I....eng.srt

30.7 KB

Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I....mp4

16.1 MB

ATLAS Efficient and Scalable MPC in the Honest Majority Setting.eng.srt

33.9 KB

ATLAS Efficient and Scalable MPC in the Honest Majority Setting.mp4

11.2 MB

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.eng.srt

34.3 KB

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.mp4

10.3 MB

Broadcast-Optimal Two Round MPC with an Honest Majority.eng.srt

25.3 KB

Broadcast-Optimal Two Round MPC with an Honest Majority.mp4

9.3 MB

Compact Ring Signatures from Learning With Errors.eng.srt

40.1 KB

Compact Ring Signatures from Learning With Errors.mp4

12.7 MB

Composition with Knowledge Assumptions.eng.srt

47.5 KB

Composition with Knowledge Assumptions.mp4

14.3 MB

Compressing Proofs of k-Out-Of-n Partial Knowledge.eng.srt

41.7 KB

Compressing Proofs of k-Out-Of-n Partial Knowledge.mp4

18.0 MB

Computational Hardness of Optimal Fair Computation Beyond Minicrypt.eng.srt

30.4 KB

Computational Hardness of Optimal Fair Computation Beyond Minicrypt.mp4

14.1 MB

Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.eng.srt

37.4 KB

Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.mp4

17.1 MB

Counterexamples to New Circular Security Assumptions Underlying iO.eng.srt

47.6 KB

Counterexamples to New Circular Security Assumptions Underlying iO.mp4

28.6 MB

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.eng.srt

34.4 KB

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.mp4

36.6 MB

Deniable Fully Homomorphic Encryption from Learning With Errors.eng.srt

30.2 KB

Deniable Fully Homomorphic Encryption from Learning With Errors.mp4

12.1 MB

Differential-Linear Cryptanalysis from an Algebraic Perspective.eng.srt

26.6 KB

Differential-Linear Cryptanalysis from an Algebraic Perspective.mp4

12.6 MB

Does Fiat-Shamir Require a Cryptographic Hash Function.eng.srt

44.8 KB

Does Fiat-Shamir Require a Cryptographic Hash Function.mp4

13.9 MB

DualRing Generic Construction of Ring Signatures with Efficient Instantiations.eng.srt

48.0 KB

DualRing Generic Construction of Ring Signatures with Efficient Instantiations.mp4

18.7 MB

Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.eng.srt

36.9 KB

Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.mp4

15.4 MB

Efficient Key Recovery for all HFE Signature Variants.mp4

16.6 MB

Fine-grained Secure Attribute-based Encryption.eng.srt

26.9 KB

Fine-grained Secure Attribute-based Encryption.mp4

9.8 MB

Fluid MPC Secure Multiparty Computation with Dynamic Participants.eng.srt

42.5 KB

Fluid MPC Secure Multiparty Computation with Dynamic Participants.mp4

17.2 MB

Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.mp4

19.3 MB

Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.eng.srt

65.7 KB

Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.mp4

25.6 MB

Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.eng.srt

50.1 KB

Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.mp4

18.6 MB

Hidden Cosets and Applications to Unclonable Cryptography.eng.srt

43.3 KB

Hidden Cosets and Applications to Unclonable Cryptography.mp4

13.3 MB

How to Meet Ternary LWE Keys.eng.srt

23.7 KB

How to Meet Ternary LWE Keys.mp4

16.2 MB

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.eng.srt

49.7 KB

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.mp4

16.4 MB

Improved Computational Extractors and their Applications.eng.srt

36.6 KB

Improved Computational Extractors and their Applications.mp4

12.8 MB

Improved torsion-point attacks on SIDH variants.eng.srt

36.3 KB

Improved torsion-point attacks on SIDH variants.mp4

15.0 MB

KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.eng.srt

44.0 KB

KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.mp4

22.1 MB

Large Message Homomorphic Secret Sharing from DCR and Applications.mp4

13.7 MB

Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo....eng.srt

45.0 KB

Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo....mp4

31.8 MB

Limits on the Adaptive Security of Yao’s Garbling.eng.srt

11.7 KB

Limits on the Adaptive Security of Yao’s Garbling.mp4

13.8 MB

Linear Cryptanalysis of FF3-1 and FEA.eng.srt

42.5 KB

Linear Cryptanalysis of FF3-1 and FEA.mp4

16.8 MB

Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].eng.srt

35.2 KB

Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].mp4

13.7 MB

Lower bounds on lattice sieving and information set decoding.eng.srt

41.3 KB

Lower bounds on lattice sieving and information set decoding.mp4

39.9 MB

Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction....eng.srt

50.1 KB

Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction....mp4

19.0 MB

Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.eng.srt

24.7 KB

Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.mp4

19.0 MB

MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.eng.srt

46.2 KB

MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.mp4

16.7 MB

MoSS Modular Security Specifications Framework.eng.srt

46.0 KB

MoSS Modular Security Specifications Framework.mp4

17.5 MB

MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica....eng.srt

48.3 KB

MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica....mp4

14.6 MB

Multi-Input Quadratic Functional Encryption from Pairings.eng.srt

31.5 KB

Multi-Input Quadratic Functional Encryption from Pairings.mp4

11.4 MB

Multi-theorem Designated-Verifier NIZK for QMA.eng.srt

49.5 KB

Multi-theorem Designated-Verifier NIZK for QMA.mp4

18.3 MB

MuSig2 Simple Two-Round Schnorr Multi-Signatures.eng.srt

43.4 KB

MuSig2 Simple Two-Round Schnorr Multi-Signatures.mp4

26.0 MB

New Approaches for Quantum Copy-Protection.eng.srt

39.3 KB

New Approaches for Quantum Copy-Protection.mp4

17.2 MB

No Time to HashOn Super-Efficient Entropy Accumulation.eng.srt

31.1 KB

No Time to HashOn Super-Efficient Entropy Accumulation.mp4

12.3 MB

Non-Interactive Batch Arguments for NP from Standard Assumptions.eng.srt

38.6 KB

Non-Interactive Batch Arguments for NP from Standard Assumptions.mp4

12.4 MB

Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien....eng.srt

31.5 KB

Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien....mp4

18.0 MB

Non-Malleable Codes for Bounded Parallel-Time Tampering.eng.srt

49.2 KB

Non-Malleable Codes for Bounded Parallel-Time Tampering.mp4

11.7 MB

Oblivious Key-Value Stores and Amplification for Private Set Intersection.eng.srt

45.7 KB

Oblivious Key-Value Stores and Amplification for Private Set Intersection.mp4

14.6 MB

Oblivious RAM with Worst-Case Logarithmic Overhead.eng.srt

40.8 KB

Oblivious RAM with Worst-Case Logarithmic Overhead.mp4

13.7 MB

On the Concurrent Composition of Quantum Zero-Knowledge.eng.srt

48.2 KB

On the Concurrent Composition of Quantum Zero-Knowledge.mp4

20.1 MB

On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.eng.srt

44.6 KB

On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.mp4

19.5 MB

On the Round Complexity of Black-Box Secure MPC.eng.srt

42.0 KB

On the Round Complexity of Black-Box Secure MPC.mp4

15.7 MB

On the Round Complexity of Secure Quantum Computation.eng.srt

51.1 KB

On the Round Complexity of Secure Quantum Computation.mp4

16.8 MB

On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.eng.srt

35.5 KB

On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.mp4

16.7 MB

One-Way Functions Imply Secure Computation in a Quantum World.eng.srt

46.7 KB

One-Way Functions Imply Secure Computation in a Quantum World.mp4

15.1 MB

Proof-Carrying Data without Succinct Arguments.eng.srt

47.0 KB

Proof-Carrying Data without Succinct Arguments.mp4

15.5 MB

Provable Security Analysis of FIDO2.mp4

17.1 MB

Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi....eng.srt

62.2 KB

Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi....mp4

21.1 MB

Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.eng.srt

26.7 KB

Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.mp4

12.3 MB

Quadratic Secret Sharing and Conditional Disclosure of Secrets.eng.srt

40.0 KB

Quadratic Secret Sharing and Conditional Disclosure of Secrets.mp4

14.6 MB

Quantum Collision Attacks on Reduced SHA-256 and SHA-512.mp4

20.0 MB

Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.eng.srt

32.1 KB

Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.mp4

13.9 MB

Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.eng.srt

36.6 KB

Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.mp4

19.3 MB

Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.eng.srt

50.6 KB

Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.mp4

28.6 MB

s-1 Opening Remarks Signatures.eng.srt

101.4 KB

s-1 Opening Remarks Signatures.mp4

51.8 MB

s-2 Invited Talk I (Vanessa Teague).eng.srt

134.6 KB

s-2 Invited Talk I (Vanessa Teague).mp4

71.8 MB

s-6 Quantum Cryptography 1.eng.srt

70.1 KB

s-6 Quantum Cryptography 1.mp4

34.8 MB

s-8 Award Papers.eng.srt

105.4 KB

s-8 Award Papers.mp4

46.9 MB

s-10 Lattice Cryptography.eng.srt

78.0 KB

s-10 Lattice Cryptography.mp4

41.7 MB

s-12 Lattice Cryptanalysis.eng.srt

95.0 KB

s-12 Lattice Cryptanalysis.mp4

51.7 MB

s-14 Quantum Cryptography 2.eng.srt

71.3 KB

s-14 Quantum Cryptography 2.mp4

43.1 MB

s-16 Models.eng.srt

47.8 KB

s-16 Models.mp4

29.3 MB

s-17 Invited Talk II (Jens Groth).eng.srt

105.4 KB

s-17 Invited Talk II (Jens Groth).mp4

47.8 MB

s-18 Succinct Arguments.eng.srt

103.2 KB

s-18 Succinct Arguments.mp4

54.2 MB

s-20 Cryptanalysis.eng.srt

70.0 KB

s-20 Cryptanalysis.mp4

45.6 MB

s-22 Cryptanalysis (continued).eng.srt

64.0 KB

s-22 Cryptanalysis (continued).mp4

41.2 MB

s-24 Codes and Extractors.eng.srt

95.2 KB

s-24 Codes and Extractors.mp4

48.8 MB

s-26 Multi-Party Computation 3.eng.srt

73.6 KB

s-26 Multi-Party Computation 3.mp4

35.9 MB

s-28 Encryption.eng.srt

103.9 KB

s-28 Encryption.mp4

50.0 MB

s-30 Foundations.eng.srt

71.7 KB

s-30 Foundations.mp4

30.5 MB

s-136 Quantum Cryptography 1 (continued).eng.srt

65.2 KB

s-136 Quantum Cryptography 1 (continued).mp4

33.3 MB

s-138 Signatures (continued).eng.srt

38.0 KB

s-138 Signatures (continued).mp4

21.7 MB

s-140 Multi-Party Computation 1.eng.srt

98.8 KB

s-140 Multi-Party Computation 1.mp4

50.2 MB

s-144 Multi-Party Computation 2.eng.srt

57.9 KB

s-144 Multi-Party Computation 2.mp4

26.8 MB

s-146 Multi-Party Computation 2 (continued).eng.srt

70.8 KB

s-146 Multi-Party Computation 2 (continued).mp4

41.9 MB

s-150 Secret Sharing.eng.srt

51.9 KB

s-150 Secret Sharing.mp4

27.9 MB

s-151 Applied Cryptography and Side Channels.eng.srt

78.7 KB

s-151 Applied Cryptography and Side Channels.mp4

45.8 MB

s-153 Crypto 2021 Rump Session.eng.srt

212.0 KB

s-153 Crypto 2021 Rump Session.mp4

139.5 MB

s-156 Secret Sharing (continued).eng.srt

48.8 KB

s-156 Secret Sharing (continued).mp4

24.9 MB

s-158 Zero-Knowledge.eng.srt

92.8 KB

s-158 Zero-Knowledge.mp4

52.6 MB

s-162 Foundations (continued).eng.srt

40.3 KB

s-162 Foundations (continued).mp4

20.0 MB

s-164 Low-Complexity Cryptography.eng.srt

55.8 KB

s-164 Low-Complexity Cryptography.mp4

33.2 MB

s-166 Protocols Wrap Up.eng.srt

88.9 KB

s-166 Protocols Wrap Up.mp4

48.9 MB

s-170 Test of Time Awards.eng.srt

17.5 KB

s-170 Test of Time Awards.mp4

13.7 MB

Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio....eng.srt

39.8 KB

Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio....mp4

13.4 MB

Secure Wire Shuffling in the Probing Model.eng.srt

26.6 KB

Secure Wire Shuffling in the Probing Model.mp4

14.1 MB

Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.eng.srt

42.4 KB

Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.mp4

20.1 MB

Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.eng.srt

51.2 KB

Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.mp4

14.9 MB

SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential....eng.srt

41.7 KB

SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential....mp4

16.7 MB

Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.eng.srt

32.7 KB

Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.mp4

13.4 MB

SSE and SSD Page-Efficient Searchable Symmetric Encryption.eng.srt

44.8 KB

SSE and SSD Page-Efficient Searchable Symmetric Encryption.mp4

12.4 MB

Sublinear GMW-Style Compiler for MPC with Preprocessing.eng.srt

42.4 KB

Sublinear GMW-Style Compiler for MPC with Preprocessing.mp4

15.7 MB

Subquadratic SNARGs in the Random Oracle Model.eng.srt

46.9 KB

Subquadratic SNARGs in the Random Oracle Model.mp4

18.5 MB

Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.eng.srt

46.4 KB

Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.mp4

30.2 MB

Sumcheck Arguments and their Applications.mp4

13.3 MB

Targeted Lossy Functions and Applications.eng.srt

32.6 KB

Targeted Lossy Functions and Applications.mp4

18.4 MB

The $t$-wise Independence of Substitution-Permutation Networks.eng.srt

33.4 KB

The $t$-wise Independence of Substitution-Permutation Networks.mp4

14.2 MB

The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.eng.srt

46.4 KB

The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.mp4

19.9 MB

Thinking Outside the Superbox.eng.srt

39.2 KB

Thinking Outside the Superbox.mp4

17.7 MB

Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.eng.srt

51.6 KB

Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.mp4

13.8 MB

Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.mp4

11.5 MB

Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.eng.srt

48.6 KB

Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.mp4

17.7 MB

Tight State-Restoration Soundness in the Algebraic Group Model.eng.srt

42.9 KB

Tight State-Restoration Soundness in the Algebraic Group Model.mp4

12.7 MB

Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${ ....eng.srt

45.0 KB

Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${ ....mp4

14.4 MB

Time- and Space-Efficient Arguments from Groups of Unknown Order.eng.srt

57.7 KB

Time- and Space-Efficient Arguments from Groups of Unknown Order.mp4

21.8 MB

Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.eng.srt

49.4 KB

Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.mp4

17.4 MB

Towards faster polynomial-time lattice reduction.eng.srt

40.4 KB

Towards faster polynomial-time lattice reduction.mp4

30.6 MB

Towards Tight Random Probing Security.eng.srt

34.2 KB

Towards Tight Random Probing Security.mp4

13.4 MB

Traceable Secret Sharing and Applications.eng.srt

39.4 KB

Traceable Secret Sharing and Applications.mp4

15.0 MB

Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.eng.srt

35.1 KB

Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.mp4

11.5 MB

Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.eng.srt

38.0 KB

Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.mp4

13.3 MB

Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.eng.srt

48.3 KB

Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.mp4

17.8 MB

White Box Traitor Tracing.eng.srt

46.2 KB

White Box Traitor Tracing.mp4

11.0 MB

Witness Authenticating NIZKs and Applications.eng.srt

42.4 KB

Witness Authenticating NIZKs and Applications.mp4

16.3 MB

You Only Speak Once Secure MPC with Stateless Ephemeral Roles.eng.srt

38.9 KB

You Only Speak Once Secure MPC with Stateless Ephemeral Roles.mp4

12.9 MB

/Crypto/Crypto 2022/

(Nondeterministic) Hardness vs. Non-Malleability.mp4

1.3 MB

(Nondeterministic) Hardness vs. Non-Malleability.srt

2.5 KB

A More Complete Analysis of the Signal Double Ratchet Algorithm.mp4

3.1 MB

A More Complete Analysis of the Signal Double Ratchet Algorithm.srt

9.1 KB

A New Approach to Efficient Non-Malleable Zero-Knowledge.mp4

3.6 MB

A New Approach to Efficient Non-Malleable Zero-Knowledge.srt

10.5 KB

A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.mp4

5.9 MB

A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.srt

10.5 KB

Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.mp4

2.3 MB

Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.srt

6.4 KB

An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.mp4

3.2 MB

An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.srt

10.0 KB

Augmented Random Oracles.mp4

1.3 MB

Augmented Random Oracles.srt

4.0 KB

Authenticated garbling from simple correlations.mp4

3.8 MB

Authenticated garbling from simple correlations.srt

11.7 KB

Batch Arguments for NP and More from Standard Bilinear Group Assumptions.mp4

3.1 MB

Batch Arguments for NP and More from Standard Bilinear Group Assumptions.srt

10.3 KB

Better than Advertised Security for Non-Interactive Threshold Signatures.mp4

3.1 MB

Better than Advertised Security for Non-Interactive Threshold Signatures.srt

7.7 KB

Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.mp4

3.1 MB

Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.srt

10.7 KB

Block-Cipher-Based Tree Hashing.mp4

3.6 MB

Block-Cipher-Based Tree Hashing.srt

8.7 KB

Breaking Rainbow Takes a Weekend on a Laptop.mp4

3.1 MB

Breaking Rainbow Takes a Weekend on a Laptop.srt

10.0 KB

Certified Everlasting Zero-Knowledge Proof for QMA.mp4

3.4 MB

Certified Everlasting Zero-Knowledge Proof for QMA.srt

7.7 KB

Collision-Resistance from Multi-Collision-Resistance.mp4

2.4 MB

Collision-Resistance from Multi-Collision-Resistance.srt

4.7 KB

Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.mp4

3.6 MB

Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.srt

9.8 KB

Constructive Post-Quantum Reductions.mp4

1.8 MB

Constructive Post-Quantum Reductions.srt

3.8 KB

Correlated Pseudorandomness from Expand-Accumulate Codes.mp4

3.7 MB

Correlated Pseudorandomness from Expand-Accumulate Codes.srt

12.9 KB

Cryptography from Pseudorandom Quantum States.mp4

3.2 MB

Cryptography from Pseudorandom Quantum States.srt

7.8 KB

Differential Cryptanalysis in the Fixed-Key Model.mp4

4.4 MB

Differential Cryptanalysis in the Fixed-Key Model.srt

10.8 KB

Dynamic Local Searchable Symmetric Encryption.mp4

3.8 MB

Dynamic Local Searchable Symmetric Encryption.srt

11.7 KB

Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.mp4

4.3 MB

Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.srt

8.3 KB

Faster Sounder Succinct Arguments and IOPs.mp4

1.8 MB

Faster Sounder Succinct Arguments and IOPs.srt

3.7 KB

Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.mp4

3.6 MB

Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.srt

8.0 KB

Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.mp4

2.4 MB

Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.srt

7.6 KB

Gossiping for Communication-Efficient Broadcast.mp4

3.1 MB

Gossiping for Communication-Efficient Broadcast.srt

10.1 KB

Implicit White-Box Implementations White-Boxing ARX Ciphers.mp4

3.8 MB

Implicit White-Box Implementations White-Boxing ARX Ciphers.srt

9.5 KB

Improving Support-Minors rank attacks applications to GeMSS and Rainbow.mp4

3.6 MB

Improving Support-Minors rank attacks applications to GeMSS and Rainbow.srt

7.0 KB

Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.mp4

4.6 MB

Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.srt

11.5 KB

Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.mp4

10.9 MB

Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.srt

5.4 KB

Le Mans Dynamic and Fluid MPC for Dishonest Majority.mp4

3.1 MB

Le Mans Dynamic and Fluid MPC for Dishonest Majority.srt

8.9 KB

log∗-Round Game-Theoretically-Fair Leader Election.mp4

2.6 MB

log∗-Round Game-Theoretically-Fair Leader Election.srt

8.9 KB

Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.mp4

3.6 MB

Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.srt

7.8 KB

Lower Bound on SNARGs in the Random Oracle Model.mp4

3.5 MB

Lower Bound on SNARGs in the Random Oracle Model.srt

9.9 KB

Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.mp4

2.5 MB

Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.srt

8.5 KB

Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.mp4

3.4 MB

Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.srt

11.1 KB

Multi-Input Attribute Based Encryption and Predicate Encryption.mp4

2.8 MB

Multi-Input Attribute Based Encryption and Predicate Encryption.srt

8.9 KB

Multimodal Private Signatures.mp4

13.0 MB

Multimodal Private Signatures.srt

32.7 KB

MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.mp4

4.1 MB

MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.srt

12.2 KB

Nearly Optimal Property Preserving Hashing.mp4

2.1 MB

Nearly Optimal Property Preserving Hashing.srt

7.3 KB

New Constructions of Collapsing Hashes.mp4

1.3 MB

New Constructions of Collapsing Hashes.srt

4.8 KB

Nova Recursive Zero-Knowledge Arguments from Folding Schemes.mp4

3.7 MB

Nova Recursive Zero-Knowledge Arguments from Folding Schemes.srt

9.9 KB

Oblivious Message Retrieval.mp4

3.6 MB

Oblivious Message Retrieval.srt

9.3 KB

Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.mp4

4.4 MB

Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.srt

8.7 KB

On Codes and Learning with Errors over Function Fields.mp4

7.7 MB

On Codes and Learning with Errors over Function Fields.srt

7.8 KB

On the Feasibility of Unclonable Encryption and, More.mp4

2.9 MB

On the Feasibility of Unclonable Encryption and, More.srt

8.2 KB

On the Impossibility of Key Agreements from Quantum Random Oracles.mp4

3.6 MB

On the Impossibility of Key Agreements from Quantum Random Oracles.srt

9.2 KB

On the Insider Security of MLS.mp4

3.4 MB

On the Insider Security of MLS.srt

9.1 KB

On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.mp4

11.8 MB

On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.srt

43.3 KB

Orion Zero Knowledge Proof with Linear Prover Time.mp4

2.0 MB

Orion Zero Knowledge Proof with Linear Prover Time.srt

4.9 KB

Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.mp4

2.5 MB

Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.srt

7.1 KB

Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.mp4

4.7 MB

Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.srt

7.6 KB

Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.mp4

2.2 MB

Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.srt

8.1 KB

Password-Authenticated Key Exchange from Group Actions.mp4

4.5 MB

Password-Authenticated Key Exchange from Group Actions.srt

8.2 KB

PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.mp4

3.5 MB

PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.srt

8.3 KB

Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.mp4

5.3 MB

Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.srt

15.0 KB

Practical Statistically-Sound Proofs of Exponentiation in any Group.mp4

2.1 MB

Practical Statistically-Sound Proofs of Exponentiation in any Group.srt

5.0 KB

Practical Sublinear Proofs for R1CS from Lattices.mp4

1.9 MB

Practical Sublinear Proofs for R1CS from Lattices.srt

3.9 KB

Programmable Distributed Point Functions.mp4

3.0 MB

Programmable Distributed Point Functions.srt

9.8 KB

Provably Secure Reflection Ciphers.mp4

3.3 MB

Provably Secure Reflection Ciphers.srt

7.8 KB

Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.mp4

3.1 MB

Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.srt

9.8 KB

Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.mp4

2.5 MB

Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.srt

7.6 KB

Public-Key Watermarking Schemes for Pseudorandom Functions.mp4

13.0 MB

Public-Key Watermarking Schemes for Pseudorandom Functions.srt

32.7 KB

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.mp4

3.0 MB

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.srt

8.9 KB

Quantum Commitments and Signatures without One-Way Functions.mp4

3.7 MB

Quantum Commitments and Signatures without One-Way Functions.srt

6.3 KB

Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.mp4

3.0 MB

Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.srt

6.7 KB

Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.mp4

1.4 MB

Securing Approximate Homomorphic Encryption using Differential Privacy.mp4

4.9 MB

Securing Approximate Homomorphic Encryption using Differential Privacy.srt

14.2 KB

Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.mp4

3.0 MB

Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.srt

9.2 KB

Short Leakage Resilient and Non-malleable Secret Sharing Schemes.mp4

4.3 MB

Short Leakage Resilient and Non-malleable Secret Sharing Schemes.srt

10.1 KB

Shorter Hash-and-Sign Lattice-Based Signatures.mp4

3.2 MB

Shorter Hash-and-Sign Lattice-Based Signatures.srt

10.1 KB

Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.mp4

3.1 MB

Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.srt

6.9 KB

Simplified MITM Modeling for Permutations New (Quantum) Attacks.mp4

4.1 MB

Simplified MITM Modeling for Permutations New (Quantum) Attacks.srt

10.7 KB

Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.mp4

2.7 MB

Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.srt

7.9 KB

Statistically Sender-Private OT From LPN and Derandomization.mp4

2.8 MB

Statistically Sender-Private OT From LPN and Derandomization.srt

6.8 KB

Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.mp4

3.1 MB

Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.srt

7.3 KB

Succinct Classical Verification of Quantum Computation.mp4

2.8 MB

Succinct Classical Verification of Quantum Computation.srt

8.3 KB

Succinct Interactive Oracle Proofs Applications and Limitations.mp4

3.0 MB

Succinct Interactive Oracle Proofs Applications and Limitations.srt

8.7 KB

Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.mp4

5.4 MB

Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.srt

9.0 KB

Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.mp4

2.7 MB

Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.srt

6.4 KB

Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.mp4

3.3 MB

Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.srt

6.8 KB

Threshold Signatures with Private Accountability.mp4

4.3 MB

Threshold Signatures with Private Accountability.srt

10.6 KB

Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.mp4

2.6 MB

Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.srt

8.2 KB

Tight Preimage Resistance of the Sponge Construction.mp4

3.3 MB

Tight Preimage Resistance of the Sponge Construction.srt

9.8 KB

Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.mp4

3.3 MB

Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.srt

8.2 KB

Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.mp4

2.4 MB

Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.srt

9.8 KB

To Label, or Not To Label (in Generic Groups).mp4

1.2 MB

To Label, or Not To Label (in Generic Groups).srt

3.8 KB

Triangulating Rebound Attack on AES-like Hashing.mp4

3.0 MB

Triangulating Rebound Attack on AES-like Hashing.srt

5.8 KB

Universally Composable End-to-End Secure Messaging (2).mp4

4.8 MB

Universally Composable End-to-End Secure Messaging (2).srt

11.4 KB

Universally Composable End-to-End Secure Messaging.mp4

4.4 MB

Universally Composable End-to-End Secure Messaging.srt

10.8 KB

Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.mp4

3.1 MB

Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.srt

11.8 KB

/.../Crypto 2022 Affiliated Events/

GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.mp4

69.3 MB

GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.srt

125.1 KB

GHTC 2022 Round Table 2 Agility for converging to a PQ world.mp4

72.1 MB

GHTC 2022 Round Table 2 Agility for converging to a PQ world.srt

141.1 KB

GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.mp4

61.8 MB

GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.srt

98.4 KB

GHTC 2022 Round Table 4 Lessons Learned.mp4

60.6 MB

GHTC 2022 Round Table 4 Lessons Learned.srt

108.7 KB

MathCrypt 2022 Session 1 (part I).mp4

21.6 MB

MathCrypt 2022 Session 1 (part I).srt

39.6 KB

MathCrypt 2022 Session 1 (part II).mp4

14.6 MB

MathCrypt 2022 Session 1 (part II).srt

32.8 KB

MathCrypt 2022 Session 2 (part I).mp4

14.4 MB

MathCrypt 2022 Session 2 (part I).srt

38.2 KB

MathCrypt 2022 Session 2 (part II).mp4

14.5 MB

MathCrypt 2022 Session 2 (part II).srt

34.8 KB

MathCrypt 2022 Session 3 (part I).mp4

16.7 MB

MathCrypt 2022 Session 3 (part I).srt

53.6 KB

MathCrypt 2022 Session 3 (part II).mp4

16.0 MB

MathCrypt 2022 Session 3 (part II).srt

54.8 KB

MathCrypt 2022 Session 4.mp4

24.6 MB

MathCrypt 2022 Session 4.srt

46.6 KB

PPML 2022 Contributed Talks I (part II).mp4

12.4 MB

PPML 2022 Contributed Talks I (part II).srt

36.5 KB

PPML 2022 Contributed Talks I (part III).mp4

12.9 MB

PPML 2022 Contributed Talks I (part III).srt

33.8 KB

PPML 2022 Contributed Talks I (part IV).mp4

10.5 MB

PPML 2022 Contributed Talks I (part IV).srt

32.5 KB

PPML 2022 Contributed Talks I (part V).mp4

11.9 MB

PPML 2022 Contributed Talks I (part V).srt

27.6 KB

PPML 2022 Contributed Talks II (part I).mp4

13.3 MB

PPML 2022 Contributed Talks II (part I).srt

32.3 KB

PPML 2022 Contributed Talks II (part II).mp4

12.3 MB

PPML 2022 Contributed Talks II (part II).srt

33.2 KB

PPML 2022 Contributed Talks II (part III).mp4

16.9 MB

PPML 2022 Contributed Talks II (part III).srt

44.8 KB

PPML 2022 Contributed Talks II (part IV).mp4

11.1 MB

PPML 2022 Contributed Talks II (part IV).srt

24.9 KB

PPML 2022 Invited Talk I.mp4

47.3 MB

PPML 2022 Invited Talk I.srt

114.0 KB

PPML 2022 Invited Talk II.mp4

57.1 MB

PPML 2022 Invited Talk II.srt

99.7 KB

PPML 2022 Invited Talk III.mp4

44.2 MB

PPML 2022 Invited Talk III.srt

116.8 KB

TPES 2022 Theory and Practice of Encrypted Search.mp4

227.6 MB

TPES 2022 Theory and Practice of Encrypted Search.srt

543.8 KB

WAC5 2022 Session 3 (part I).mp4

14.5 MB

WAC5 2022 Session 3 (part I).srt

49.7 KB

WAC5 2022 Session 3 (part II).mp4

20.7 MB

WAC5 2022 Session 3 (part II).srt

63.1 KB

WAC5 2022 Session 4 (part I).mp4

13.2 MB

WAC5 2022 Session 4 (part I).srt

41.4 KB

WAC5 2022 Session 4 (part II).mp4

20.5 MB

WAC5 2022 Session 4 (part II).srt

56.2 KB

/.../Crypto 2022 Live/

Best Paper Awards Crypto 2022.mp4

53.8 MB

Best Paper Awards Crypto 2022.srt

147.8 KB

Crypto 2022 program chair report best video winners.mp4

14.7 MB

Crypto 2022 program chair report best video winners.srt

40.6 KB

Crypto 2022 rump session part I.mp4

21.5 MB

Crypto 2022 rump session part I.srt

55.4 KB

Crypto 2022 rump session part II.mp4

24.6 MB

Crypto 2022 rump session part II.srt

49.8 KB

Crypto 2022 rump session part III.mp4

17.8 MB

Crypto 2022 rump session part III.srt

51.0 KB

Crypto 2022 rump session part IV.mp4

21.0 MB

Crypto 2022 rump session part IV.srt

38.5 KB

Crypto 2022 rump session part V.mp4

19.1 MB

Crypto 2022 rump session part V.srt

39.3 KB

Crypto 2022 Session on Blockchain.mp4

48.5 MB

Crypto 2022 Session on Blockchain.srt

134.6 KB

Crypto 2022 Session on Quantum Cryptography II.mp4

50.5 MB

Crypto 2022 Session on Quantum Cryptography II.srt

145.2 KB

IACR Fellows 2022 Ceremony.mp4

11.0 MB

IACR Fellows 2022 Ceremony.srt

23.3 KB

Implicit White Box Implementations White Boxing ARX Ciphers.mp4

18.5 MB

Implicit White Box Implementations White Boxing ARX Ciphers.srt

50.9 KB

Invited Talk by Yehuda Lindell (reuploaded).mp4

59.4 MB

Invited Talk by Yehuda Lindell (reuploaded).srt

137.2 KB

Opening Remarks at Crypto 2022.mp4

3.3 MB

Opening Remarks at Crypto 2022.srt

10.0 KB

Panel Discussion on Allyship and Inclusion.mp4

55.3 MB

Panel Discussion on Allyship and Inclusion.srt

108.6 KB

Remembering Nishant Kumar.mp4

8.4 MB

Remembering Nishant Kumar.srt

15.2 KB

Rotational Differential Linear Distinguishers of.mp4

14.6 MB

Rotational Differential Linear Distinguishers of.srt

22.9 KB

Session on Advanced Encryption Systems.mp4

73.8 MB

Session on Advanced Encryption Systems.srt

180.2 KB

Session on Coding Theory.mp4

68.8 MB

Session on Coding Theory.srt

194.4 KB

Session on Cryptanalysis II.mp4

67.7 MB

Session on Cryptanalysis II.srt

167.7 KB

Session on Distributed Algorithms.mp4

28.4 MB

Session on Distributed Algorithms.srt

89.2 KB

Session on Idealized Models.mp4

49.3 MB

Session on Idealized Models.srt

156.3 KB

Session on Lattice Based Signatures.mp4

47.6 MB

Session on Lattice Based Signatures.srt

130.7 KB

Session on Lattice Based Zero Knowledge.mp4

48.6 MB

Session on Lattice Based Zero Knowledge.srt

142.0 KB

Session on Lower Bounds.mp4

50.5 MB

Session on Lower Bounds.srt

143.3 KB

Session on Post Quantum Cryptography Theory.mp4

61.2 MB

Session on Post Quantum Cryptography Theory.srt

185.6 KB

Session on Proof Systems.mp4

66.8 MB

Session on Proof Systems.srt

177.2 KB

Session on Public Key Cryptography.mp4

59.9 MB

Session on Public Key Cryptography.srt

167.9 KB

Session on Quantum Cryptography I.mp4

60.5 MB

Session on Quantum Cryptography I.srt

128.4 KB

Session on Randomness.mp4

61.8 MB

Session on Randomness.srt

181.7 KB

Session on Secret Sharing and Secure Multiparty Computation.mp4

31.1 MB

Session on Secret Sharing and Secure Multiparty Computation.srt

104.5 KB

Session on Secure Hash Functions.mp4

26.9 MB

Session on Secure Hash Functions.srt

94.3 KB

Session on Secure Messaging.mp4

51.2 MB

Session on Secure Messaging.srt

144.9 KB

Session on Secure Multiparty Computation I.mp4

48.9 MB

Session on Secure Multiparty Computation I.srt

138.1 KB

Session on Secure Multiparty Computation II.mp4

39.6 MB

Session on Secure Multiparty Computation II.srt

140.0 KB

Session on Secure Multiparty Computation III.mp4

43.8 MB

Session on Secure Multiparty Computation III.srt

130.4 KB

Session on Signatures.mp4

45.6 MB

Session on Signatures.srt

146.2 KB

Session on Symmetric Cryptanalysis.mp4

71.2 MB

Session on Symmetric Cryptanalysis.srt

183.7 KB

Session on Symmetric Key Theory.mp4

63.6 MB

Session on Symmetric Key Theory.srt

171.0 KB

Session on Threshold Signatures.mp4

44.3 MB

Session on Threshold Signatures.srt

122.6 KB

Session on Unique Topics.mp4

45.9 MB

Session on Unique Topics.srt

138.8 KB

Session on Zero Knowledge.mp4

63.3 MB

Session on Zero Knowledge.srt

183.2 KB

Triangulating Rebound Attack on AES like Hashing.mp4

16.9 MB

/Crypto/Crypto 2023/

Anonymous Credentials.eng.srt

132.2 KB

Anonymous Credentials.mp4

47.9 MB

Attacks on Post-Quantum Crypto.eng.srt

71.0 KB

Attacks on Post-Quantum Crypto.mp4

31.5 MB

Consensus 1.eng.srt

85.1 KB

Consensus 1.mp4

29.3 MB

Consensus 2.eng.srt

100.1 KB

Consensus 2.mp4

38.7 MB

Correlated Pseudorandomness.eng.srt

64.5 KB

Correlated Pseudorandomness.mp4

29.4 MB

Cryptanalysis of Digital Signatures.eng.srt

124.5 KB

Cryptanalysis of Digital Signatures.mp4

37.3 MB

Crypto 2023 award session.eng.srt

21.3 KB

Crypto 2023 award session.mp4

12.1 MB

Crypto 2023 Best Paper Plenary.eng.srt

102.2 KB

Crypto 2023 Best Paper Plenary.mp4

31.5 MB

Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.eng.srt

100.4 KB

Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.mp4

47.2 MB

Crypto 2023 opening remarks.eng.srt

9.0 KB

Crypto 2023 opening remarks.mp4

4.8 MB

Crypto 2023 rump session.eng.srt

218.3 KB

Crypto 2023 rump session.mp4

113.5 MB

Efficient FHE.eng.srt

108.9 KB

Efficient FHE.mp4

42.6 MB

Emerging Paradigms 1 & 2 Post-Quantum Signatures 1 & 2.eng.srt

311.6 KB

Emerging Paradigms 1 & 2 Post-Quantum Signatures 1 & 2.mp4

110.7 MB

Foundations.eng.srt

133.1 KB

Foundations.mp4

42.8 MB

Functional Encryption 1 & 2.eng.srt

152.6 KB

Functional Encryption 1 & 2.mp4

58.2 MB

Invited Talk by Scott Aaronson.eng.srt

127.6 KB

Invited Talk by Scott Aaronson.mp4

54.0 MB

Isogenies and Applications.eng.srt

78.9 KB

Isogenies and Applications.mp4

25.5 MB

Lattice Problems and Their Complexity 1.eng.srt

89.3 KB

Lattice Problems and Their Complexity 1.mp4

28.4 MB

Lattice Problems and Their Complexity 2.eng.srt

96.8 KB

Lattice Problems and Their Complexity 2.mp4

28.4 MB

Lattice-Based PKC 1.eng.srt

81.9 KB

Lattice-Based PKC 1.mp4

28.3 MB

Lattice-Based PKC 2.eng.srt

64.3 KB

Lattice-Based PKC 2.mp4

33.6 MB

MPC - Emerging Models 1.eng.srt

77.3 KB

MPC - Emerging Models 1.mp4

28.4 MB

MPC - Emerging Models 2.eng.srt

83.0 KB

MPC - Emerging Models 2.mp4

26.3 MB

MPC Round Efficiency 1.eng.srt

95.7 KB

MPC Round Efficiency 1.mp4

28.9 MB

MPC Round Efficiency 2.eng.srt

82.7 KB

MPC Round Efficiency 2.mp4

22.7 MB

Obfuscation.eng.srt

81.8 KB

Obfuscation.mp4

34.7 MB

ORAM 1.eng.srt

86.7 KB

ORAM 1.mp4

27.2 MB

ORAM 2.eng.srt

102.4 KB

ORAM 2.mp4

23.4 MB

Post-Quantum ZK 1.eng.srt

78.7 KB

Post-Quantum ZK 1.mp4

33.5 MB

Post-Quantum ZK 2.eng.srt

68.1 KB

Post-Quantum ZK 2.mp4

27.7 MB

Provably Secure Symmetric Constructions 1.eng.srt

45.0 KB

Provably Secure Symmetric Constructions 1.mp4

28.0 MB

Provably Secure Symmetric Constructions 2.eng.srt

62.7 KB

Provably Secure Symmetric Constructions 2.mp4

25.1 MB

Quantum Cryptography 1.eng.srt

74.7 KB

Quantum Cryptography 1.mp4

23.1 MB

Quantum Cryptography 2.eng.srt

71.1 KB

Quantum Cryptography 2.mp4

27.7 MB

Quantum Protocols 1.eng.srt

90.6 KB

Quantum Protocols 1.mp4

27.2 MB

Quantum Protocols 2.eng.srt

96.3 KB

Quantum Protocols 2.mp4

26.9 MB

Quantum Security.eng.srt

74.8 KB

Quantum Security.mp4

36.1 MB

Random Oracle 1.eng.srt

82.0 KB

Random Oracle 1.mp4

27.5 MB

Random Oracle 2.eng.srt

81.0 KB

Random Oracle 2.mp4

23.6 MB

Secret Sharing 1.eng.srt

75.2 KB

Secret Sharing 1.mp4

35.4 MB

Secret Sharing 2.eng.srt

86.2 KB

Secret Sharing 2.mp4

34.4 MB

Secure Messaging 1.eng.srt

79.0 KB

Secure Messaging 1.mp4

24.1 MB

Secure Messaging 2.eng.srt

89.9 KB

Secure Messaging 2.mp4

29.8 MB

Secure Two Party Computation part I.eng.srt

46.7 KB

Secure Two Party Computation part I.mp4

19.2 MB

Secure Two-Party Computation part II.eng.srt

36.6 KB

Secure Two-Party Computation part II.mp4

13.7 MB

Side Channels 1 part I.eng.srt

37.6 KB

Side Channels 1 part I.mp4

15.5 MB

Side Channels 1 part II.eng.srt

31.7 KB

Side Channels 1 part II.mp4

12.8 MB

Side Channels 2.eng.srt

96.1 KB

Side Channels 2.mp4

33.7 MB

Sublinear Proofs.eng.srt

63.8 KB

Sublinear Proofs.mp4

27.2 MB

Succinctness 1 part I.eng.srt

36.5 KB

Succinctness 1 part I.mp4

10.4 MB

Succinctness 1 part II.eng.srt

52.7 KB

Succinctness 1 part II.mp4

18.3 MB

Succinctness 2.eng.srt

78.3 KB

Succinctness 2.mp4

22.3 MB

Succinctness 3.eng.srt

79.8 KB

Succinctness 3.mp4

23.5 MB

Succinctness 4.eng.srt

83.4 KB

Succinctness 4.mp4

25.3 MB

Symmetric Cryptanalysis 1.eng.srt

43.0 KB

Symmetric Cryptanalysis 1.mp4

30.1 MB

Symmetric Cryptanalysis 2.eng.srt

56.4 KB

Symmetric Cryptanalysis 2.mp4

34.0 MB

Symmetric Crypto with Public-Key Applications.eng.srt

109.9 KB

Symmetric Crypto with Public-Key Applications.mp4

41.0 MB

Symmetric Design.eng.srt

65.5 KB

Symmetric Design.mp4

26.0 MB

Threshold Cryptography 1.eng.srt

89.2 KB

Threshold Cryptography 1.mp4

29.7 MB

Threshold Cryptography 2.eng.srt

79.1 KB

Threshold Cryptography 2.mp4

28.8 MB

ZK Based on DL 1.eng.srt

85.3 KB

ZK Based on DL 1.mp4

25.6 MB

ZK Based on DL 2.eng.srt

91.2 KB

ZK Based on DL 2.mp4

30.5 MB

/.../Crypto 2023 Affiliated Events/CFAIL 2023/

CFAIL intro and talk I.eng.srt

53.2 KB

CFAIL intro and talk I.mp4

17.2 MB

CFAIL invited talk.eng.srt

99.5 KB

CFAIL invited talk.mp4

37.8 MB

CFAIL talk II.eng.srt

49.3 KB

CFAIL talk II.mp4

14.2 MB

CFAIL talk III.eng.srt

47.5 KB

CFAIL talk III.mp4

15.7 MB

/.../Crypto 2023 Affiliated Events/GHTC 2023/

GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.eng.srt

127.0 KB

GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.mp4

65.2 MB

GHTC 2023 round table 2 AI and Cryptanalysis.eng.srt

111.3 KB

GHTC 2023 round table 2 AI and Cryptanalysis.mp4

65.3 MB

GHTC 2023 round table 3 Privacy Preserving AI.eng.srt

114.9 KB

GHTC 2023 round table 3 Privacy Preserving AI.mp4

56.7 MB

GHTC 2023 round table 4 Lessons Learned.eng.srt

110.5 KB

GHTC 2023 round table 4 Lessons Learned.mp4

51.7 MB

/.../Crypto 2023 Affiliated Events/PPML 2023/

PPML 2023 Contributed Talks II.eng.srt

184.8 KB

PPML 2023 Contributed Talks II.mp4

65.6 MB

PPML 2023 invited talk I Mariana Raykova Contributed Talks I.eng.srt

146.2 KB

PPML 2023 invited talk I Mariana Raykova Contributed Talks I.mp4

50.2 MB

PPML 2023 invited talk II Janardhan (Jana) Kulkarni Contributed Talks III.eng.srt

152.3 KB

PPML 2023 invited talk II Janardhan (Jana) Kulkarni Contributed Talks III.mp4

48.7 MB

PPML 2023 invited talk III Sewoong Oh.eng.srt

80.3 KB

PPML 2023 invited talk III Sewoong Oh.mp4

32.2 MB

/CHES 2016/

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.mp4

23.8 MB

A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.mp4

35.9 MB

Antikernel A Decentralized Secure Hardware Software Operating System.mp4

28.1 MB

Cache Attacks Enable Bulk Key Recovery on the Cloud.mp4

25.4 MB

CacheBleed A Timing Attack on OpenSSL Constant Time RSA.mp4

32.7 MB

CHES 2016 Panel Discussion.mp4

75.9 MB

Correlated Extra Reductions Defeat Blinded Regular Exponentiation.mp4

40.5 MB

Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.mp4

38.5 MB

Differential Computation Analysis Hiding your White Box Designs is Not Enough.mp4

29.4 MB

Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.mp4

24.7 MB

Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.mp4

27.9 MB

EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.mp4

25.3 MB

Faster Evaluation of SBoxes via Common Shares.mp4

16.7 MB

Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.mp4

35.0 MB

FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.mp4

36.6 MB

Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.mp4

36.7 MB

Masking AES with d1 Shares in Hardware.mp4

20.6 MB

Mitigating SAT Attack on Logic Locking.mp4

32.1 MB

No Place to Hide Contactless Probing of Secret Data on FPGAs.mp4

4.4 MB

Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4

121.9 MB

On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.mp4

6.7 MB

Physical Layer Group Key Agreement for Automotive Controller Area Network.mp4

34.8 MB

QcBits constant time small key code based cryptography.mp4

24.8 MB

Reducing the Number of Non linear Multiplications in Masking Schemes.mp4

31.8 MB

Run time Accessible DRAM PUFs in Commodity Devices.mp4

5.7 MB

Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.mp4

24.0 MB

Software implementation of Koblitz curves over quadratic fields.mp4

21.2 MB

Strong 8 bit Sboxes with Efficient Masking in Hardware.mp4

20.0 MB

Strong Machine Learning Attack against PUFs with No Mathematical Model.mp4

17.3 MB

Towards Easy Leakage Certification.mp4

10.2 MB

uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.mp4

7.0 MB

vatiCAN Vetted, Authenticated CAN Bus.mp4

25.8 MB

/CHES 2018/

A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.eng.srt

44.2 KB

A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.mp4

21.9 MB

Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.eng.srt

54.1 KB

Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.mp4

16.3 MB

Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.eng.srt

55.7 KB

Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.mp4

21.4 MB

CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.eng.srt

53.6 KB

CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.mp4

11.5 MB

CHES 2018 Rump Session.eng.srt

191.3 KB

CHES 2018 Rump Session.mp4

105.5 MB

Closing remarks at CHES 2018.eng.srt

10.1 KB

Closing remarks at CHES 2018.mp4

6.7 MB

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.eng.srt

101.1 KB

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.mp4

39.9 MB

Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.eng.srt

63.7 KB

Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.mp4

27.0 MB

Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.eng.srt

39.0 KB

Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.mp4

26.5 MB

Differential Fault Attacks on Deterministic Lattice Signatures.eng.srt

45.4 KB

Differential Fault Attacks on Deterministic Lattice Signatures.mp4

18.2 MB

Dismantling the AUT64 Automotive Cipher.eng.srt

43.5 KB

Dismantling the AUT64 Automotive Cipher.mp4

17.6 MB

Efficient Side Channel Protections of ARX Ciphers.mp4

17.8 MB

EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.eng.srt

48.9 KB

EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.mp4

25.1 MB

ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.eng.srt

40.7 KB

ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.mp4

20.7 MB

Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.eng.srt

41.0 KB

Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.mp4

25.7 MB

ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.eng.srt

48.5 KB

ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.mp4

24.2 MB

Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.eng.srt

43.3 KB

Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.mp4

20.6 MB

FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.eng.srt

38.8 KB

FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.mp4

24.9 MB

Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.eng.srt

60.6 KB

Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.mp4

14.4 MB

Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.mp4

23.6 MB

FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.eng.srt

36.4 KB

FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.mp4

19.1 MB

FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.eng.srt

41.4 KB

FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.mp4

15.7 MB

Generic Low Latency Masking in Hardware.eng.srt

40.9 KB

Generic Low Latency Masking in Hardware.mp4

17.5 MB

Hardware Masking, Revisited.eng.srt

45.1 KB

Hardware Masking, Revisited.mp4

20.7 MB

High Order Masking of Look up Tables with Common Shares.mp4

15.6 MB

High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.eng.srt

40.1 KB

High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.mp4

20.2 MB

Improved High Order Conversion From Boolean to Arithmetic Masking.mp4

16.1 MB

Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.eng.srt

52.6 KB

Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.mp4

24.6 MB

Leakage Detection with the x2 Test.eng.srt

37.8 KB

Leakage Detection with the x2 Test.mp4

19.2 MB

Linear Repairing Codes and Side Channel Attacks.eng.srt

58.3 KB

Linear Repairing Codes and Side Channel Attacks.mp4

24.8 MB

Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.eng.srt

51.2 KB

Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.mp4

21.4 MB

Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.eng.srt

32.7 KB

Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.mp4

16.8 MB

Multiplicative Masking for AES in Hardware.eng.srt

49.9 KB

Multiplicative Masking for AES in Hardware.mp4

19.7 MB

New Bleichenbacher Records - Fault Attacks on qDSA Signatures.eng.srt

43.9 KB

New Bleichenbacher Records - Fault Attacks on qDSA Signatures.mp4

16.5 MB

On Recovering Affine Encodings in White Box Implementations.eng.srt

42.6 KB

On Recovering Affine Encodings in White Box Implementations.mp4

21.8 MB

On the Difficulty of FSM based Hardware Obfuscation.eng.srt

48.2 KB

On the Difficulty of FSM based Hardware Obfuscation.mp4

23.8 MB

Opening remarks.eng.srt

17.2 KB

Opening remarks.mp4

8.4 MB

Persistent Fault Analysis on Block Ciphers.eng.srt

49.9 KB

Persistent Fault Analysis on Block Ciphers.mp4

29.6 MB

Practical CCA2 Secure and Masked Ring LWE Implementation.mp4

16.7 MB

Rhythmic Keccak - SCA Security and Low Latency in HW.eng.srt

39.3 KB

Rhythmic Keccak - SCA Security and Low Latency in HW.mp4

21.5 MB

Saber on ARM - CCA secure module lattice based key encapsulation on ARM.eng.srt

50.9 KB

Saber on ARM - CCA secure module lattice based key encapsulation on ARM.mp4

23.8 MB

SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.eng.srt

40.5 KB

SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.mp4

23.8 MB

Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.eng.srt

30.0 KB

Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.mp4

16.1 MB

SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.eng.srt

53.0 KB

SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.mp4

19.9 MB

Smashing the Implementation Records of AES S box.eng.srt

44.2 KB

Smashing the Implementation Records of AES S box.mp4

21.6 MB

Spin Me Right Round Rotational Symmetry for FPGA Specific AES.eng.srt

51.9 KB

Spin Me Right Round Rotational Symmetry for FPGA Specific AES.mp4

21.0 MB

Standard Lattice Based Key Encapsulation on Embedded Devices.eng.srt

39.6 KB

Standard Lattice Based Key Encapsulation on Embedded Devices.mp4

21.4 MB

Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.eng.srt

52.1 KB

Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.mp4

25.3 MB

/CHES 2021/

A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.mp4

18.9 MB

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.eng.srt

35.2 KB

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.mp4

25.0 MB

A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.eng.srt

46.8 KB

A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.mp4

23.0 MB

AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.eng.srt

35.5 KB

AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.mp4

19.4 MB

An Instruction Set Extension to Support Software-Based Masking.eng.srt

35.4 KB

An Instruction Set Extension to Support Software-Based Masking.mp4

22.8 MB

Analysis and Comparison of Table-based Arithmetic to Boolean Masking.eng.srt

30.6 KB

Analysis and Comparison of Table-based Arithmetic to Boolean Masking.mp4

8.5 MB

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.eng.srt

42.6 KB

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.mp4

12.7 MB

Batching CSIDH Group Actions using AVX-512.eng.srt

44.7 KB

Batching CSIDH Group Actions using AVX-512.mp4

23.4 MB

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.eng.srt

36.2 KB

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.mp4

16.7 MB

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu....eng.srt

41.3 KB

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu....mp4

18.0 MB

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.eng.srt

44.5 KB

Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.mp4

25.0 MB

Classic McEliece on the ARM Cortex-M4.eng.srt

30.9 KB

Classic McEliece on the ARM Cortex-M4.mp4

15.8 MB

Combining Optimization Objectives New Modeling Attacks on Strong PUFs.eng.srt

41.3 KB

Combining Optimization Objectives New Modeling Attacks on Strong PUFs.mp4

14.7 MB

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.eng.srt

43.3 KB

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.mp4

17.9 MB

Concrete quantum cryptanalysis of binary elliptic curves.eng.srt

46.3 KB

Concrete quantum cryptanalysis of binary elliptic curves.mp4

17.4 MB

Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other ....eng.srt

33.4 KB

Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other ....mp4

15.1 MB

Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.eng.srt

33.6 KB

Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.mp4

19.6 MB

CTIDH faster constant-time CSIDH.eng.srt

40.8 KB

CTIDH faster constant-time CSIDH.mp4

16.5 MB

Cutting Through the Complexity of Reverse Engineering Embedded Devices.eng.srt

59.3 KB

Cutting Through the Complexity of Reverse Engineering Embedded Devices.mp4

15.6 MB

DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.eng.srt

39.2 KB

DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.mp4

16.9 MB

Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.eng.srt

18.9 KB

Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.mp4

12.3 MB

DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.eng.srt

33.4 KB

DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.mp4

16.0 MB

Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin....eng.srt

47.1 KB

Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin....mp4

17.1 MB

Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study....eng.srt

44.4 KB

Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study....mp4

18.3 MB

Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E....eng.srt

43.8 KB

Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E....mp4

11.3 MB

Fault Attacks on CCA-secure Lattice KEMs.eng.srt

35.5 KB

Fault Attacks on CCA-secure Lattice KEMs.mp4

16.0 MB

Fault Injection as an Oscilloscope Fault Correlation Analysis.eng.srt

46.6 KB

Fault Injection as an Oscilloscope Fault Correlation Analysis.mp4

20.2 MB

Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.eng.srt

36.0 KB

Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.mp4

13.1 MB

FIVER - Robust Verification of Countermeasures against Fault Injections.eng.srt

37.0 KB

FIVER - Robust Verification of Countermeasures against Fault Injections.mp4

18.5 MB

Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.eng.srt

38.4 KB

Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.mp4

19.8 MB

Higher-Order Lookup Table Masking in Essentially Constant Memory.eng.srt

33.5 KB

Higher-Order Lookup Table Masking in Essentially Constant Memory.mp4

14.6 MB

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.eng.srt

43.8 KB

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.mp4

18.6 MB

Inconsistency of Simulation and Practice in Delay-based Strong PUFs.eng.srt

41.0 KB

Inconsistency of Simulation and Practice in Delay-based Strong PUFs.mp4

24.3 MB

Information Leakages in Code-based Masking A Unified Quantification Approach.eng.srt

28.0 KB

Information Leakages in Code-based Masking A Unified Quantification Approach.mp4

15.0 MB

Keep it Unsupervised Horizontal Attacks Meet Deep Learning.eng.srt

34.3 KB

Keep it Unsupervised Horizontal Attacks Meet Deep Learning.mp4

13.7 MB

Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.eng.srt

37.2 KB

Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.mp4

14.5 MB

Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.mp4

18.2 MB

LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.eng.srt

39.1 KB

LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.mp4

14.1 MB

Low-Latency Keccak at any Arbitrary Order.eng.srt

31.0 KB

Low-Latency Keccak at any Arbitrary Order.mp4

11.3 MB

Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the....eng.srt

29.9 KB

Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the....mp4

10.1 MB

Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.eng.srt

49.2 KB

Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.mp4

30.2 MB

Masking Kyber First- and Higher-Order Implementations.eng.srt

46.0 KB

Masking Kyber First- and Higher-Order Implementations.mp4

29.3 MB

My other car is your car compromising the Tesla Model X keyless entry system.eng.srt

46.9 KB

My other car is your car compromising the Tesla Model X keyless entry system.mp4

27.2 MB

New First-Order Secure AES Performance Records.eng.srt

40.5 KB

New First-Order Secure AES Performance Records.mp4

27.8 MB

Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno....eng.srt

34.6 KB

Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno....mp4

16.5 MB

NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 ....eng.srt

35.9 KB

NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 ....mp4

18.4 MB

Online Template Attacks Revisited.eng.srt

39.0 KB

Online Template Attacks Revisited.mp4

15.7 MB

Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.eng.srt

37.0 KB

Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.mp4

20.5 MB

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat....eng.srt

39.5 KB

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat....mp4

15.0 MB

Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.eng.srt

34.7 KB

Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.mp4

16.9 MB

Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.eng.srt

29.1 KB

Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.mp4

13.8 MB

Probing Security through Input-Output Separation and Revisited Quasilinear Masking.eng.srt

50.1 KB

Probing Security through Input-Output Separation and Revisited Quasilinear Masking.mp4

15.3 MB

Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf....eng.srt

45.5 KB

Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf....mp4

16.3 MB

Rainbow on Cortex-M4.eng.srt

47.5 KB

Rainbow on Cortex-M4.mp4

21.0 MB

Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.eng.srt

36.7 KB

Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.mp4

14.2 MB

Rapidly Verifiable XMSS Signatures.eng.srt

39.7 KB

Rapidly Verifiable XMSS Signatures.mp4

33.5 MB

RASSLE Return Address Stack based Side-channel LEakage.eng.srt

47.5 KB

RASSLE Return Address Stack based Side-channel LEakage.mp4

16.3 MB

Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.eng.srt

45.3 KB

Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.mp4

27.5 MB

Redundant Code-based Masking Revisited.eng.srt

40.0 KB

Redundant Code-based Masking Revisited.mp4

22.3 MB

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.eng.srt

37.3 KB

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.mp4

14.0 MB

Revealing the Weakness of Addition Chain Based Masked SBox Implementations.eng.srt

29.6 KB

Revealing the Weakness of Addition Chain Based Masked SBox Implementations.mp4

19.7 MB

Revisiting the functional bootstrap in TFHE.eng.srt

39.9 KB

Revisiting the functional bootstrap in TFHE.mp4

20.3 MB

ROTed Random Oblivious Transfer for embedded devices.eng.srt

31.3 KB

ROTed Random Oblivious Transfer for embedded devices.mp4

12.4 MB

s-1 CHES 2021 Opening Remarks.eng.srt

13.5 KB

s-1 CHES 2021 Opening Remarks.mp4

8.2 MB

s-2 Post-quantum crypto (part I).eng.srt

87.8 KB

s-2 Post-quantum crypto (part I).mp4

44.4 MB

s-4 Masking.eng.srt

93.9 KB

s-4 Masking.mp4

51.7 MB

s-6 Ask Me Anything (AMA) with Colin O’Flynn.eng.srt

74.0 KB

s-6 Ask Me Anything (AMA) with Colin O’Flynn.mp4

47.7 MB

s-8 Invited Talk by Carmela Troncoso.eng.srt

123.4 KB

s-8 Invited Talk by Carmela Troncoso.mp4

53.0 MB

s-10 Ask Me Anything (AMA) with Tanja Lange.eng.srt

61.8 KB

s-10 Ask Me Anything (AMA) with Tanja Lange.mp4

37.9 MB

s-12 Avant-garde crypto and protocols.eng.srt

79.6 KB

s-12 Avant-garde crypto and protocols.mp4

42.9 MB

s-14 Let’s Get Physical.eng.srt

107.0 KB

s-14 Let’s Get Physical.mp4

48.4 MB

s-16 Post-quantum crypto (part II).eng.srt

96.6 KB

s-16 Post-quantum crypto (part II).mp4

58.3 MB

s-18 CHES Test-of-Time Award Session.eng.srt

51.7 KB

s-18 CHES Test-of-Time Award Session.mp4

29.2 MB

s-20 Attacks against Real-World Systems.eng.srt

93.4 KB

s-20 Attacks against Real-World Systems.mp4

51.6 MB

s-22 Invited Talk by Robert N.M. Watson.eng.srt

162.6 KB

s-22 Invited Talk by Robert N.M. Watson.mp4

74.5 MB

s-24 Ask Me Anything (AMA) with Fatemeh Ganji.eng.srt

43.3 KB

s-24 Ask Me Anything (AMA) with Fatemeh Ganji.mp4

26.8 MB

s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.eng.srt

91.3 KB

s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.mp4

48.8 MB

s-28 Attacks (and Defenses).eng.srt

89.9 KB

s-28 Attacks (and Defenses).mp4

55.4 MB

s-30 Ask Me Anything (AMA) with Bart Preneel.eng.srt

69.7 KB

s-30 Ask Me Anything (AMA) with Bart Preneel.mp4

44.2 MB

s-33 AES and ISA extensions.eng.srt

89.5 KB

s-33 AES and ISA extensions.mp4

53.3 MB

s-34 Attacks against Classical PKC.eng.srt

98.9 KB

s-34 Attacks against Classical PKC.mp4

51.4 MB

s-37 White box, obfuscation, and logic locking.eng.srt

112.9 KB

s-37 White box, obfuscation, and logic locking.mp4

58.3 MB

s-39 Machine Learning for Side-Channel Attacks.eng.srt

111.7 KB

s-39 Machine Learning for Side-Channel Attacks.mp4

58.5 MB

s-41 Post-quantum Crypto (part III) CHES 2021 closing remarks.eng.srt

93.8 KB

s-41 Post-quantum Crypto (part III) CHES 2021 closing remarks.mp4

49.2 MB

s-42 CHES 2021 closing remarks.eng.srt

5.9 KB

s-42 CHES 2021 closing remarks.mp4

5.7 MB

s-99 Rump Session.eng.srt

193.4 KB

s-99 Rump Session.mp4

104.0 MB

Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.eng.srt

47.5 KB

Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.mp4

15.5 MB

SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.eng.srt

50.4 KB

SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.mp4

18.1 MB

Second-Order SCA Security with almost no Fresh Randomness.eng.srt

38.0 KB

Second-Order SCA Security with almost no Fresh Randomness.mp4

22.2 MB

Secure, Accurate, and Practical Narrow-Band Ranging System.eng.srt

24.4 KB

Secure, Accurate, and Practical Narrow-Band Ranging System.mp4

12.4 MB

Security and Trust in Open Source Security Tokens.eng.srt

40.7 KB

Security and Trust in Open Source Security Tokens.mp4

8.6 MB

Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.eng.srt

40.3 KB

Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.mp4

20.4 MB

Side-Channel Protections for Picnic Signatures.eng.srt

37.5 KB

Side-Channel Protections for Picnic Signatures.mp4

14.8 MB

Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr....eng.srt

39.9 KB

Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr....mp4

14.5 MB

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.eng.srt

37.9 KB

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.mp4

18.4 MB

The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.eng.srt

51.0 KB

The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.mp4

25.0 MB

The design of scalar AES Instruction Set Extensions for RISC-V.eng.srt

38.1 KB

The design of scalar AES Instruction Set Extensions for RISC-V.mp4

10.7 MB

The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for....eng.srt

38.7 KB

The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for....mp4

17.2 MB

Time-Memory Analysis of Parallel Collision Search Algorithms.eng.srt

45.3 KB

Time-Memory Analysis of Parallel Collision Search Algorithms.mp4

17.0 MB

Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em....eng.srt

20.3 KB

Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em....mp4

23.9 MB

Yoroi Updatable Whitebox Cryptography.eng.srt

31.3 KB

Yoroi Updatable Whitebox Cryptography.mp4

16.1 MB

/CHES 2022/

A compact and high-performance hardware architecture for CRYSTALS-Dilithium.eng.srt

28.1 KB

A compact and high-performance hardware architecture for CRYSTALS-Dilithium.mp4

13.7 MB

Best Paper Award Session.eng.srt

153.4 KB

Best Paper Award Session.mp4

71.2 MB

Invited talk Building OpenTitan by Dominic Rizzo, Google.eng.srt

103.5 KB

Invited talk Building OpenTitan by Dominic Rizzo, Google.mp4

44.8 MB

Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.eng.srt

174.4 KB

Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.mp4

83.2 MB

opening remarks.eng.srt

21.4 KB

opening remarks.mp4

11.5 MB

Partial session on High Order Masking.eng.srt

91.1 KB

Partial session on High Order Masking.mp4

35.7 MB

Rump Session.eng.srt

159.1 KB

Rump Session.mp4

84.0 MB

Session on Attribute Based and Fully Homomorphic Encryption.eng.srt

71.3 KB

Session on Attribute Based and Fully Homomorphic Encryption.mp4

28.4 MB

Session on Deep Learning Based Side Channel Attacks.eng.srt

148.4 KB

Session on Deep Learning Based Side Channel Attacks.mp4

73.9 MB

Session on Efficient Masking.eng.srt

141.6 KB

Session on Efficient Masking.mp4

67.2 MB

Session on Fast Hardware Implementations and Quantum Circuits.eng.srt

132.0 KB

Session on Fast Hardware Implementations and Quantum Circuits.mp4

51.6 MB

Session on Fast Implementations for Post Quantum Schemes.eng.srt

110.6 KB

Session on Fast Implementations for Post Quantum Schemes.mp4

67.8 MB

Session on Fault Protection Frameworks and SCA Countermeasures.eng.srt

147.1 KB

Session on Fault Protection Frameworks and SCA Countermeasures.mp4

65.4 MB

Session on Hardware Security.eng.srt

154.2 KB

Session on Hardware Security.mp4

67.4 MB

Session on Isogenies.eng.srt

64.2 KB

Session on Isogenies.mp4

29.9 MB

Session on Leakage Resilience and Masking Verification.eng.srt

157.6 KB

Session on Leakage Resilience and Masking Verification.mp4

62.1 MB

Session on Masking Schemes and their Analysis.eng.srt

144.6 KB

Session on Masking Schemes and their Analysis.mp4

62.0 MB

Session on Microarchitectural Leakage Modeling.eng.srt

88.9 KB

Session on Microarchitectural Leakage Modeling.mp4

36.1 MB

Session on NTT Implementations.eng.srt

122.7 KB

Session on NTT Implementations.mp4

68.0 MB

Session on Physical Unclonable Functions.eng.srt

145.6 KB

Session on Physical Unclonable Functions.mp4

70.3 MB

Session on Practical Fault Injection.eng.srt

144.0 KB

Session on Practical Fault Injection.mp4

70.7 MB

Session on RISC V.eng.srt

104.1 KB

Session on RISC V.mp4

55.5 MB

Session on Sensors Sensors Sensors.eng.srt

111.8 KB

Session on Sensors Sensors Sensors.mp4

38.0 MB

Session on Side Channel Attacks on Post Quantum Implementations 1.eng.srt

113.3 KB

Session on Side Channel Attacks on Post Quantum Implementations 1.mp4

65.9 MB

Session on Side Channel Metrics and Masking Schemes.eng.srt

127.2 KB

Session on Side Channel Metrics and Masking Schemes.mp4

66.8 MB

Session on Tools for SCA and Cryptanalysis.eng.srt

124.3 KB

Session on Tools for SCA and Cryptanalysis.mp4

61.5 MB

Session on Whitebox Cryptography.eng.srt

75.0 KB

Session on Whitebox Cryptography.mp4

31.8 MB

Silent session on Masking.mp4

14.8 MB

Test of Time Award.eng.srt

60.8 KB

Test of Time Award.mp4

35.3 MB

/CHES 2023/

(Security of) Efficient Exponentiation.eng.srt

87.7 KB

(Security of) Efficient Exponentiation.mp4

55.3 MB

Best Paper.eng.srt

51.6 KB

Best Paper.mp4

22.4 MB

CHES Test of Time Award Ceremony Rump Session.eng.srt

212.9 KB

CHES Test of Time Award Ceremony Rump Session.mp4

127.1 MB

Dealing with Microarchitectural Effects.eng.srt

85.5 KB

Dealing with Microarchitectural Effects.mp4

35.9 MB

Efficient Zero-Knowledge.eng.srt

100.9 KB

Efficient Zero-Knowledge.mp4

69.7 MB

Fault Analysis on Post Quantum Cryptography II.eng.srt

126.8 KB

Fault Analysis on Post Quantum Cryptography II.mp4

54.5 MB

Fault Analysis on Symmetric Algorithms I.eng.srt

82.3 KB

Fault Analysis on Symmetric Algorithms I.mp4

40.8 MB

Fault Analysis on Symmetric Algorithms II.eng.srt

70.4 KB

Fault Analysis on Symmetric Algorithms II.mp4

38.9 MB

Hardware Acceleration and Instruction Set Extensions.eng.srt

131.2 KB

Hardware Acceleration and Instruction Set Extensions.mp4

55.2 MB

Hardware Security.mp4

62.0 MB

Homomorphic Encryption.eng.srt

97.7 KB

Homomorphic Encryption.mp4

36.5 MB

Machine Learning and Side-Channel Analysis I.eng.srt

123.4 KB

Machine Learning and Side-Channel Analysis I.mp4

59.8 MB

Machine Learning and Side-Channel Analysis II.eng.srt

133.3 KB

Machine Learning and Side-Channel Analysis II.mp4

68.4 MB

Masking Post-Quantum Cryptography I.eng.srt

112.3 KB

Masking Post-Quantum Cryptography I.mp4

44.0 MB

Masking Post-Quantum Cryptography II.eng.srt

71.4 KB

Masking Post-Quantum Cryptography II.mp4

24.8 MB

Masking Techniques I.eng.srt

72.5 KB

Masking Techniques I.mp4

37.8 MB

Masking Techniques II.eng.srt

107.9 KB

Masking Techniques II.mp4

53.8 MB

Opening Remarks Invited Talk I.eng.srt

151.2 KB

Opening Remarks Invited Talk I.mp4

57.8 MB

Pairings.eng.srt

67.9 KB

Pairings.mp4

30.4 MB

Post-Quantum Cryptography in Software I.eng.srt

82.5 KB

Post-Quantum Cryptography in Software I.mp4

41.1 MB

Post-Quantum Cryptography in Software II.eng.srt

83.4 KB

Post-Quantum Cryptography in Software II.mp4

34.5 MB

Security of ECC (Implementations).eng.srt

164.6 KB

Security of ECC (Implementations).mp4

75.0 MB

Side Channel Attacks on Post Quantum Implementations I.eng.srt

75.1 KB

Side Channel Attacks on Post Quantum Implementations I.mp4

38.4 MB

Side-Channel Attacks on Post-Quantum Implementations II.eng.srt

125.6 KB

Side-Channel Attacks on Post-Quantum Implementations II.mp4

60.2 MB

Side-Channel Attacks on Post-Quantum Implementations III.eng.srt

75.7 KB

Side-Channel Attacks on Post-Quantum Implementations III.mp4

41.7 MB

Side-Channel Attacks on Symmetric Algorithms I.eng.srt

128.8 KB

Side-Channel Attacks on Symmetric Algorithms I.mp4

59.1 MB

Side-Channel Attacks on Symmetric Algorithms II.eng.srt

117.5 KB

Side-Channel Attacks on Symmetric Algorithms II.mp4

61.3 MB

Side-Channel Evaluation and Distinguishers.mp4

56.1 MB

Symmetric Designs.eng.srt

76.1 KB

Symmetric Designs.mp4

43.5 MB

True Randomness Closing Remarks.eng.srt

91.1 KB

True Randomness Closing Remarks.mp4

82.7 MB

White-Box Cryptography I.eng.srt

111.2 KB

White-Box Cryptography I.mp4

52.4 MB

White-Box Cryptography II.eng.srt

70.1 KB

White-Box Cryptography II.mp4

34.6 MB

/Eurocrypt/Eurocrypt 2012/

A Tutorial on High Performance Computing Applied to Cryp.mp4

42.6 MB

Adaptively Attribute-Hiding (Hierarchical) Inner Product.mp4

17.7 MB

All-But-Many Lossy Trapdoor Functions..mp4

19.7 MB

Another Look at Provable Security..mp4

40.2 MB

Concurrently Secure Computation in Constant Rounds..mp4

15.4 MB

Cover and Decomposition Index Calculus on Elliptic Curve.mp4

26.9 MB

Cryptanalyses on a Merkle-Damg&aring - rd Based MAC - Almo.mp4

18.2 MB

Decoding Random Binary Linear Codes in 2 n 20 - How 1 1.mp4

21.1 MB

Detecting Dangerous Queries - A New Approach for Chosen C.mp4

13.8 MB

Efficient and Optimally Secure Key-Length Extension for.mp4

17.8 MB

Efficient Zero-Knowledge Argument for Correctness of a S.mp4

15.4 MB

Fair Computation with Rational Players..mp4

13.5 MB

Faster Algorithms for Approximate Common Divisors - Break.mp4

18.1 MB

Fully Homomorphic Encryption with Polylog Overhead..mp4

16.8 MB

Identity-Based (Lossy) Trapdoor Functions and Applications..mp4

16.2 MB

Identity-Based Encryption Resilient to Continual Auxilia.mp4

21.0 MB

Incremental Deterministic Public-Key Encryption..mp4

16.2 MB

Key-Alternating Ciphers in a Provable Setting - Encryptio.mp4

15.5 MB

Lattice Signatures without Trapdoors..mp4

14.3 MB

Message Authentication, Revisited..mp4

19.6 MB

Multiparty Computation with Low Communication, Computati.mp4

22.3 MB

Narrow-Bicliques - Cryptanalysis of Full IDEA..mp4

16.7 MB

On the Exact Security of Schnorr-Type Signatures in the.mp4

23.9 MB

Optimal Security Proofs for Full Domain Hash, Revisited..mp4

17.0 MB

Property Preserving Symmetric Encryption..mp4

16.4 MB

Pseudorandom Functions and Lattices..mp4

12.5 MB

Public Key Compression and Modulus Switching for Fully H.mp4

21.8 MB

Quantum Proofs of Knowledge..mp4

17.8 MB

Robust Coin Flipping..mp4

19.3 MB

Security of Symmetric Encryption in the Presence of Ciph.mp4

16.1 MB

Standard Security Does Not Imply Security against Select.mp4

11.9 MB

Statistical Tools Flavor Side-Channel Collision Attacks..mp4

19.4 MB

Tightly-Secure Signatures from Lossy Identification Schemes..mp4

17.0 MB

Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller..mp4

18.1 MB

Unconditionally-Secure Robust Secret Sharing with Compac.mp4

17.8 MB

/Eurocrypt/Eurocrypt 2016/

Adaptively Secure Identity-Based Encryption from Lattices with.mp4

18.0 MB

All Complete Functionalities are Reversible.mp4

13.2 MB

Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.mp4

13.3 MB

Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.mp4

17.7 MB

CFRG Meeting.mp4

69.1 MB

Circuit Compilers with O(1 - log (n)) Leakage Rate.mp4

13.6 MB

Computationally Binding Quantum Commitments.mp4

16.7 MB

Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.mp4

15.5 MB

Constrained Pseudorandom Functions for Unconstrained Inputs.mp4

10.6 MB

Engineering Code Obfuscation.mp4

43.4 MB

Essentially Optimal Robust Secret Sharing with Maximal Corruptions.mp4

13.2 MB

Eurocrypt 2016 Rump Session.mp4

87.4 MB

Fair and Robust MPC using a Global Transaction Ledger.mp4

15.6 MB

Faster Algorithms for Solving LPN.mp4

19.0 MB

Freestart Collision for Full SHA-1.mp4

13.1 MB

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.mp4

15.0 MB

IACR Business meeting, Eurocrypt 2016.mp4

26.5 MB

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.mp4

15.0 MB

Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.mp4

13.6 MB

Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.mp4

12.7 MB

Indifferentiability of Confusion-Diffusion Networks.mp4

17.0 MB

Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.mp4

15.6 MB

Multi-input Functional Encryption in the Private-Key Setting -.mp4

14.5 MB

New Attacks on the Concatenation and XOR Hash Combiners.mp4

13.0 MB

New negative results on differing-inputs obfuscation.mp4

11.3 MB

On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.mp4

13.6 MB

On the Impossibility of Tight Cryptographic Reductions.mp4

14.3 MB

On the Power of Hierarchical Identity-Based Encryption.mp4

14.2 MB

On the Size of Pairing-Based Non-interactive Arguments.mp4

16.9 MB

Online Offline OR Composition of Sigma Protocols.mp4

12.2 MB

Protecting TLS from legacy crypto, Karthikeyan Bhargavan.mp4

41.1 MB

Provably Robust Sponge-Based PRNGs and KDFs.mp4

15.0 MB

Provably Weak Instances of Ring-LWE Revisited.mp4

15.5 MB

Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.mp4

14.7 MB

Randomness Complexity of Private Circuits for Multiplication.mp4

10.4 MB

Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.mp4

17.1 MB

Sanitization of FHE Ciphertexts.mp4

13.0 MB

Secure Computation from Elastic Noisy Channels.mp4

21.0 MB

Securing Cryptography Implementations in Embedded Systems, part I.mp4

36.4 MB

Security Cryptography Implementations in Embedded Systems, Part 2..mp4

36.6 MB

Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.mp4

12.2 MB

The Exact Round Complexity of Secure Computation.mp4

13.1 MB

The future of cryptography.mp4

42.0 MB

Tightly CCA-Secure Encryption Without Pairings.mp4

13.0 MB

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.mp4

16.5 MB

Two Round Multiparty Computation via Multi-key FHE.mp4

14.1 MB

Unconditionally Secure Computation with Reduced Interaction.mp4

13.1 MB

Zero-Knowledge Arguments for Lattice-Based Accumulators.mp4

13.8 MB

/Eurocrypt/Eurocrypt 2017/

0 RTT Key Exchange with Full Forward Secrecy.mp4

34.2 MB

0 RTT Key Exchange with Full Forward Secrecy.srt

48.9 KB

A kilobit hidden SNFS discrete logarithm computation.mp4

19.4 MB

A kilobit hidden SNFS discrete logarithm computation.srt

60.4 KB

A New Structural Differential Property of 5 Round AES.mp4

13.4 MB

A New Structural Differential Property of 5 Round AES.srt

48.4 KB

A Note on Perfect Correctness by Derandomization.mp4

22.3 MB

A Note on Perfect Correctness by Derandomization.srt

51.6 KB

Ad Hoc PSM Protocols Secure Computation without Coordination.mp4

17.4 MB

Adaptive partitioning.mp4

44.9 MB

Adaptive partitioning.srt

76.5 KB

Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.mp4

16.4 MB

Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.srt

57.0 KB

Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.mp4

22.9 MB

Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.srt

66.5 KB

Breaking the Sub Exponential Barrier in Obfustopia.mp4

24.4 MB

Breaking the Sub Exponential Barrier in Obfustopia.srt

59.2 KB

Computational integrity with a public random string from quasi linear PCPs.mp4

24.2 MB

Computational integrity with a public random string from quasi linear PCPs.srt

43.3 KB

Computing generator in cyclotomic integer rings.mp4

20.4 MB

Computing generator in cyclotomic integer rings.srt

43.0 KB

Concurrently composable security with shielded super polynomial simulators.mp4

14.7 MB

Concurrently composable security with shielded super polynomial simulators.srt

45.5 KB

Conditional Cube Attack on Reduced Round Keccak Sponge Function.mp4

26.8 MB

Conditional Cube Attack on Reduced Round Keccak Sponge Function.srt

44.4 KB

Constrain't hiding constrained PRFs for NC1 from LWE.mp4

21.1 MB

Constrain't hiding constrained PRFs for NC1 from LWE.srt

58.2 KB

Cryptanalyses of Candidate Branching Program Obfuscators.mp4

22.4 MB

Cryptanalyses of Candidate Branching Program Obfuscators.srt

56.6 KB

Cryptography with Updates.mp4

24.1 MB

Cryptography with Updates.srt

66.2 KB

Decentralized Anonymous Micropayments.mp4

19.4 MB

Decentralized Anonymous Micropayments.srt

52.5 KB

Depth Robust Graphs and Their Cumulative Memory Complexity.mp4

25.6 MB

Depth Robust Graphs and Their Cumulative Memory Complexity.srt

64.4 KB

Faster Secure Two Party Computation in the Single Execution Setting.mp4

24.0 MB

Faster Secure Two Party Computation in the Single Execution Setting.srt

60.2 KB

Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.mp4

29.2 MB

Formal Abstractions for Attested Execution Secure Processors.mp4

22.8 MB

Formal Abstractions for Attested Execution Secure Processors.srt

66.1 KB

From Minicrypt to Obfustopia via Private Key Functional Encryption.mp4

17.2 MB

From Minicrypt to Obfustopia via Private Key Functional Encryption.srt

48.8 KB

Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.mp4

17.7 MB

Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.srt

73.8 KB

Group Based Secure Computation Optimizing Rounds, Communication, and Computation.mp4

26.4 MB

Group Based Secure Computation Optimizing Rounds, Communication, and Computation.srt

76.3 KB

Hashing Garbled Circuits for Free.mp4

18.1 MB

Hashing Garbled Circuits for Free.srt

51.5 KB

High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.mp4

15.7 MB

High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.srt

43.6 KB

How Fast Can Higher Order Masking Be in Software.mp4

20.8 MB

Improved Private Set Intersection against Malicious Adversaries.mp4

18.3 MB

Improved Private Set Intersection against Malicious Adversaries.srt

60.9 KB

Invited talk - Advances in computer aided cryptography.mp4

70.0 MB

Invited talk - Advances in computer aided cryptography.srt

156.6 KB

Invited talk - Living Between the Ideal and Real Worlds.mp4

52.4 MB

Invited talk - Living Between the Ideal and Real Worlds.srt

185.6 KB

Lattice Based SNARGs and Their Application to More Efficient Obfuscation.srt

79.2 KB

Modifying an Enciphering Scheme after Deployment.mp4

13.4 MB

Modifying an Enciphering Scheme after Deployment.srt

39.2 KB

Multi Input Inner Product Functional Encryption from Pairings.mp4

14.3 MB

Multi Input Inner Product Functional Encryption from Pairings.srt

44.6 KB

New Collision Attacks on Round Reduced Keccak.mp4

14.8 MB

New Collision Attacks on Round Reduced Keccak.srt

35.9 KB

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.mp4

24.8 MB

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.srt

50.8 KB

Non Interactive Secure 2PC in the Offline Online and Batch Settings.mp4

28.2 MB

Non Interactive Secure 2PC in the Offline Online and Batch Settings.srt

80.8 KB

On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.mp4

19.4 MB

On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.srt

59.3 KB

On Removing Graded Encodings from Functional Encryption.mp4

17.6 MB

On Removing Graded Encodings from Functional Encryption.srt

47.5 KB

On the Exact Round Complexity of Self Composable Two Party Computation.mp4

21.3 MB

On the Exact Round Complexity of Self Composable Two Party Computation.srt

51.8 KB

One Shot Verifiable Encryption from Lattices.mp4

27.5 MB

One Shot Verifiable Encryption from Lattices.srt

74.8 KB

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.mp4

22.6 MB

Private Puncturable PRFs From Standard Lattice Assumptions.mp4

23.6 MB

Private Puncturable PRFs From Standard Lattice Assumptions.srt

62.1 KB

Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.mp4

17.9 MB

Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.srt

55.6 KB

Public Seed Pseudorandom Permutations.mp4

21.8 MB

Quantum Authentication and Encryption with Key Recycling.mp4

30.7 MB

Quantum Authentication and Encryption with Key Recycling.srt

60.2 KB

Quantum authentication with key recycling.mp4

37.6 MB

Quantum authentication with key recycling.srt

76.0 KB

Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.mp4

20.9 MB

Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.srt

64.8 KB

Random Sampling Revisited Lattice Enumeration with Discrete Pruning.mp4

19.6 MB

Random Sampling Revisited Lattice Enumeration with Discrete Pruning.srt

56.4 KB

Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.mp4

35.8 MB

Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.srt

61.6 KB

Removing the Strong RSA Assumption from Arguments over the Integers.mp4

22.2 MB

Removing the Strong RSA Assumption from Arguments over the Integers.srt

61.1 KB

Revisiting Lattice Attacks on overstretched NTRU parameters.mp4

22.4 MB

Revisiting Lattice Attacks on overstretched NTRU parameters.srt

39.5 KB

Robust transforming combiners from indistinguishability obfuscation to functional encryption.mp4

18.1 MB

Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.mp4

25.6 MB

Short generators without quantum computers the case of multiquadratics.mp4

21.6 MB

Short Stickelberger Class Relations and application to Ideal SVP.mp4

21.1 MB

Short Stickelberger Class Relations and application to Ideal SVP.srt

49.1 KB

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.mp4

17.5 MB

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.srt

51.5 KB

Small CRT Exponent RSA Revisited.mp4

17.5 MB

Small CRT Exponent RSA Revisited.srt

42.7 KB

Sublinear Zero Knowledge Arguments for RAM Programs.mp4

17.4 MB

The Multi User Security of Double Encryption.mp4

20.7 MB

The Multi User Security of Double Encryption.srt

38.9 KB

Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.mp4

20.8 MB

Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.srt

44.2 KB

Twisted u4 normal form for elliptic curves.mp4

22.6 MB

Twisted u4 normal form for elliptic curves.srt

38.1 KB

Unconditional UC Secure Computation with Stronger Malicious PUFs.mp4

16.7 MB

/Eurocrypt/Eurocrypt 2018/

A New Approach to Black-Box Concurrent Secure Computation.eng.srt

41.0 KB

A New Approach to Black-Box Concurrent Secure Computation.mp4

21.0 MB

Adaptively Secure Garbling with Near Optimal Online Complexity.mp4

18.0 MB

An Efficiency-Preserving Transformation from.mp4

19.6 MB

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.mp4

20.3 MB

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.mp4

18.1 MB

Formal Verification of Masked Hardware Implementations in the Presence of Glitches.eng.srt

58.4 KB

Formal Verification of Masked Hardware Implementations in the Presence of Glitches.mp4

27.3 MB

Fuzzy Password-Authenticated Key Exchange.eng.srt

55.7 KB

Fuzzy Password-Authenticated Key Exchange.mp4

18.1 MB

k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.mp4

21.5 MB

Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).eng.srt

55.5 KB

Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).mp4

22.6 MB

Masking Proofs Are Tight and How to Exploit it in Security Evaluations.eng.srt

81.2 KB

Masking Proofs Are Tight and How to Exploit it in Security Evaluations.mp4

27.1 MB

Masking the GLP Lattice-Based Signature Scheme at Any Order.eng.srt

50.4 KB

Masking the GLP Lattice-Based Signature Scheme at Any Order.mp4

19.9 MB

Non-malleable Codes from Average-Case Hardness.mp4

15.9 MB

Non-malleable Randomness Encoders and Their Applications.mp4

19.3 MB

Obfustopia Built on Secret-Key Functional Encryption.eng.srt

47.3 KB

Obfustopia Built on Secret-Key Functional Encryption.mp4

17.1 MB

On the Existence of Three Round Zero-Knowledge Proofs.eng.srt

48.0 KB

On the Existence of Three Round Zero-Knowledge Proofs.mp4

15.4 MB

OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.mp4

16.3 MB

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.mp4

24.3 MB

Simple Proofs of Sequential Work.mp4

25.9 MB

Statistical Witness Indistinguishability (and more) in Two Messages.eng.srt

57.5 KB

Statistical Witness Indistinguishability (and more) in Two Messages.mp4

21.1 MB

Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.mp4

22.5 MB

The Discrete-Logarithm Problem with Preprocessing.mp4

27.5 MB

Thirty Years of Digital Currency - From Digicash to the Blockchain.eng.srt

154.2 KB

Thirty Years of Digital Currency - From Digicash to the Blockchain.mp4

45.7 MB

too short MTS.eng.srt

0.6 KB

too short MTS.mp4

630.6 KB

Two-Round Multiparty Secure Computation from Minimal Assumptions.mp4

19.4 MB

/.../Eurocrypt 2018 Rump Session/

3rd SKINNY Breaking Competition.mp4

4.8 MB

A basketful of secret shares.mp4

4.3 MB

Announcement - Lightsec workshop.mp4

958.4 KB

Another Application of Cryptocurrencies.eng.srt

14.7 KB

Another Application of Cryptocurrencies.mp4

5.5 MB

Bernstein Bound is Tight.mp4

5.2 MB

Conditional Linear Cryptanalysis.mp4

4.0 MB

Cryptography with Dispensable Backdoors.mp4

5.4 MB

CSIDH - an efficient post-quantum commutative group action.mp4

8.0 MB

Decoding distortions using frequency analysis.eng.srt

11.1 KB

Decoding distortions using frequency analysis.mp4

3.2 MB

ElectroEuro.mp4

3.7 MB

How to (not) share a password.mp4

5.6 MB

How to synchronize efficiently.mp4

4.0 MB

How we avoided a second Dual-EC-DRBG fiasco.eng.srt

15.3 KB

How we avoided a second Dual-EC-DRBG fiasco.mp4

5.4 MB

IACR Fellows nomination.mp4

3.5 MB

Kittens, Models And Thieves.mp4

4.4 MB

libpqcrypto.mp4

4.0 MB

Make AES great again.mp4

2.9 MB

Must the Communication Graph of MPC Protocols be an Expander.mp4

3.3 MB

NIST Update.mp4

5.1 MB

P2P social networks - why and how viable.eng.srt

7.6 KB

P2P social networks - why and how viable.mp4

2.8 MB

PRG.mp4

3.6 MB

QueerCrypt.mp4

2.5 MB

Random Oracles in the Real World.mp4

5.6 MB

Reverse Kuleshov effect in cryptography.mp4

3.2 MB

Small-Box Cryptography, and the Provable Security of SPNs.mp4

6.1 MB

State-Separating Proofs - A Reduction Methodology for Real-World Protocols.mp4

5.6 MB

TCC GOA.mp4

2.1 MB

The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.mp4

4.6 MB

The ZUC-256 Stream Cipher.mp4

2.9 MB

Unknown presentation.mp4

1.3 MB

Workshops @ Crypto 2018.mp4

3.1 MB

/Eurocrypt/Eurocrypt 2019/

A Modular Treatment of Blind Signatures from Identification Schemes.eng.srt

37.6 KB

A Modular Treatment of Blind Signatures from Identification Schemes.mp4

12.1 MB

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.eng.srt

31.6 KB

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.mp4

11.8 MB

A Quantum-Proof Non-malleable Extractor.eng.srt

31.5 KB

A Quantum-Proof Non-malleable Extractor.mp4

19.8 MB

Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.eng.srt

37.6 KB

Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.mp4

11.8 MB

An Algebraic Approach to Maliciously Secure Private Set Intersection.eng.srt

39.0 KB

An Algebraic Approach to Maliciously Secure Private Set Intersection.mp4

16.8 MB

An Analysis of NIST SP 800-90A.eng.srt

47.8 KB

An Analysis of NIST SP 800-90A.mp4

23.6 MB

Approx-SVP in Ideal Lattices with Pre-processing.eng.srt

42.5 KB

Approx-SVP in Ideal Lattices with Pre-processing.mp4

16.3 MB

Attacks only Get Better How to Break FF3 on Large Domains.eng.srt

33.7 KB

Attacks only Get Better How to Break FF3 on Large Domains.mp4

17.7 MB

Beyond Birthday Bound Secure MAC in Faulty Nonce Model.eng.srt

27.1 KB

Beyond Birthday Bound Secure MAC in Faulty Nonce Model.mp4

15.4 MB

bison Instantiating the Whitened Swap-Or-Not Construction.mp4

15.2 MB

Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.eng.srt

29.9 KB

Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.mp4

16.1 MB

Computationally Volume-Hiding Structured Encryption.eng.srt

48.6 KB

Computationally Volume-Hiding Structured Encryption.mp4

16.5 MB

Consensus Through Herding.eng.srt

56.8 KB

Consensus Through Herding.mp4

23.1 MB

Continuous Non-Malleable Codes in the 8-Split-State Model.mp4

19.9 MB

Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.eng.srt

27.4 KB

Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.mp4

19.4 MB

Degree 2 is Complete for the Round-Complexity of Malicious MPC.eng.srt

20.1 KB

Degree 2 is Complete for the Round-Complexity of Malicious MPC.mp4

11.0 MB

Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.eng.srt

24.2 KB

Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.mp4

12.1 MB

Designated-Verifier Pseudorandom Generators, and Their Applications.eng.srt

27.9 KB

Designated-Verifier Pseudorandom Generators, and Their Applications.mp4

10.5 MB

Differential Privacy and the People's Data.eng.srt

86.2 KB

Differential Privacy and the People's Data.mp4

50.9 MB

Distributional Collision Resistance Beyond One-Way Functions.mp4

22.1 MB

Durandal A Rank Metric Based Signature Scheme.eng.srt

27.1 KB

Durandal A Rank Metric Based Signature Scheme.mp4

13.4 MB

Efficient Circuit-Based PSI with Linear Communication.mp4

15.9 MB

Efficient Verifiable Delay Functions.eng.srt

47.6 KB

Efficient Verifiable Delay Functions.mp4

17.1 MB

Founding Secure Computation on Blockchains.eng.srt

43.4 KB

Founding Secure Computation on Blockchains.mp4

18.6 MB

From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.eng.srt

53.0 KB

From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.mp4

23.3 MB

Fully Homomorphic Encryption from the Ground Up.mp4

44.7 MB

Homomorphic Secret Sharing from Lattices Without FHE.eng.srt

40.2 KB

Homomorphic Secret Sharing from Lattices Without FHE.mp4

16.2 MB

Improved Bootstrapping for Approximate Homomorphic Encryption.eng.srt

34.8 KB

Improved Bootstrapping for Approximate Homomorphic Encryption.mp4

17.2 MB

Incremental Proofs of Sequential Work.eng.srt

39.4 KB

Incremental Proofs of Sequential Work.mp4

18.4 MB

Locality-Preserving Oblivious RAM.eng.srt

35.7 KB

Locality-Preserving Oblivious RAM.mp4

18.4 MB

Lower Bounds for Differentially Private RAMs.eng.srt

55.5 KB

Lower Bounds for Differentially Private RAMs.mp4

19.9 MB

Minicrypt Primitives with Algebraic Structure and Applications.mp4

12.8 MB

Misuse Attacks on Post-quantum Cryptosystems.eng.srt

32.2 KB

Misuse Attacks on Post-quantum Cryptosystems.mp4

17.7 MB

Multi-party Virtual State Channels.mp4

16.3 MB

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.eng.srt

40.2 KB

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.mp4

16.7 MB

New Techniques for Obfuscating Conjunctions.eng.srt

57.1 KB

New Techniques for Obfuscating Conjunctions.mp4

26.0 MB

Non-Malleable Codes Against Bounded Polynomial Time Tampering.eng.srt

41.8 KB

Non-Malleable Codes Against Bounded Polynomial Time Tampering.mp4

21.6 MB

On ELFs, Deterministic Encryption, and Correlated-Input Security.eng.srt

45.6 KB

On ELFs, Deterministic Encryption, and Correlated-Input Security.mp4

19.9 MB

On Quantum Advantage in Information Theoretic Single-Server PIR.eng.srt

52.7 KB

On Quantum Advantage in Information Theoretic Single-Server PIR.mp4

19.6 MB

Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.eng.srt

27.8 KB

Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.mp4

15.4 MB

Private Anonymous Data Access.eng.srt

37.1 KB

Private Anonymous Data Access.mp4

23.6 MB

Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.eng.srt

47.4 KB

Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.mp4

19.7 MB

Quantum Lightning Never Strikes the Same State Twice.eng.srt

49.7 KB

Quantum Lightning Never Strikes the Same State Twice.mp4

19.5 MB

Reusable Designated-Verifier NIZKs for all NP from CDH.eng.srt

19.0 KB

Reusable Designated-Verifier NIZKs for all NP from CDH.mp4

7.1 MB

Reversible Proofs of Sequential Work.eng.srt

41.5 KB

Reversible Proofs of Sequential Work.mp4

15.9 MB

Revisiting Non-Malleable Secret Sharing.eng.srt

49.7 KB

Revisiting Non-Malleable Secret Sharing.mp4

21.5 MB

Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.mp4

19.0 MB

SeaSign Compact Isogeny Signatures from Class Group Actions.eng.srt

48.2 KB

SeaSign Compact Isogeny Signatures from Class Group Actions.mp4

20.8 MB

Secret-Sharing Schemes for General and Uniform Access Structures.mp4

22.2 MB

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.mp4

16.4 MB

Simple Schemes in the Bounded Storage Model.eng.srt

57.8 KB

Simple Schemes in the Bounded Storage Model.mp4

29.7 MB

Symbolic Encryption with Pseudorandom Keys.mp4

25.4 MB

The General Sieve Kernel and New Records in Lattice Reduction.eng.srt

39.4 KB

The General Sieve Kernel and New Records in Lattice Reduction.mp4

14.4 MB

Tight Proofs of Space and Replication.eng.srt

48.3 KB

Tight Proofs of Space and Replication.mp4

27.6 MB

Tight Time-Memory Trade-Offs for Symmetric Encryption.eng.srt

39.0 KB

Tight Time-Memory Trade-Offs for Symmetric Encryption.mp4

16.1 MB

Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).eng.srt

117.9 KB

Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).mp4

57.0 MB

Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.eng.srt

34.6 KB

Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.mp4

19.8 MB

Two Round Information-Theoretic MPC with Malicious Security.eng.srt

28.7 KB

Two Round Information-Theoretic MPC with Malicious Security.mp4

15.3 MB

Uncovering Algebraic Structures in the MPC Landscape.eng.srt

44.4 KB

Uncovering Algebraic Structures in the MPC Landscape.mp4

19.4 MB

Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.eng.srt

32.8 KB

Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.mp4

14.2 MB

Welcome to Eurocrypt 2019, Marc Fischlin.eng.srt

10.2 KB

Welcome to Eurocrypt 2019, Marc Fischlin.mp4

9.2 MB

Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.mp4

28.3 MB

/Eurocrypt/Eurocrypt 2020/

(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.mp4

13.8 MB

Adaptively Secure ABE for DFA from k-Lin and More.mp4

12.6 MB

An Algebraic Attack on Rank Metric Code-Based Cryptosystems.mp4

20.2 MB

Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.mp4

18.8 MB

Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.mp4

16.5 MB

Broadcast-Optimal Two-Round MPC.mp4

15.5 MB

Candidate iO From Homomorphic Encryption Schemes.mp4

33.8 MB

Combiners for Functional Encryption, Unconditionally.mp4

11.3 MB

Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.mp4

14.3 MB

Compact NIZKs from Standard Assumptions on Bilinear Maps.mp4

20.1 MB

Continuous Verifiable Delay Functions.mp4

14.5 MB

Double-Base Chains for Scalar Multiplications on Elliptic Curves.mp4

11.5 MB

Efficient Constructions for Almost-everywhere Secure Computation.mp4

9.1 MB

Efficient simulation of random states and random unitaries.mp4

13.9 MB

Everybody's a Target Scalability in Public-Key Encryption.mp4

12.2 MB

Evolving Ramp Secret Sharing with a Small Gap.mp4

12.1 MB

Extracting Randomness from Extractor-Dependent Sources.mp4

9.9 MB

Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.mp4

20.0 MB

Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.mp4

17.0 MB

Formalizing Data Deletion in the Context of the Right to be Forgotten.mp4

12.1 MB

Fractal Post-Quantum and Transparent Recursive Proofs from Holography.mp4

18.4 MB

Friet an Authenticated Encryption Scheme with Built-in Fault Detection.mp4

16.7 MB

Generic-Group Delay Functions Require Hidden-Order Groups.mp4

18.8 MB

Hardness of LWE on General Entropic Distributions.mp4

12.2 MB

He Gives C-Sieves on the CSIDH.mp4

16.6 MB

How to Extract Useful Randomness from Unreliable Sources.mp4

18.7 MB

Implementing Grover oracles for quantum key search on AES and LowMC.mp4

10.6 MB

Impossibility Results for Lattice-Based Functional Encryption Schemes.mp4

21.1 MB

Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.mp4

14.5 MB

Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.mp4

15.0 MB

Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.mp4

13.9 MB

Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.mp4

13.8 MB

Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.mp4

13.4 MB

Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.mp4

12.7 MB

Low Error Efficient Computational Extractors in the CRS Model.mp4

14.9 MB

Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.mp4

12.9 MB

Lower Bounds for Leakage-Resilient Secret Sharing.mp4

8.6 MB

Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.mp4

15.6 MB

Mathematics and Cryptography A Marriage of Convenience.mp4

37.9 MB

Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.mp4

20.9 MB

Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.mp4

14.8 MB

Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.mp4

19.1 MB

New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.mp4

19.7 MB

New Slide Attacks on Almost Self-Similar Ciphers.mp4

30.4 MB

Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.mp4

18.6 MB

On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.mp4

16.7 MB

On Instantiating the Algebraic Group Model from Falsifiable Assumptions.mp4

25.2 MB

On the Memory-Tightness of Hashed ElGamal.mp4

10.5 MB

On the Quantum Complexity of the Continuous Hidden Subgroup Problem.mp4

10.2 MB

On the Streaming Indistinguishability of a Random Permutation and a Random Function.mp4

15.2 MB

Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.mp4

22.1 MB

OptORAMa Optimal Oblivious RAM.mp4

14.8 MB

Private Aggregation from Fewer Anonymous Messages.mp4

19.6 MB

Private Information Retrieval with Sublinear Online Time.mp4

14.1 MB

PSI from PaXoS Fast, Malicious Private Set Intersection.mp4

12.3 MB

Quantum Security Analysis of CSIDH.mp4

25.5 MB

Quantum-access-secure message authentication via blind-unforgeability.mp4

13.0 MB

Rational isogenies from irrational endomorphisms.mp4

12.4 MB

Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.mp4

13.0 MB

s-178 Opening Remarks and Number-theoretic Cryptography.mp4

78.3 MB

s-180 Best Paper Award.mp4

30.7 MB

s-182 Obfuscation, Functional Encryption, and Attribute-Based Encryption.mp4

54.2 MB

s-184 Best Young Researcher Award.mp4

42.4 MB

s-185 Symmetric Cryptanalysis.mp4

72.2 MB

s-186 Quantum Cryptography.mp4

46.4 MB

s-188 Quantum Cryptanalysis.mp4

43.3 MB

s-190 Secure Computation.mp4

58.7 MB

s-192 IACR Membership Meeting Part I.mp4

68.7 MB

s-193 Symmetric Designs.mp4

68.0 MB

s-194 Zero Knowledge.mp4

60.1 MB

s-196 Succinct and Concretely Efficient Proof Systems.mp4

58.4 MB

s-198 Mathematics and Cryptography A Marriage of Convenience.mp4

49.4 MB

s-200 IACR Fellows Ceremony and Rump Session.mp4

145.0 MB

s-201 Side-Channel and Fault Attacks.mp4

81.2 MB

s-202 Verifiable Delay Functions and Randomness Extraction.mp4

55.2 MB

s-204 Secret Sharing and Information Privacy.mp4

70.0 MB

s-206 Fine-Grained Cryptography A New Frontier.mp4

53.2 MB

s-207 Lattice-Based and Code-Based Cryptography.mp4

65.9 MB

s-209 Public-Key Encryption and Generic Models.mp4

54.8 MB

s-211 Closing Remarks Feedback Session.mp4

88.4 MB

s-212 Panel Discussion on Contact Tracing.mp4

138.4 MB

Secure Multi-party Quantum Computation with a Dishonest Majority.mp4

14.0 MB

Security of Hedged Fiat-Shamir Signatures under Fault Attacks.mp4

26.4 MB

Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.mp4

20.9 MB

Side-channel Masking with Pseudo-Random Generator.mp4

22.6 MB

Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.mp4

9.9 MB

Signatures from Sequential-OR Proofs.mp4

15.6 MB

SPARKs Succinct Parallelizable Arguments of Knowledge.mp4

15.5 MB

Stacked Garbling for Disjunctive Zero-Knowledge Proofs.mp4

10.5 MB

Statistical ZAP Arguments.mp4

11.5 MB

Statistical ZAPR Arguments from Bilinear Maps.mp4

15.3 MB

Statistical Zaps and New Oblivious Transfer Protocols.mp4

14.3 MB

Succinct Non-Interactive Secure Computation.mp4

13.1 MB

The Price of Active Security in Cryptographic Protocols.mp4

11.4 MB

The Retracing Boomerang Attack.mp4

29.8 MB

Tight Security Bounds for Double-block Hash-then-Sum MACs.mp4

12.2 MB

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.mp4

17.7 MB

TNT How to Tweak a Block Cipher.mp4

13.9 MB

Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.mp4

13.7 MB

Transparent SNARKs from DARK Compilers.mp4

12.2 MB

Two-Round Oblivious Transfer from CDH or LPN.mp4

11.4 MB

Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.mp4

22.7 MB

/Eurocrypt/Eurocrypt 2021/

A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx....eng.srt

33.3 KB

A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx....mp4

12.5 MB

A Decade (or so) of fully homomorphic encryption, by Craig Gentry.eng.srt

146.6 KB

A Decade (or so) of fully homomorphic encryption, by Craig Gentry.mp4

66.8 MB

A Deeper Look at Machine Learning-Based Cryptanalysis.eng.srt

42.2 KB

A Deeper Look at Machine Learning-Based Cryptanalysis.mp4

27.0 MB

Abuse Resistant Law Enforcement Access Systems.eng.srt

33.2 KB

Abuse Resistant Law Enforcement Access Systems.mp4

11.8 MB

Advanced Lattice Sieving on GPUs, with Tensor Cores.eng.srt

47.1 KB

Advanced Lattice Sieving on GPUs, with Tensor Cores.mp4

12.6 MB

Aggregatable Distributed Key Generation.eng.srt

36.8 KB

Aggregatable Distributed Key Generation.mp4

12.7 MB

Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.eng.srt

36.9 KB

Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.mp4

12.1 MB

An Evolution of Models for Zero-Knowledge Proofs.eng.srt

140.6 KB

An Evolution of Models for Zero-Knowledge Proofs.mp4

50.9 MB

Analysing the HPKE Standard.eng.srt

23.2 KB

Analysing the HPKE Standard.mp4

27.1 MB

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.eng.srt

32.6 KB

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.mp4

18.0 MB

Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili....eng.srt

48.7 KB

Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili....mp4

24.6 MB

Black-Box Non-Interactive Non-Malleable Commitments.eng.srt

52.0 KB

Black-Box Non-Interactive Non-Malleable Commitments.mp4

16.1 MB

Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.eng.srt

46.6 KB

Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.mp4

16.4 MB

Candidate Obfuscation via Oblivious LWE Sampling.eng.srt

48.3 KB

Candidate Obfuscation via Oblivious LWE Sampling.mp4

15.2 MB

Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.eng.srt

43.7 KB

Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.mp4

14.6 MB

Classical proofs of quantum knowledge.eng.srt

57.3 KB

Classical proofs of quantum knowledge.mp4

13.4 MB

Classical vs Quantum Random Oracles.eng.srt

38.4 KB

Classical vs Quantum Random Oracles.mp4

23.3 MB

Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.eng.srt

31.8 KB

Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.mp4

17.1 MB

Compactness of Hashing Modes and Efficiency beyond Merkle Tree.eng.srt

26.4 KB

Compactness of Hashing Modes and Efficiency beyond Merkle Tree.mp4

12.6 MB

Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.eng.srt

40.1 KB

Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.mp4

17.0 MB

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.eng.srt

24.5 KB

Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.mp4

19.9 MB

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o....eng.srt

44.6 KB

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o....mp4

21.7 MB

Decentralized Multi-Authority ABE for DNFs from LWE.eng.srt

45.2 KB

Decentralized Multi-Authority ABE for DNFs from LWE.mp4

17.8 MB

Delay Encryption.eng.srt

44.0 KB

Delay Encryption.mp4

34.7 MB

Dummy Shuffling against Algebraic Attacks in White-box Implementations.eng.srt

51.4 KB

Dummy Shuffling against Algebraic Attacks in White-box Implementations.mp4

15.0 MB

Dynamic Ad Hoc Clock Synchronization.eng.srt

65.4 KB

Dynamic Ad Hoc Clock Synchronization.mp4

25.6 MB

Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.eng.srt

40.2 KB

Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.mp4

25.6 MB

Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.eng.srt

38.2 KB

Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.mp4

11.0 MB

Eurocrypt 2021 rump session part deux.eng.srt

100.3 KB

Eurocrypt 2021 rump session part deux.mp4

57.7 MB

Fast verification of masking schemes in characteristic two.eng.srt

32.1 KB

Fast verification of masking schemes in characteristic two.mp4

14.9 MB

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.eng.srt

46.1 KB

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.mp4

12.4 MB

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.eng.srt

29.3 KB

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.mp4

15.0 MB

High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia....eng.srt

30.9 KB

High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia....mp4

22.2 MB

Improved cryptanalysis of UOV and Rainbow.eng.srt

50.4 KB

Improved cryptanalysis of UOV and Rainbow.mp4

14.7 MB

Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.eng.srt

32.7 KB

Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.mp4

18.2 MB

Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn....eng.srt

52.0 KB

Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn....mp4

17.4 MB

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.eng.srt

36.8 KB

Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.mp4

15.7 MB

Leakage Resilient Value Comparison With Application to Message Authentication.eng.srt

39.2 KB

Leakage Resilient Value Comparison With Application to Message Authentication.mp4

13.7 MB

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.eng.srt

33.9 KB

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.mp4

16.7 MB

LogStack Stacked Garbling with O(b log b) Computation.eng.srt

47.1 KB

LogStack Stacked Garbling with O(b log b) Computation.mp4

17.7 MB

Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.eng.srt

31.8 KB

Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.mp4

14.6 MB

Mind the Middle Layer The HADES Design Strategy Revisited.eng.srt

36.7 KB

Mind the Middle Layer The HADES Design Strategy Revisited.mp4

11.4 MB

Multi-Party Reusable Non-Interactive Secure Computation from LWE.eng.srt

38.7 KB

Multi-Party Reusable Non-Interactive Secure Computation from LWE.mp4

11.7 MB

Multi-Source Non-Malleable Extractors and Applications.eng.srt

34.2 KB

Multi-Source Non-Malleable Extractors and Applications.mp4

10.2 MB

New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong....eng.srt

31.8 KB

New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong....mp4

13.3 MB

Non-Interactive Anonymous Router.eng.srt

51.9 KB

Non-Interactive Anonymous Router.mp4

17.5 MB

Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.eng.srt

36.7 KB

Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.mp4

10.4 MB

Oblivious Transfer is in MiniQCrypt.eng.srt

40.8 KB

Oblivious Transfer is in MiniQCrypt.mp4

12.4 MB

On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.eng.srt

31.2 KB

On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.mp4

20.0 MB

On the ideal shortest vector problem over random rational primes.eng.srt

35.8 KB

On the ideal shortest vector problem over random rational primes.mp4

15.5 MB

On the Power of Expansion More Efficient Constructions in the Random Probing Model.eng.srt

50.2 KB

On the Power of Expansion More Efficient Constructions in the Random Probing Model.mp4

14.5 MB

On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle ....eng.srt

47.5 KB

On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle ....mp4

17.1 MB

On the Security of Homomorphic Encryption on Approximate Numbers.eng.srt

39.8 KB

On the Security of Homomorphic Encryption on Approximate Numbers.mp4

19.1 MB

One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.eng.srt

36.8 KB

One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.mp4

14.6 MB

Order-C Secure Multiparty Computation for Highly Repetitive Circuits.eng.srt

42.3 KB

Order-C Secure Multiparty Computation for Highly Repetitive Circuits.mp4

21.0 MB

Password Hashing and Preprocessing.eng.srt

43.4 KB

Password Hashing and Preprocessing.mp4

14.0 MB

Post-Quantum Multi-Party Computation.mp4

22.1 MB

Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.eng.srt

26.2 KB

Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.mp4

11.8 MB

Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.eng.srt

33.7 KB

Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.mp4

16.3 MB

Robust Property-Preserving Hash Functions for Hamming Distance and More.eng.srt

39.2 KB

Robust Property-Preserving Hash Functions for Hamming Distance and More.mp4

8.5 MB

Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ....eng.srt

29.0 KB

Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ....mp4

12.2 MB

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio....eng.srt

29.4 KB

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio....mp4

12.6 MB

Secure Software Leasing.eng.srt

49.4 KB

Secure Software Leasing.mp4

22.9 MB

Security Analysis of Quantum Lightning.eng.srt

15.7 KB

Security Analysis of Quantum Lightning.mp4

5.0 MB

session-1 Eurocrypt 2021 opening remarks best paper awards.eng.srt

142.8 KB

session-1 Eurocrypt 2021 opening remarks best paper awards.mp4

68.7 MB

session-4 Public Key Cryptography and Isogenies.eng.srt

104.2 KB

session-4 Public Key Cryptography and Isogenies.mp4

49.9 MB

session-6 Symmetric Cryptanalysis.eng.srt

90.8 KB

session-6 Symmetric Cryptanalysis.mp4

58.8 MB

session-7 FHE and IO.eng.srt

91.5 KB

session-7 FHE and IO.mp4

49.6 MB

session-8 Implementation Issues, Masking and Secret Sharing.eng.srt

86.2 KB

session-8 Implementation Issues, Masking and Secret Sharing.mp4

49.6 MB

session-12 Isogenies and Lattices.eng.srt

109.9 KB

session-12 Isogenies and Lattices.mp4

50.4 MB

session-14 Multiparty Computation.eng.srt

103.5 KB

session-14 Multiparty Computation.mp4

49.4 MB

session-193 Quantum Constructions and Proofs.eng.srt

87.5 KB

session-193 Quantum Constructions and Proofs.mp4

41.3 MB

session-194 Symmetric Designs and Leakage-Resilience.eng.srt

100.1 KB

session-194 Symmetric Designs and Leakage-Resilience.mp4

46.1 MB

session-196 Post-Quantum Cryptography.eng.srt

102.6 KB

session-196 Post-Quantum Cryptography.mp4

56.3 MB

session-201 Zero Knowledge, Property-Preserving Hashing and ORAM.eng.srt

97.0 KB

session-201 Zero Knowledge, Property-Preserving Hashing and ORAM.mp4

49.0 MB

session-202 Block Chain, Privacy and Law Enforcement.eng.srt

110.8 KB

session-202 Block Chain, Privacy and Law Enforcement.mp4

54.5 MB

session-204 Multiparty Computation and Garbled Circuits.eng.srt

105.0 KB

session-204 Multiparty Computation and Garbled Circuits.mp4

52.1 MB

session-206 Faults, Tampering and Non-Malleability.eng.srt

66.8 KB

session-206 Faults, Tampering and Non-Malleability.mp4

32.4 MB

session-219 Rump session.eng.srt

101.5 KB

session-219 Rump session.mp4

53.6 MB

Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.eng.srt

62.4 KB

Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.mp4

27.7 MB

Structured Encryption and Dynamic Leakage Suppression.eng.srt

43.0 KB

Structured Encryption and Dynamic Leakage Suppression.mp4

14.7 MB

TARDIS A Foundation of Time-Lock Puzzles in UC.eng.srt

49.0 KB

TARDIS A Foundation of Time-Lock Puzzles in UC.mp4

18.8 MB

The More The Merrier Reducing the Cost of Large Scale MPC.eng.srt

52.0 KB

The More The Merrier Reducing the Cost of Large Scale MPC.mp4

15.4 MB

The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre....eng.srt

37.1 KB

The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre....mp4

13.0 MB

The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si....eng.srt

35.7 KB

The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si....mp4

23.6 MB

The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.eng.srt

43.3 KB

The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.mp4

10.8 MB

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.eng.srt

42.5 KB

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.mp4

15.0 MB

Threshold Garbled Circuits and Ad Hoc Secure Computation.eng.srt

37.7 KB

Threshold Garbled Circuits and Ad Hoc Secure Computation.mp4

11.7 MB

Tightly-Secure Authenticated Key Exchange, Revisited.eng.srt

39.4 KB

Tightly-Secure Authenticated Key Exchange, Revisited.mp4

10.9 MB

Towards Accountability in CRS Generation.eng.srt

39.8 KB

Towards Accountability in CRS Generation.mp4

26.1 MB

Unbounded Multi-Party Computation from Learning with Errors.eng.srt

25.3 KB

Unbounded Multi-Party Computation from Learning with Errors.mp4

10.5 MB

VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.eng.srt

47.5 KB

VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.mp4

13.2 MB

/Eurocrypt/Eurocrypt 2022/

A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4

10.0 MB

A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.srt

32.3 KB

A Correlation Attack on Full SNOW-V and SNOW-Vi.mp4

9.3 MB

A Correlation Attack on Full SNOW-V and SNOW-Vi.srt

18.2 KB

A Fast and Simple Partially Oblivious PRF, with Applications.mp4

18.0 MB

A Fast and Simple Partially Oblivious PRF, with Applications.srt

47.9 KB

A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4

23.4 MB

A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.srt

31.7 KB

A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.mp4

18.2 MB

A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.srt

40.8 KB

A PCP Theorem for Interactive Proofs and Applications.mp4

12.5 MB

A PCP Theorem for Interactive Proofs and Applications.srt

36.0 KB

Adaptively Secure Computation for RAM Programs.mp4

18.8 MB

Adaptively Secure Computation for RAM Programs.srt

51.1 KB

Anamorphic Encryption Private Communication against a Dictator.mp4

28.2 MB

Anamorphic Encryption Private Communication against a Dictator.srt

65.5 KB

Anonymity of NIST PQC Round 3 KEMs.mp4

13.4 MB

Anonymity of NIST PQC Round 3 KEMs.srt

32.6 KB

Anonymous, Robust Post-Quantum Public Key Encryption.mp4

21.2 MB

Anonymous, Robust Post-Quantum Public Key Encryption.srt

55.3 KB

Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.mp4

14.2 MB

Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.srt

43.2 KB

Asymmetric PAKE with low computation and communication.mp4

20.6 MB

Asymmetric PAKE with low computation and communication.srt

43.0 KB

Asymptotically Quasi-Optimal Cryptography.mp4

16.7 MB

Asymptotically Quasi-Optimal Cryptography.srt

41.4 KB

Authentication in the Bounded Storage Model.mp4

16.3 MB

Authentication in the Bounded Storage Model.srt

44.0 KB

Batch-OT with Optimal Rate.mp4

12.2 MB

Batch-OT with Optimal Rate.srt

30.4 KB

Beyond quadratic speedups in quantum attacks on symmetric schemes.mp4

14.0 MB

Beyond quadratic speedups in quantum attacks on symmetric schemes.srt

39.5 KB

COA-Secure Obfuscation and Applications.mp4

26.3 MB

COA-Secure Obfuscation and Applications.srt

72.1 KB

CoCoA Concurrent Continuous Group Key Agreement.mp4

23.1 MB

CoCoA Concurrent Continuous Group Key Agreement.srt

50.0 KB

Constant-round Blind Classical Verification of Quantum Sampling.mp4

17.6 MB

Constant-round Blind Classical Verification of Quantum Sampling.srt

47.4 KB

Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.mp4

15.9 MB

Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.srt

25.0 KB

Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.mp4

11.2 MB

Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.srt

33.6 KB

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.mp4

12.3 MB

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.srt

39.6 KB

Efficient Schemes for Committing Authenticated Encryption.mp4

15.5 MB

Efficient Schemes for Committing Authenticated Encryption.srt

35.2 KB

Embedding the UC Model into the IITM Model.mp4

21.8 MB

Embedding the UC Model into the IITM Model.srt

55.1 KB

Families of SNARK-friendly 2-chains of elliptic curves.mp4

18.0 MB

Families of SNARK-friendly 2-chains of elliptic curves.srt

39.8 KB

Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).mp4

14.7 MB

Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).srt

41.2 KB

Garbled Circuits With Sublinear Evaluator.mp4

12.3 MB

Garbled Circuits With Sublinear Evaluator.srt

44.4 KB

Gemini elastic SNARKs for diverse environments.mp4

12.6 MB

Gemini elastic SNARKs for diverse environments.srt

44.6 KB

Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.mp4

17.9 MB

Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.srt

37.3 KB

Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.mp4

15.2 MB

Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.srt

51.9 KB

Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.mp4

15.2 MB

Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.srt

38.1 KB

High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.mp4

16.8 MB

High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.srt

40.3 KB

Highly Efficient OT-Based Multiplication Protocols.mp4

16.8 MB

Highly Efficient OT-Based Multiplication Protocols.srt

41.4 KB

IACR Distinguished Lecture by Ingrid Verbauwhede.mp4

48.6 MB

IACR Distinguished Lecture by Ingrid Verbauwhede.srt

116.1 KB

Incompressible Cryptography.mp4

11.2 MB

Incompressible Cryptography.srt

37.9 KB

Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4

15.6 MB

Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.srt

48.1 KB

Information-Combining Differential Fault Attacks on DEFAULT.mp4

15.5 MB

Information-Combining Differential Fault Attacks on DEFAULT.srt

43.7 KB

Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.mp4

44.0 MB

Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.srt

121.1 KB

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4

12.6 MB

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.srt

19.2 KB

Lightweight, Maliciously Secure Verifiable Function Secret Sharing.mp4

16.6 MB

Lightweight, Maliciously Secure Verifiable Function Secret Sharing.srt

42.1 KB

Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.mp4

10.4 MB

Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.srt

28.5 KB

Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4

17.0 MB

Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.srt

37.3 KB

Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4

20.2 MB

Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.srt

50.4 KB

Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4

24.5 MB

Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.srt

34.0 KB

Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4

12.1 MB

Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.srt

19.7 KB

Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.mp4

12.7 MB

Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.srt

39.3 KB

Live version of Optimal Tightness for Chain-Based Unique Signatures.mp4

20.1 MB

Live version of Optimal Tightness for Chain-Based Unique Signatures.srt

34.3 KB

Live version of Private Circuits with Quasilinear Randomness.mp4

19.7 MB

Live version of Private Circuits with Quasilinear Randomness.srt

41.2 KB

Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.mp4

8.7 MB

Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.srt

26.7 KB

Live version Unclonable Polymers and Their Cryptographic Applications.mp4

14.6 MB

Live version Unclonable Polymers and Their Cryptographic Applications.srt

41.8 KB

McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.mp4

12.4 MB

McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.srt

40.9 KB

Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.mp4

18.6 MB

Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.srt

46.8 KB

Multi-Designated Receiver Signed Public Key Encryption.mp4

13.1 MB

Multi-Designated Receiver Signed Public Key Encryption.srt

37.4 KB

Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4

9.0 MB

Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.srt

28.4 KB

Non-malleable Commitments Against Quantum Attacks.mp4

13.9 MB

Non-malleable Commitments Against Quantum Attacks.srt

42.1 KB

On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.mp4

20.8 MB

On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.srt

48.9 KB

On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.mp4

12.2 MB

On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.srt

36.8 KB

On Succinct Non-Interactive Arguments in Relativized Worlds.mp4

16.8 MB

On Succinct Non-Interactive Arguments in Relativized Worlds.srt

45.0 KB

On the Concrete Security of TLS 1.3 PSK Mode.mp4

19.5 MB

On the Concrete Security of TLS 1.3 PSK Mode.srt

48.0 KB

On the Multi-User Security of Short Schnorr Signatures with Preprocessing.mp4

22.3 MB

On the Multi-User Security of Short Schnorr Signatures with Preprocessing.srt

53.9 KB

On the security of ECDSA with additive key derivation and presignatures.mp4

17.9 MB

On the security of ECDSA with additive key derivation and presignatures.srt

53.0 KB

One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.mp4

18.6 MB

One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.srt

50.8 KB

Online-Extractability in the Quantum Random-Oracle Model.mp4

16.3 MB

Online-Extractability in the Quantum Random-Oracle Model.srt

40.9 KB

Opening remarks and Best Paper Award talk.mp4

24.2 MB

Opening remarks and Best Paper Award talk.srt

68.1 KB

Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.mp4

8.8 MB

Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.srt

36.6 KB

Optimal Tightness for Chain-Based Unique Signatures.mp4

19.7 MB

Optimal Tightness for Chain-Based Unique Signatures.srt

33.4 KB

Post-Quantum Security of the Even-Mansour Cipher.mp4

13.9 MB

Post-Quantum Security of the Even-Mansour Cipher.srt

46.8 KB

Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.mp4

15.6 MB

Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.srt

42.8 KB

Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.mp4

17.6 MB

Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.srt

36.6 KB

Private Circuits with Quasilinear Randomness.mp4

15.0 MB

Private Circuits with Quasilinear Randomness.srt

39.9 KB

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.mp4

12.9 MB

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.srt

38.7 KB

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.mp4

26.1 MB

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.srt

65.0 KB

Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4

1.2 MB

Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.srt

1.7 KB

Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.mp4

16.2 MB

Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.srt

34.3 KB

Round-Optimal and Communication-Efficient Multiparty Computation.mp4

11.9 MB

Round-Optimal and Communication-Efficient Multiparty Computation.srt

42.6 KB

Round-Optimal Black-Box Protocol Compilers.mp4

16.3 MB

Round-Optimal Black-Box Protocol Compilers.srt

54.9 KB

Round-Optimal Byzantine Agreement.mp4

12.1 MB

Round-Optimal Byzantine Agreement.srt

40.8 KB

Round-Optimal Multi-Party Computation with Identifiable Abort.mp4

13.7 MB

Round-Optimal Multi-Party Computation with Identifiable Abort.srt

39.1 KB

Rump Session at Eurocrypt 2022.mp4

190.1 MB

s-33 Homomorphic encryption 2.mp4

30.4 MB

s-33 Homomorphic encryption 2.srt

76.8 KB

s-44 Post-quantum cryptography 2.mp4

45.3 MB

s-44 Post-quantum cryptography 2.srt

141.5 KB

Secure Multiparty Computation with Free Branching.mp4

12.9 MB

Secure Multiparty Computation with Free Branching.srt

42.9 KB

Secure Multiparty Computation with Sublinear Preprocessing.mp4

14.0 MB

Secure Multiparty Computation with Sublinear Preprocessing.srt

43.9 KB

Secure Non-Interactive Reduction and Spectral Analysis of Correlations.mp4

16.6 MB

Secure Non-Interactive Reduction and Spectral Analysis of Correlations.srt

49.0 KB

Secure Non-interactive Simulation Feasibility - & Rate.mp4

19.4 MB

Secure Non-interactive Simulation Feasibility - & Rate.srt

44.0 KB

Short Pairing-Free Blind Signatures with Exponential Security.mp4

11.6 MB

Short Pairing-Free Blind Signatures with Exponential Security.srt

37.9 KB

Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.mp4

11.5 MB

Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.srt

43.1 KB

Single-Server Private Information Retrieval with Sublinear Amortized Time.mp4

20.0 MB

Single-Server Private Information Retrieval with Sublinear Amortized Time.srt

48.1 KB

SNARGs for P from Sub-exponential DDH and QR.mp4

12.8 MB

SNARGs for P from Sub-exponential DDH and QR.srt

43.3 KB

Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.mp4

12.2 MB

Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.srt

33.6 KB

Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.mp4

16.8 MB

Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.srt

40.0 KB

Unclonable Polymers and Their Cryptographic Applications.mp4

9.2 MB

Unclonable Polymers and Their Cryptographic Applications.srt

29.0 KB

Universally Composable Subversion-Resilient Cryptography.mp4

12.2 MB

Universally Composable Subversion-Resilient Cryptography.srt

40.8 KB

Watermarking PRFs against Quantum Adversaries.mp4

16.7 MB

Watermarking PRFs against Quantum Adversaries.srt

40.1 KB

Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.mp4

15.8 MB

Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.srt

46.9 KB

/Eurocrypt/Eurocrypt 2023/

(Zero-Knowledge) Proofs 1 (cont)..eng.srt

65.2 KB

(Zero-Knowledge) Proofs 1 (cont).mp4

24.6 MB

(Zero-knowledge) Proofs 1.eng.srt

115.5 KB

(Zero-knowledge) Proofs 1.mp4

38.9 MB

(Zero-Knowledge) Proofs 2.eng.srt

116.7 KB

(Zero-Knowledge) Proofs 2.mp4

48.5 MB

Attribute Based Encryption and Friends.eng.srt

111.7 KB

Attribute Based Encryption and Friends.mp4

40.5 MB

Attribute-based Encryption and Friends (cont.).eng.srt

60.0 KB

Attribute-based Encryption and Friends (cont.).mp4

26.3 MB

Authenticated Key Exchange.eng.srt

75.4 KB

Authenticated Key Exchange.mp4

37.2 MB

Block Cipher Cryptanalysis (cont.).eng.srt

80.5 KB

Block Cipher Cryptanalysis (cont.).mp4

29.7 MB

Blockcipher cryptanalysis.eng.srt

97.9 KB

Blockcipher cryptanalysis.mp4

50.0 MB

Differential Privacy.eng.srt

59.2 KB

Differential Privacy.mp4

23.0 MB

Efficient MPC Constructions (cont.).eng.srt

65.2 KB

Efficient MPC Constructions (cont.).mp4

23.6 MB

Efficient MPC Constructions.eng.srt

85.3 KB

Efficient MPC Constructions.mp4

29.9 MB

Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.eng.srt

127.5 KB

Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.mp4

39.3 MB

Eurocrypt 2023 Rump Session (part 2).mp4

83.4 MB

Eurocrypt 2023 Rump session part 1.mp4

89.5 MB

Eurocrypt2023 Invited Talk Guy Rothblum Indistinguishable Predictions and Multi-Group Fair Learni.eng.srt

136.5 KB

Eurocrypt2023 Invited Talk Guy Rothblum Indistinguishable Predictions and Multi-Group Fair Learni.mp4

36.1 MB

Fully Homomorphic Encryption (cont.).eng.srt

57.9 KB

Fully Homomorphic Encryption (cont.).mp4

30.2 MB

Fully Homomorphic Encryption.eng.srt

99.0 KB

Fully Homomorphic Encryption.mp4

36.9 MB

Garbling Schemes and Oblivious Transfer.eng.srt

88.7 KB

Garbling Schemes and Oblivious Transfer.mp4

46.7 MB

Hash Function Cryptanalysis.eng.srt

81.6 KB

Hash Function Cryptanalysis.mp4

60.8 MB

Isogenies 1.eng.srt

101.2 KB

Isogenies 1.mp4

37.8 MB

Isogenies 2.eng.srt

111.9 KB

Isogenies 2.mp4

41.1 MB

Lattice Constructions.eng.srt

95.1 KB

Lattice Constructions.mp4

39.1 MB

Lattice Cryptanalysis.eng.srt

70.0 KB

Lattice Cryptanalysis.mp4

27.8 MB

Lower Bounds.eng.srt

166.7 KB

Lower Bounds.mp4

73.1 MB

Messaging and Message Franking.eng.srt

110.1 KB

Messaging and Message Franking.mp4

45.5 MB

MPC and Proofs.eng.srt

101.8 KB

MPC and Proofs.mp4

44.2 MB

Non-Interactive Multi-party Computation.eng.srt

103.9 KB

Non-Interactive Multi-party Computation.mp4

36.7 MB

Non-malleable Commitments and Obfuscation.eng.srt

79.4 KB

Non-malleable Commitments and Obfuscation.mp4

26.9 MB

Oblivious Data Access 1.eng.srt

101.2 KB

Oblivious Data Access 1.mp4

42.1 MB

Oblivious Data Access 2.eng.srt

131.2 KB

Oblivious Data Access 2.mp4

34.6 MB

Oblivious Transfer (cont.).eng.srt

62.9 KB

Oblivious Transfer (cont.).mp4

24.7 MB

Oblivious Transfer.eng.srt

86.9 KB

Oblivious Transfer.mp4

31.0 MB

Pseudorandom Functions.eng.srt

66.7 KB

Pseudorandom Functions.mp4

34.3 MB

Public-Key Cryptanalysis.eng.srt

86.8 KB

Public-Key Cryptanalysis.mp4

33.7 MB

Quantum Cryptography.eng.srt

87.7 KB

Quantum Cryptography.mp4

36.0 MB

Real World Cryptography.eng.srt

75.1 KB

Real World Cryptography.mp4

29.8 MB

Side Channel Attacks and Masking.eng.srt

102.5 KB

Side Channel Attacks and Masking.mp4

47.7 MB

Signature Schemes 1 (cont.).eng.srt

70.8 KB

Signature Schemes 1 (cont.).mp4

26.2 MB

Signature Schemes 2.eng.srt

100.0 KB

Signature Schemes 2.mp4

33.8 MB

Signatures 1.eng.srt

106.7 KB

Signatures 1.mp4

44.8 MB

Symettric Designs 1.eng.srt

99.2 KB

Symettric Designs 1.mp4

43.4 MB

Symmetric Design 2 (cont.).eng.srt

66.5 KB

Symmetric Design 2 (cont.).mp4

28.9 MB

Symmetric Design 2.eng.srt

70.5 KB

Symmetric Design 2.mp4

31.2 MB

Symmetric Design 3.eng.srt

78.2 KB

Symmetric Design 3.mp4

34.7 MB

Theory of Public-Key Cryptography.eng.srt

100.6 KB

Theory of Public-Key Cryptography.mp4

49.9 MB

Traitor Tracing Schemes.eng.srt

66.0 KB

Traitor Tracing Schemes.mp4

26.1 MB

/FSE 2013/

A Framework for Automated Independent-Biclique Cryptanalysis.mp4

27.9 MB

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.mp4

29.7 MB

A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.mp4

28.9 MB

ALE - AES-Based Lightweight Authenticated Encryption.mp4

26.0 MB

Attacks and Security Proofs of EAX-Prime.mp4

32.7 MB

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.mp4

35.3 MB

Complementing Feistel Ciphers.mp4

28.3 MB

Cryptanalysis of Round-Reduced LED.mp4

30.6 MB

Cryptanalysis of WIDEA.mp4

28.0 MB

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.mp4

31.1 MB

FSE 2013 Rump Session.mp4

80.9 MB

Full Plain'text Recovery Attack on Broadcast RC4.mp4

30.3 MB

Higher-Order Side Channel Security and Mask Refreshing.mp4

31.2 MB

Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.mp4

35.6 MB

Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.mp4

33.1 MB

Invited Talk - Failures of secret key cryptography.mp4

101.0 MB

Masking Tables - An Underestimated Security Risk.mp4

25.7 MB

Near Collision Attack on the Grain v1 Stream Cipher.mp4

28.0 MB

On Symmetric Encryption with Distinguishable Decryption Failures.mp4

28.7 MB

On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.mp4

28.3 MB

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.mp4

25.7 MB

Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.mp4

30.7 MB

Program Chair' Opening Remarks.mp4

2.5 MB

Reflection Cryptanalysis of PRINCE-Like Ciphers.mp4

28.1 MB

Related-Key Attacks Against Full Hummingbird-2.mp4

32.1 MB

Rotational Cryptanalysis of Round-Reduced Keccak.mp4

32.6 MB

Secure Message Authentication Against Related-Key Attack.mp4

31.0 MB

Security Analysis of PRINCE.mp4

26.6 MB

Smashing WEP in a Passive Attack.mp4

32.6 MB

Time-Memory Trade-Offs for Near-Collisions.mp4

32.5 MB

Towards Secure Distance Bounding.mp4

86.4 MB

Towards Understanding the Known-Key Security of Block Ciphers.mp4

35.5 MB

Tweakable Blockciphers with Asymptotically Optimal Security.mp4

30.8 MB

/FSE 2019/

A General Proof Framework for Recent AES Distinguishers.eng.srt

28.7 KB

A General Proof Framework for Recent AES Distinguishers.mp4

10.7 MB

Adiantum length-preserving encryption for entry-level processors.eng.srt

38.8 KB

Adiantum length-preserving encryption for entry-level processors.mp4

13.5 MB

Boomerang Connectivity Table Revisited. Application to SKINNY and AES.eng.srt

22.7 KB

Boomerang Connectivity Table Revisited. Application to SKINNY and AES.mp4

26.2 MB

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.eng.srt

29.2 KB

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.mp4

15.1 MB

Clustering Related-Tweak Characteristics Application to MANTIS-6.eng.srt

42.0 KB

Clustering Related-Tweak Characteristics Application to MANTIS-6.mp4

34.4 MB

Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.eng.srt

25.2 KB

Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.mp4

11.8 MB

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.eng.srt

22.4 KB

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.mp4

15.0 MB

CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.eng.srt

28.4 KB

CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.mp4

19.9 MB

Cryptanalysis of AES-PRF and Its Dual.eng.srt

24.5 KB

Cryptanalysis of AES-PRF and Its Dual.mp4

13.6 MB

Cryptanalysis of Low-Data Instances of Full LowMCv2.eng.srt

29.1 KB

Cryptanalysis of Low-Data Instances of Full LowMCv2.mp4

13.9 MB

Cryptanalysis of Reduced round SKINNY Block Cipher.eng.srt

21.1 KB

Cryptanalysis of Reduced round SKINNY Block Cipher.mp4

22.2 MB

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.eng.srt

27.5 KB

Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.mp4

18.3 MB

Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.eng.srt

45.9 KB

Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.mp4

27.0 MB

FSE 2019 Rump Session.eng.srt

104.8 KB

FSE 2019 Rump Session.mp4

74.9 MB

General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.eng.srt

34.3 KB

General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.mp4

17.8 MB

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.eng.srt

29.6 KB

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.mp4

28.0 MB

Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.eng.srt

33.0 KB

Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.mp4

15.7 MB

Key Assignment Scheme with Authenticated Encryption.eng.srt

31.2 KB

Key Assignment Scheme with Authenticated Encryption.mp4

24.3 MB

Key Prediction Security of Keyed Sponges.eng.srt

26.7 KB

Key Prediction Security of Keyed Sponges.mp4

18.8 MB

libInterMAC Beyond Confidentiality and Integrity in Practice.eng.srt

33.6 KB

libInterMAC Beyond Confidentiality and Integrity in Practice.mp4

17.0 MB

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.eng.srt

30.7 KB

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.mp4

29.8 MB

MDS Matrices with Lightweight Circuits.eng.srt

34.5 KB

MDS Matrices with Lightweight Circuits.mp4

24.9 MB

Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.eng.srt

35.3 KB

Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.mp4

22.8 MB

More Accurate Differential Properties of LED64 and Midori64.eng.srt

29.8 KB

More Accurate Differential Properties of LED64 and Midori64.mp4

31.9 MB

New Yoyo Tricks with AES-based Permutations.eng.srt

26.8 KB

New Yoyo Tricks with AES-based Permutations.mp4

18.4 MB

Nonlinear Approximations in Cryptanalysis Revisited.mp4

33.0 MB

On Invariant Attacks.eng.srt

92.7 KB

On Invariant Attacks.mp4

36.7 MB

On the Boomerang Uniformity of Cryptographic Sboxes.eng.srt

42.7 KB

On the Boomerang Uniformity of Cryptographic Sboxes.mp4

17.7 MB

Partitions in the S-Box of Streebog and Kuznyechik.eng.srt

46.1 KB

Partitions in the S-Box of Streebog and Kuznyechik.mp4

21.2 MB

PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.mp4

21.4 MB

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.eng.srt

27.5 KB

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.mp4

15.7 MB

Separable Statistics and Multidimensional Linear Cryptanalysis.mp4

17.1 MB

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.eng.srt

31.2 KB

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.mp4

19.4 MB

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.eng.srt

40.8 KB

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.mp4

25.3 MB

SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.eng.srt

35.6 KB

SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.mp4

20.0 MB

The design of Xoodoo and Xoofff.eng.srt

30.3 KB

The design of Xoodoo and Xoofff.mp4

11.6 MB

Towards Low Energy Stream Ciphers.eng.srt

31.0 KB

Towards Low Energy Stream Ciphers.mp4

17.7 MB

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.eng.srt

28.8 KB

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.mp4

26.6 MB

/FSE 2022/

(Quantum) Collision Attacks on Reduced Simpira v2.mp4

8.3 MB

1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.eng.srt

49.9 KB

1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.mp4

18.0 MB

A - Formal Analysis of Boomerang Probabilities.eng.srt

21.1 KB

A - Formal Analysis of Boomerang Probabilities.mp4

5.7 MB

Accelerating the Search of Differential and Linear Characteristics with the SAT Method.mp4

18.7 MB

Algebraic Collision Attacks on Keccak.eng.srt

33.7 KB

Algebraic Collision Attacks on Keccak.mp4

17.6 MB

Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.eng.srt

53.4 KB

Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.mp4

27.5 MB

Atom A Stream Cipher with Double Key Filter.eng.srt

41.3 KB

Atom A Stream Cipher with Double Key Filter.mp4

16.3 MB

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.mp4

15.5 MB

Automatic Search of Cubes for Attacking Stream Ciphers.eng.srt

31.1 KB

Automatic Search of Cubes for Attacking Stream Ciphers.mp4

16.1 MB

Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.eng.srt

51.8 KB

Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.mp4

23.4 MB

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.eng.srt

36.8 KB

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.mp4

16.8 MB

Catching the Fastest Boomerangs Application to SKINNY.mp4

18.3 MB

Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.eng.srt

28.7 KB

Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.mp4

17.8 MB

Cryptanalysis (1).eng.srt

72.9 KB

Cryptanalysis (1).mp4

48.3 MB

Cryptanalysis of authenticated encryption schemes.eng.srt

92.5 KB

Cryptanalysis of authenticated encryption schemes.mp4

51.6 MB

Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.eng.srt

25.4 KB

Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.mp4

9.7 MB

Cryptanalysis.eng.srt

96.1 KB

Cryptanalysis.mp4

49.1 MB

CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.eng.srt

39.4 KB

CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.mp4

15.9 MB

Diving Deep into the Weak Keys of Round Reduced Ascon.eng.srt

50.1 KB

Diving Deep into the Weak Keys of Round Reduced Ascon.mp4

21.4 MB

Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.eng.srt

25.0 KB

Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.mp4

13.2 MB

Exploring Differential-Based Distinguishers and Forgeries for ASCON.eng.srt

29.1 KB

Exploring Differential-Based Distinguishers and Forgeries for ASCON.mp4

11.8 MB

Fake Near Collisions Attacks.eng.srt

39.7 KB

Fake Near Collisions Attacks.mp4

17.2 MB

Forking Tweakable Even-Mansour Ciphers.eng.srt

13.8 KB

Forking Tweakable Even-Mansour Ciphers.mp4

5.9 MB

FSE 2022 opening remarks - award papers.eng.srt

141.8 KB

FSE 2022 opening remarks - award papers.mp4

86.5 MB

FSE 2022 Rump Session.eng.srt

138.7 KB

FSE 2022 Rump Session.mp4

88.1 MB

Hash function cryptanalysis.eng.srt

90.6 KB

Hash function cryptanalysis.mp4

57.4 MB

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.eng.srt

29.2 KB

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.mp4

11.2 MB

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.eng.srt

26.1 KB

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.mp4

17.6 MB

Improved guess-and-determine and distinguishing attacks on SNOW-V.eng.srt

35.6 KB

Improved guess-and-determine and distinguishing attacks on SNOW-V.mp4

19.3 MB

Improved Preimage Attacks on 3-Round Keccak-224 256.mp4

14.0 MB

Improved Preimage Attacks on 4-Round Keccak-224 256.eng.srt

44.2 KB

Improved Preimage Attacks on 4-Round Keccak-224 256.mp4

24.1 MB

Improved Rectangle Attacks on SKINNY and CRAFT.eng.srt

40.3 KB

Improved Rectangle Attacks on SKINNY and CRAFT.mp4

14.0 MB

Improved Security Bound of (E D)WCDM.eng.srt

54.4 KB

Improved Security Bound of (E D)WCDM.mp4

23.6 MB

Increasing Precision of Division Property.mp4

21.4 MB

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.eng.srt

42.6 KB

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.mp4

18.0 MB

Invited talk by Christian Rechberger.eng.srt

121.4 KB

Invited talk by Christian Rechberger.mp4

55.8 MB

Invited talk by Orr Dunkelman.eng.srt

130.8 KB

Invited talk by Orr Dunkelman.mp4

55.7 MB

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.eng.srt

29.3 KB

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.mp4

20.0 MB

LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.eng.srt

31.5 KB

LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.mp4

16.8 MB

Maximums of the Additive Differential Probability of Exclusive-Or.eng.srt

42.4 KB

Maximums of the Additive Differential Probability of Exclusive-Or.mp4

11.5 MB

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.eng.srt

46.6 KB

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.mp4

21.2 MB

MOE Multiplication Operated Encryption with Trojan Resilience.eng.srt

42.5 KB

MOE Multiplication Operated Encryption with Trojan Resilience.mp4

23.6 MB

New designs and efficient implementations.eng.srt

79.7 KB

New designs and efficient implementations.mp4

51.7 MB

On Length Independent Security Bounds for the PMAC Family.eng.srt

35.5 KB

On Length Independent Security Bounds for the PMAC Family.mp4

12.0 MB

On the Relationships between Different Methods for Degree Evaluation.eng.srt

23.0 KB

On the Relationships between Different Methods for Degree Evaluation.mp4

10.9 MB

Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.eng.srt

26.9 KB

Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.mp4

12.6 MB

Permutation Based EDM An Inverse Free BBB Secure PRF.eng.srt

54.4 KB

Permutation Based EDM An Inverse Free BBB Secure PRF.mp4

19.9 MB

PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.mp4

11.2 MB

Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.eng.srt

42.4 KB

Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.mp4

16.9 MB

Provable security and attack models.eng.srt

118.2 KB

Provable security and attack models.mp4

59.3 MB

Provable Security of SP Networks with Partial Non-Linear Layers.eng.srt

33.2 KB

Provable Security of SP Networks with Partial Non-Linear Layers.mp4

14.8 MB

Provable security.eng.srt

103.7 KB

Provable security.mp4

57.7 MB

Provably Quantum-Secure Tweakable Block Ciphers.eng.srt

41.3 KB

Provably Quantum-Secure Tweakable Block Ciphers.mp4

17.6 MB

Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.eng.srt

40.9 KB

Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.mp4

16.6 MB

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.eng.srt

33.7 KB

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.mp4

18.4 MB

Quantum Period Finding is Compression Robust.eng.srt

20.2 KB

Quantum Period Finding is Compression Robust.mp4

6.9 MB

Resistance of SNOW-V against Fast Correlation Attacks.eng.srt

28.5 KB

Resistance of SNOW-V against Fast Correlation Attacks.mp4

15.9 MB

Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.eng.srt

26.8 KB

Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.mp4

13.9 MB

Security of COFB against Chosen Ciphertext Attacks.eng.srt

34.6 KB

Security of COFB against Chosen Ciphertext Attacks.mp4

12.1 MB

Statistical cryptanalysis of block ciphers.eng.srt

98.3 KB

Statistical cryptanalysis of block ciphers.mp4

51.2 MB

Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.eng.srt

35.4 KB

Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.mp4

14.6 MB

Stream ciphers.eng.srt

79.1 KB

Stream ciphers.mp4

50.1 MB

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.eng.srt

34.6 KB

The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.mp4

19.2 MB

Tightness of the Suffix Keyed Sponge Bound.eng.srt

42.8 KB

Tightness of the Suffix Keyed Sponge Bound.mp4

15.8 MB

Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.eng.srt

34.4 KB

Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.mp4

18.7 MB

Towards Low-Latency Implementation of Linear Layers.eng.srt

28.2 KB

Towards Low-Latency Implementation of Linear Layers.mp4

14.7 MB

Weak Keys in Reduced AEGIS and Tiaoxin.eng.srt

28.1 KB

Weak Keys in Reduced AEGIS and Tiaoxin.mp4

14.3 MB

Weak Tweak-Keys for the CRAFT Block Cipher.eng.srt

30.9 KB

Weak Tweak-Keys for the CRAFT Block Cipher.mp4

13.9 MB

/FSE 2023/

Algebraic and Integral Attacks 1.eng.srt

69.8 KB

Algebraic and Integral Attacks 1.mp4

31.4 MB

Algebraic and Integral Attacks 2.eng.srt

59.4 KB

Algebraic and Integral Attacks 2.mp4

27.6 MB

Authenticated Encryption Cryptanalysis.eng.srt

80.4 KB

Authenticated Encryption Cryptanalysis.mp4

42.6 MB

Award paper session Hybrid code lifting.eng.srt

31.5 KB

Award paper session Hybrid code lifting.mp4

20.1 MB

Award paper session Mind your path.eng.srt

48.1 KB

Award paper session Mind your path.mp4

20.0 MB

Block Cipher Cryptanalysis.eng.srt

91.5 KB

Block Cipher Cryptanalysis.mp4

35.7 MB

Boomerang and Rectangle Attacks 1.eng.srt

48.9 KB

Boomerang and Rectangle Attacks 1.mp4

24.9 MB

Boomerang and Rectangle Attacks 2.eng.srt

73.8 KB

Boomerang and Rectangle Attacks 2.mp4

34.1 MB

Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.eng.srt

72.7 KB

Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.mp4

40.9 MB

Cryptanalysis of Draco.eng.srt

22.9 KB

Cryptanalysis of Draco.mp4

10.0 MB

Cryptographic Applications.eng.srt

70.0 KB

Cryptographic Applications.mp4

26.2 MB

Differential Trail Search and Bounds 1.eng.srt

54.9 KB

Differential Trail Search and Bounds 1.mp4

31.2 MB

Differential Trail Search and Bounds 2.eng.srt

60.7 KB

Differential Trail Search and Bounds 2.mp4

21.9 MB

FSE 2023 Closing Remarks.mp4

1.9 MB

FSE 2023 Invited talk by Yosuke Todo.eng.srt

93.2 KB

FSE 2023 Invited talk by Yosuke Todo.mp4

47.7 MB

FSE 2023 Opening Remarks.eng.srt

21.3 KB

FSE 2023 Opening Remarks.mp4

10.7 MB

FSE 2023 Rump Session.eng.srt

86.1 KB

FSE 2023 Rump Session.mp4

38.4 MB

Hash Function Cryptanalysis.eng.srt

77.7 KB

Hash Function Cryptanalysis.mp4

38.3 MB

Leakage and Faults.eng.srt

65.6 KB

Leakage and Faults.mp4

26.9 MB

Linear Layers.eng.srt

101.2 KB

Linear Layers.mp4

41.1 MB

MILP and Models.eng.srt

92.8 KB

MILP and Models.mp4

50.2 MB

New Constructions 1.eng.srt

73.9 KB

New Constructions 1.mp4

28.1 MB

New Constructions 2.eng.srt

51.0 KB

New Constructions 2.mp4

25.7 MB

Non Linear Layers.eng.srt

60.9 KB

Non Linear Layers.mp4

23.4 MB

Security Proofs.eng.srt

117.8 KB

Security Proofs.mp4

34.9 MB

Stream Ciphers and Cryptanalysis 1.eng.srt

85.5 KB

Stream Ciphers and Cryptanalysis 1.mp4

40.0 MB

Stream Ciphers and Cryptanalysis 2.eng.srt

90.5 KB

Stream Ciphers and Cryptanalysis 2.mp4

36.9 MB

/IACR Distinguished Lectures/

Differential Privacy and the People's Data.eng.srt

86.2 KB

Differential Privacy and the People's Data.mp4

50.9 MB

From Idea to Impact, the Crypto Story What's Next.eng.srt

134.4 KB

From Idea to Impact, the Crypto Story What's Next.mp4

109.5 MB

IACR Distinguished Lecture Caught in Between Theory and Practice.eng.srt

108.8 KB

IACR Distinguished Lecture Caught in Between Theory and Practice.mp4

14.3 MB

IACR Distinguished Lectures.m3u

0.3 KB

Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.srt

104.5 KB

Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4

53.7 MB

Phil Rogaway - IACR Distinguished Lecture 2015.eng.srt

114.9 KB

Phil Rogaway - IACR Distinguished Lecture 2015.mp4

95.9 MB

The future of cryptography.eng.srt

134.8 KB

The future of cryptography.mp4

38.0 MB

Tutorial on Homomorphic Encryption (part 1).mp4

70.5 MB

Tutorial on Homomorphic Encryption (part 2).mp4

95.5 MB

/PKC 2010/

Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.mp4

21.6 MB

CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.mp4

17.7 MB

Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.mp4

24.5 MB

Confidential Signatures and Deterministic Signcryption.mp4

15.9 MB

Constant Size Ciphertexts in Threshold Attribute-Based Encryption.mp4

19.5 MB

Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.mp4

20.8 MB

Duality in Lattice Based Cryptography.mp4

63.4 MB

Efficient Arithmetic on Hessian Curves.mp4

19.8 MB

Efficient Set Operations in the Presence of Malicious Adversaries.mp4

22.4 MB

Faster Pairing Computations on Curves with High-Degree Twists.mp4

26.3 MB

Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.mp4

23.7 MB

Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.mp4

23.8 MB

Functional Encryption for Inner Product - Achieving Const.mp4

27.3 MB

Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.mp4

26.4 MB

Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.mp4

22.8 MB

More Constructions of Lossy and Correlation-Secure Trapdoor Functions.mp4

19.4 MB

On the Feasibility of Consistent Computations.mp4

22.7 MB

Preventing Pollution Attacks in Multi-source Network Coding.mp4

25.9 MB

Secure Network Coding over the Integers.mp4

30.0 MB

Security of Encryption Schemes in Weakened Random Oracle Models.mp4

21.9 MB

Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.mp4

20.9 MB

Solving a 676-Bit Discrete Logarithm Problem in GF(36n).mp4

18.2 MB

Text Search Protocols with Simulation Based Security.mp4

21.9 MB

Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.mp4

21.2 MB

/PKC 2020/

A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.mp4

12.0 MB

A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.mp4

15.4 MB

Adaptive Simulation Security for Inner Product Functional Encryption.mp4

14.1 MB

Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.mp4

12.6 MB

Bandwidth-Efficient Threshold EC-DSA.mp4

18.8 MB

Blazing Fast OT for Three-Round UC OT Extension.mp4

14.1 MB

Boosting Verifiable Computation on Encrypted Data.mp4

26.4 MB

Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.mp4

27.5 MB

Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.mp4

15.8 MB

Constraining and Watermarking PRFs from Milder Assumptions.mp4

11.0 MB

Efficient Redactable Signature and Application to Anonymous Credentials.mp4

8.3 MB

Fast, Compact, and Expressive Attribute-Based Encryption.mp4

11.3 MB

Faster Cofactorization with ECM Using Mixed Representations.mp4

17.7 MB

Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.mp4

19.4 MB

Generic Authenticated Key Exchange in the Quantum Random Oracle Model.mp4

16.4 MB

Going Beyond Dual Execution MPC for Functions with Efficient Verification.mp4

14.1 MB

Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.mp4

15.3 MB

Improved Classical Cryptanalysis of SIKE in Practice.mp4

15.2 MB

Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.mp4

12.6 MB

Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.mp4

6.4 MB

Linearly-Homomorphic Signatures and Scalable Mix-Nets.mp4

10.8 MB

Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.mp4

15.2 MB

Master-Key KDM-Secure IBE from Pairings.mp4

13.9 MB

Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.mp4

8.8 MB

Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.mp4

19.6 MB

MPSign A Signature from Small-Secret Middle-Product Learning with Errors.mp4

9.5 MB

On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.mp4

12.4 MB

On QA-NIZK in the BPK Model.mp4

20.4 MB

PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.mp4

12.6 MB

Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.mp4

20.0 MB

Public-Key Puncturable Encryption Modular and Compact Constructions.mp4

14.1 MB

s-148 Welcome Functional Encryption and Identity Based Encryption.mp4

76.7 MB

s-154 Encryption Schemes and Secure Channels.mp4

67.5 MB

s-158 Invited Talk.mp4

53.1 MB

s-161 Proofs and Arguments.mp4

64.4 MB

s-167 Multiparty Protocols, Secure Computation and Related Primitives.mp4

52.0 MB

s-169 PKC Test of Time Award Ceremony.mp4

47.3 MB

s-170 Post Quantum Cryptography.mp4

42.2 MB

s-185 Cryptographic Primitives.mp4

54.8 MB

s-187 Lattice Based Cryptography.mp4

39.9 MB

s-189 Cryptanalysis and Concrete Security Closing Remarks.mp4

58.6 MB

Sublinear-Round Byzantine Agreement Under Corrupt Majority.mp4

15.2 MB

The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.mp4

7.3 MB

The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.mp4

11.3 MB

Threshold Ring Signatures New Definitions and Post-quantum Security.mp4

22.2 MB

Threshold Schemes from Isogeny Assumptions.mp4

40.3 MB

Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.mp4

13.2 MB

Topology-Hiding Computation for Networks with Unknown Delays.mp4

14.9 MB

Toward RSA-OAEP Without Random Oracles.mp4

14.4 MB

Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.mp4

15.2 MB

Updateable Inner Product Argument with Logarithmic Verifier and Applications.mp4

29.9 MB

Verifiable Inner Product Encryption Scheme.mp4

16.0 MB

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.mp4

18.2 MB

Witness Maps and Applications.mp4

20.1 MB

/PKC 2021/

A Geometric Approach to Homomorphic Secret Sharing.eng.srt

32.5 KB

A Geometric Approach to Homomorphic Secret Sharing.mp4

11.9 MB

Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.eng.srt

24.7 KB

Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.mp4

13.1 MB

An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag....mp4

15.3 MB

Analysis of Multivariate Encryption Schemes Application to Dob.eng.srt

41.2 KB

Analysis of Multivariate Encryption Schemes Application to Dob.mp4

15.4 MB

Banquet Short and Fast Signatures from AES.eng.srt

39.6 KB

Banquet Short and Fast Signatures from AES.mp4

13.3 MB

BETA Biometric-Enabled Threshold Authentication.eng.srt

53.8 KB

BETA Biometric-Enabled Threshold Authentication.mp4

17.7 MB

Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.eng.srt

43.0 KB

Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.mp4

13.8 MB

Bootstrapping fully homomorphic encryption over the integers in less - than one second.eng.srt

38.2 KB

Bootstrapping fully homomorphic encryption over the integers in less - than one second.mp4

14.6 MB

Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.eng.srt

47.9 KB

Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.mp4

20.4 MB

Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.eng.srt

24.9 KB

Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.mp4

13.3 MB

Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.eng.srt

29.5 KB

Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.mp4

16.7 MB

Exact Lattice Sampling from Non-Gaussian Distributions.eng.srt

44.0 KB

Exact Lattice Sampling from Non-Gaussian Distributions.mp4

19.3 MB

Flexible and Efficient Verifiable Computation on Encrypted Data.eng.srt

41.5 KB

Flexible and Efficient Verifiable Computation on Encrypted Data.mp4

16.5 MB

Generic Negation of Pair Encodings.eng.srt

45.7 KB

Generic Negation of Pair Encodings.mp4

12.7 MB

Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.eng.srt

34.2 KB

Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.mp4

15.7 MB

Group Signatures with User-Controlled and Sequential Linkability.eng.srt

38.4 KB

Group Signatures with User-Controlled and Sequential Linkability.mp4

18.4 MB

Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.eng.srt

23.8 KB

Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.mp4

8.1 MB

Improving Revocation for Group Signature with Redactable Signature.eng.srt

44.0 KB

Improving Revocation for Group Signature with Redactable Signature.mp4

13.1 MB

Isogeny-based key compression without pairings.eng.srt

43.7 KB

Isogeny-based key compression without pairings.mp4

19.7 MB

Masked Triples Amortizing Multiplication Triples across Conditionals.eng.srt

41.7 KB

Masked Triples Amortizing Multiplication Triples across Conditionals.mp4

12.8 MB

Master-Key KDM-Secure ABE via Predicate Encoding.eng.srt

23.9 KB

Master-Key KDM-Secure ABE via Predicate Encoding.mp4

8.9 MB

More Efficient Digital Signatures with Tight Multi-User Security.eng.srt

12.1 KB

More Efficient Digital Signatures with Tight Multi-User Security.mp4

16.8 MB

Multi-Client Functional Encryption for Separable Functions.eng.srt

36.6 KB

Multi-Client Functional Encryption for Separable Functions.mp4

8.6 MB

Multi-Party Threshold Private Set Intersection with Sublinear Communication.eng.srt

41.5 KB

Multi-Party Threshold Private Set Intersection with Sublinear Communication.mp4

18.8 MB

Multiparty Cardinality Testing for Threshold Private Set Intersection.eng.srt

23.3 KB

Multiparty Cardinality Testing for Threshold Private Set Intersection.mp4

9.1 MB

Multivariate Public Key Cryptosystem from Sidon Spaces.eng.srt

36.0 KB

Multivariate Public Key Cryptosystem from Sidon Spaces.mp4

12.4 MB

Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar....eng.srt

33.2 KB

Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar....mp4

18.5 MB

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.eng.srt

54.2 KB

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.mp4

14.7 MB

On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.mp4

18.6 MB

On the CCA Compatibility of Public-Key Infrastructure.eng.srt

40.0 KB

On the CCA Compatibility of Public-Key Infrastructure.mp4

12.1 MB

On the Integer Polynomial Learning with Errors Problem.eng.srt

38.5 KB

On the Integer Polynomial Learning with Errors Problem.mp4

20.0 MB

On the Success Probability of Solving Unique SVP via BKZ.eng.srt

60.8 KB

On the Success Probability of Solving Unique SVP via BKZ.mp4

23.7 MB

Private Set Operations from Oblivious Switching.eng.srt

34.1 KB

Private Set Operations from Oblivious Switching.mp4

11.2 MB

Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.eng.srt

20.7 KB

Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.mp4

8.5 MB

QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora....eng.srt

16.8 KB

QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora....mp4

10.8 MB

Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S....eng.srt

35.9 KB

Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S....mp4

14.6 MB

Revisiting (R)CCA Security and Replay Protection.eng.srt

37.7 KB

Revisiting (R)CCA Security and Replay Protection.mp4

16.8 MB

Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.eng.srt

60.1 KB

Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.mp4

15.0 MB

s-1 Opening Remarks Post-Quantum Cryptography.eng.srt

109.6 KB

s-1 Opening Remarks Post-Quantum Cryptography.mp4

60.7 MB

s-4 Invited Talk I (Léo Ducas).eng.srt

109.2 KB

s-4 Invited Talk I (Léo Ducas).mp4

54.0 MB

s-6 Signatures.eng.srt

125.7 KB

s-6 Signatures.mp4

57.2 MB

s-7 Cryptographic Primitives I.eng.srt

106.2 KB

s-7 Cryptographic Primitives I.mp4

44.9 MB

s-10 Cryptographic Protocols and Secure Computation I.eng.srt

121.2 KB

s-10 Cryptographic Protocols and Secure Computation I.mp4

61.3 MB

s-12 Functional Encryption and Attributed-based Encryption.eng.srt

72.9 KB

s-12 Functional Encryption and Attributed-based Encryption.mp4

37.3 MB

s-14 Cryptographic Primitives II.eng.srt

122.1 KB

s-14 Cryptographic Primitives II.mp4

64.1 MB

s-16 Invited Talk II (Eike Kiltz).eng.srt

124.7 KB

s-16 Invited Talk II (Eike Kiltz).mp4

59.9 MB

s-18 Lattice-based Cryptography.eng.srt

106.2 KB

s-18 Lattice-based Cryptography.mp4

46.3 MB

s-20 Cryptographic Protocols and Secure Computation II.eng.srt

119.0 KB

s-20 Cryptographic Protocols and Secure Computation II.mp4

54.2 MB

s-22 Arguments and Proofs Closing Remarks.eng.srt

82.5 KB

s-22 Arguments and Proofs Closing Remarks.mp4

44.9 MB

s-84 PKC Test of Time Awards.eng.srt

28.3 KB

s-84 PKC Test of Time Awards.mp4

24.1 MB

Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.eng.srt

33.6 KB

Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.mp4

12.9 MB

Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.eng.srt

34.8 KB

Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.mp4

10.7 MB

Steel Composable Hardware-based Stateful and Randomised Functional Encryption.eng.srt

35.2 KB

Steel Composable Hardware-based Stateful and Randomised Functional Encryption.mp4

10.2 MB

Subversion-Resilient Public Key Encryption with Practical Watchdogs.eng.srt

23.6 KB

Subversion-Resilient Public Key Encryption with Practical Watchdogs.mp4

12.5 MB

The Convergence of Slide-type Reductions.eng.srt

38.4 KB

The Convergence of Slide-type Reductions.mp4

8.5 MB

Two-Party Adaptor Signatures From Identification Schemes.eng.srt

44.8 KB

Two-Party Adaptor Signatures From Identification Schemes.mp4

16.5 MB

Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.eng.srt

45.6 KB

Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.mp4

13.7 MB

Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.eng.srt

33.9 KB

Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.mp4

12.9 MB

Universal Proxy Re-Encryption.eng.srt

32.3 KB

Universal Proxy Re-Encryption.mp4

13.4 MB

Updatable Signatures and Message Authentication Codes.eng.srt

45.1 KB

Updatable Signatures and Message Authentication Codes.mp4

13.5 MB

Verifiable Random Functions with Optimal Tightness.eng.srt

37.4 KB

Verifiable Random Functions with Optimal Tightness.mp4

11.0 MB

/PKC 2022/

A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.eng.srt

65.8 KB

A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.mp4

17.7 MB

A Note on the Post-Quantum Security of (Ring) Signatures.eng.srt

52.7 KB

A Note on the Post-Quantum Security of (Ring) Signatures.mp4

14.2 MB

CNF-FSS and its Applications.eng.srt

37.9 KB

CNF-FSS and its Applications.mp4

12.7 MB

Count Me In Extendablity for Threshold Ring Signatures.eng.srt

40.1 KB

Count Me In Extendablity for Threshold Ring Signatures.mp4

18.3 MB

Cryptanalysis.eng.srt

95.2 KB

Cryptanalysis.mp4

41.0 MB

Cryptographic Protocols - Tools.eng.srt

115.2 KB

Cryptographic Protocols - Tools.mp4

55.7 MB

ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.eng.srt

40.8 KB

ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.mp4

15.1 MB

Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.eng.srt

34.2 KB

Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.mp4

14.0 MB

Efficient Lattice-Based Inner-Product Functional Encryption.eng.srt

46.2 KB

Efficient Lattice-Based Inner-Product Functional Encryption.mp4

19.0 MB

Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.eng.srt

59.1 KB

Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.mp4

22.1 MB

Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.eng.srt

55.5 KB

Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.mp4

19.6 MB

Encryption.eng.srt

99.6 KB

Encryption.mp4

49.0 MB

Financially Backed Covert Security.eng.srt

45.6 KB

Financially Backed Covert Security.mp4

14.8 MB

Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.eng.srt

23.3 KB

Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.mp4

7.3 MB

Invited Talk with Dustin Moody.eng.srt

111.8 KB

Invited Talk with Dustin Moody.mp4

58.3 MB

Invited Talk with Yuliang Zheng.eng.srt

59.8 KB

Invited Talk with Yuliang Zheng.mp4

42.7 MB

KDM Security for the Fujisaki-Okamoto Transformations in the QROM.eng.srt

36.5 KB

KDM Security for the Fujisaki-Okamoto Transformations in the QROM.mp4

17.8 MB

Lattice-based Signatures with Tight Adaptive Corruptions and More.eng.srt

40.6 KB

Lattice-based Signatures with Tight Adaptive Corruptions and More.mp4

15.2 MB

Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.eng.srt

33.8 KB

Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.mp4

11.3 MB

Lifting Standard Model Reductions to Common Setup Assumptions.eng.srt

29.5 KB

Lifting Standard Model Reductions to Common Setup Assumptions.mp4

15.9 MB

Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.eng.srt

37.2 KB

Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.mp4

10.8 MB

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.eng.srt

38.8 KB

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.mp4

14.4 MB

Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.eng.srt

51.4 KB

Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.mp4

13.5 MB

Making Private Function Evaluation Safer, Faster, and Simpler.eng.srt

40.6 KB

Making Private Function Evaluation Safer, Faster, and Simpler.mp4

20.4 MB

Multitarget decryption failure attacks and their application to Saber and Kyber.eng.srt

72.2 KB

Multitarget decryption failure attacks and their application to Saber and Kyber.mp4

19.8 MB

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.eng.srt

29.6 KB

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.mp4

8.6 MB

On the Bottleneck Complexity of MPC with Correlated Randomness.eng.srt

44.9 KB

On the Bottleneck Complexity of MPC with Correlated Randomness.mp4

16.4 MB

On the Isogeny Problem with Torsion Point Information.eng.srt

35.8 KB

On the Isogeny Problem with Torsion Point Information.mp4

11.0 MB

On the security of OSIDH.eng.srt

32.5 KB

On the security of OSIDH.mp4

11.4 MB

Opening Remarks - MPC & Secret Sharing (session-2).eng.srt

111.4 KB

Opening Remarks - MPC & Secret Sharing (session-2).mp4

59.8 MB

Polynomial IOPs for Linear Algebra Relations.eng.srt

37.7 KB

Polynomial IOPs for Linear Algebra Relations.mp4

10.5 MB

Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.eng.srt

29.7 KB

Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.mp4

17.6 MB

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.eng.srt

30.4 KB

Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.mp4

9.6 MB

Post-quantum Security of Plain OAEP Transform.eng.srt

38.9 KB

Post-quantum Security of Plain OAEP Transform.mp4

12.5 MB

Radical Isogenies on Montgomery Curves.eng.srt

28.9 KB

Radical Isogenies on Montgomery Curves.mp4

15.1 MB

Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.eng.srt

41.6 KB

Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.mp4

22.3 MB

Reusable Two-Round MPC from LPN.eng.srt

36.8 KB

Reusable Two-Round MPC from LPN.mp4

11.1 MB

Signatures - Closing Remarks (session-23).eng.srt

123.8 KB

Signatures - Closing Remarks (session-23).mp4

59.1 MB

SNARKs and NIZKs - Key Exchange (session-74).eng.srt

101.4 KB

SNARKs and NIZKs - Key Exchange (session-74).mp4

51.9 MB

Storing and Retrieving Secrets on a blockchain.eng.srt

31.8 KB

Storing and Retrieving Secrets on a blockchain.mp4

8.5 MB

Syndrome Decoding Estimator.eng.srt

46.3 KB

Syndrome Decoding Estimator.mp4

13.5 MB

Test of Time Award Ceremony.eng.srt

12.3 KB

Test of Time Award Ceremony.mp4

8.4 MB

The Direction of Updatable Encryption Does Matter.eng.srt

31.4 KB

The Direction of Updatable Encryption Does Matter.mp4

14.6 MB

Theory.eng.srt

44.0 KB

Theory.mp4

17.9 MB

Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.eng.srt

47.7 KB

Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.mp4

13.1 MB

Towards a Simpler Lattice Gadget Toolkit.eng.srt

26.7 KB

Towards a Simpler Lattice Gadget Toolkit.mp4

12.7 MB

Traceable PRFs Full Collusion Resistance and Active Security.eng.srt

41.9 KB

Traceable PRFs Full Collusion Resistance and Active Security.mp4

15.0 MB

Two-Round Oblivious Linear Evaluation from Learning with Errors.eng.srt

22.3 KB

Two-Round Oblivious Linear Evaluation from Learning with Errors.mp4

9.7 MB

/PKC 2023/

Invited Talk by Chris Peikert.eng.srt

115.8 KB

Invited Talk by Chris Peikert.mp4

40.4 MB

Opening Remarks.eng.srt

8.2 KB

Opening Remarks.mp4

5.0 MB

Session on Attacks.eng.srt

104.6 KB

Session on Attacks.mp4

36.4 MB

Session on Crypto for Crypto.eng.srt

180.1 KB

Session on Crypto for Crypto.mp4

56.5 MB

Session on Homomorphic Cryptography and Other Topics.eng.srt

115.2 KB

Session on Homomorphic Cryptography and Other Topics.mp4

42.5 MB

Session on Isogenies.eng.srt

112.3 KB

Session on Isogenies.mp4

39.0 MB

Session on Key Exchange and Messaging.eng.srt

125.0 KB

Session on Key Exchange and Messaging.mp4

44.3 MB

Session on Pairings.eng.srt

96.6 KB

Session on Pairings.mp4

34.9 MB

Session on Post Quantum Cryptography.eng.srt

166.8 KB

Session on Post Quantum Cryptography.mp4

63.3 MB

Session on Signatures.eng.srt

139.8 KB

Session on Signatures.mp4

50.0 MB

Test of time and best paper awards.eng.srt

11.6 KB

Test of time and best paper awards.mp4

7.7 MB

/.../Real World Crypto 2017/

Anja Lehmann.mp4

29.1 MB

Anja Lehmann.srt

66.8 KB

Aurelie Phesso.mp4

21.1 MB

Aurelie Phesso.srt

25.1 KB

Ben Kreuter.mp4

33.7 MB

Ben Kreuter.srt

72.5 KB

Christian Cachin.mp4

33.1 MB

Cristina Onete.mp4

20.6 MB

Cristina Onete.srt

38.0 KB

Daniel Franke.mp4

27.3 MB

Daniel Franke.srt

52.4 KB

David Cash.mp4

9.4 MB

David McGrew.mp4

21.8 MB

David McGrew.srt

55.4 KB

Elaine Shi.mp4

29.3 MB

Elaine Shi.srt

69.8 KB

Eva Sarafianou.mp4

13.1 MB

Eva Sarafianou.srt

23.8 KB

Evan Jeffrey.mp4

38.2 MB

Evan Jeffrey.srt

67.0 KB

Felix Gunther.mp4

23.3 MB

Felix Gunther.srt

38.2 KB

Filippo Valsorda and George Tankersley.mp4

27.3 MB

Filippo Valsorda and George Tankersley.srt

40.0 KB

Helena Handschuh.mp4

33.2 MB

Helena Handschuh.srt

68.7 KB

Hugo Krawczyk.mp4

35.2 MB

Hugo Krawczyk.srt

59.3 KB

Jean Camp.mp4

28.5 MB

Jean Camp.srt

41.4 KB

Jeremiah Blocki.mp4

39.4 MB

Jeremiah Blocki.srt

67.3 KB

Jon Millican.mp4

31.7 MB

Jon Millican.srt

57.8 KB

Joppe Bos.mp4

37.8 MB

Joppe Bos.srt

61.6 KB

Laurent Simon.mp4

19.0 MB

Laurent Simon.srt

37.9 KB

Leonid Reyzin.mp4

20.2 MB

Leonid Reyzin.srt

49.8 KB

Luke Garratt.mp4

18.9 MB

Luke Garratt.srt

36.8 KB

Michael Naehrig.mp4

21.7 MB

Michael Naehrig.srt

47.7 KB

Mike Hamburg.mp4

28.7 MB

Mike Hamburg.srt

53.9 KB

Mitch Stoltz.mp4

26.4 MB

Mitch Stoltz.srt

56.8 KB

Moti Yung.mp4

27.6 MB

Moti Yung.srt

45.3 KB

Olivier Levillain.mp4

16.0 MB

Olivier Levillain.srt

28.4 KB

Patrick Longa.mp4

30.5 MB

Patrick Longa.srt

62.8 KB

Paul Grubbs.mp4

31.7 MB

Paul Grubbs.srt

55.4 KB

Pedro Moreno Sanchez.mp4

22.9 MB

Quan Nguyen.mp4

12.5 MB

Quan Nguyen.srt

21.9 KB

Raluca Ada Popa.mp4

35.6 MB

Raluca Ada Popa.srt

67.7 KB

Rene Peralta.mp4

23.9 MB

Rene Peralta.srt

29.3 KB

Rich Saltz.mp4

29.7 MB

Rich Saltz.srt

54.6 KB

Sharon Goldberg.mp4

34.2 MB

Sharon Goldberg.srt

76.2 KB

Stefano Tessaro.mp4

28.8 MB

Stefano Tessaro.srt

71.8 KB

Tancrede Lepoint.mp4

45.8 MB

Tancrede Lepoint.srt

67.1 KB

Thai Duong.mp4

34.2 MB

Thai Duong.srt

41.7 KB

Trevor Perrin.mp4

29.5 MB

Trevor Perrin.srt

72.2 KB

Valeria Nikolaenko.mp4

29.9 MB

Valeria Nikolaenko.srt

68.3 KB

Yehuda Lindell.mp4

21.8 MB

Yehuda Lindell.srt

40.1 KB

/.../Real World Crypto 2018/

A faulty PRNG in a voting system - Kristian Gjosteen.mp4

23.4 MB

Achieving high availability in the internal Google key management system KMS - Anand Kanagala.mp4

29.0 MB

An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).mp4

15.5 MB

An attack on the FF3 format preserving encryption - F. Betul Durak.mp4

28.9 MB

AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).mp4

13.2 MB

Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.mp4

27.2 MB

Building and deploying encrypted search systems - Seny Kamara.mp4

39.5 MB

Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).mp4

26.0 MB

Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.mp4

23.1 MB

Finding collisions for SHA 1 - Pierre Karpman.mp4

30.6 MB

Geo manager - Nick Sullivan (Cloudflare).mp4

33.8 MB

HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).mp4

30.4 MB

How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.mp4

25.2 MB

InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.mp4

22.2 MB

Is Certificate Transparency usable - Emily Stark (Google).mp4

38.8 MB

Levchin Prize - Award ceremony.mp4

26.9 MB

Lightning talks - Short talks by the participants.mp4

47.0 MB

Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).mp4

33.1 MB

Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.mp4

7.3 MB

On the end to end security of group chats - Paul Rösler (U. Bochum).mp4

20.9 MB

Post quantum signatures - Melissa Chase (Microsoft Research).mp4

31.4 MB

Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).mp4

32.6 MB

Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.mp4

7.2 MB

Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).mp4

22.5 MB

Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).mp4

26.1 MB

Secrets at Scale - Manish Mehta (Netflix).mp4

25.4 MB

Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.mp4

33.4 MB

Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).mp4

29.5 MB

Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).mp4

18.0 MB

The Noise protocol framework - - Trevor Perrin.mp4

30.8 MB

The problem of private identification protocols - Ruxandra F. Olimid (NTNU).mp4

14.4 MB

TLS ecosystem woes - David Benjamin (Google).mp4

41.0 MB

UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.mp4

26.0 MB

Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.mp4

28.0 MB

Verificatum - Douglas Wikstrom (KTH).mp4

36.0 MB

Welcome - RWC steering committee.mp4

16.4 MB

ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).mp4

26.2 MB

Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.mp4

21.4 MB

/.../Real World Crypto 2019/

Day 1 - Session 1 - Morning - part 1.eng.srt

182.0 KB

Day 1 - Session 1 - Morning - part 1.mp4

157.6 MB

Day 1 - Session 1 - Morning - part 2.eng.srt

145.0 KB

Day 1 - Session 1 - Morning - part 2.mp4

157.8 MB

Day 1 - Session 2 - Afternoon.eng.srt

316.0 KB

Day 1 - Session 2 - Afternoon.mp4

174.3 MB

Day 2 - Session 1 - Morning.eng.srt

355.7 KB

Day 2 - Session 1 - Morning.mp4

390.3 MB

Day 2 - Session 2 - Afternoon - Part 1.eng.srt

106.2 KB

Day 2 - Session 2 - Afternoon - Part 1.mp4

117.2 MB

Day 2 - Session 2 - Afternoon - Part 2.eng.srt

49.9 KB

Day 2 - Session 2 - Afternoon - Part 2.mp4

49.9 MB

Day 2 - Session 2 - Afternoon - Part 3.eng.srt

174.1 KB

Day 2 - Session 2 - Afternoon - Part 3.mp4

161.9 MB

Day 3 - Session 1 - Morning - Part 1.eng.srt

184.0 KB

Day 3 - Session 1 - Morning - Part 1.mp4

159.3 MB

Day 3 - Session 1 - Morning Part 2.eng.srt

158.8 KB

Day 3 - Session 1 - Morning Part 2.mp4

146.2 MB

Day 3 - Session 2 - Afternoon.eng.srt

240.4 KB

Day 3 - Session 2 - Afternoon.mp4

303.6 MB

/.../Real World Crypto 2020/

Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.mp4

83.3 MB

Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.mp4

95.3 MB

Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.mp4

87.0 MB

Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.mp4

103.4 MB

MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.mp4

77.8 MB

Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.mp4

40.8 MB

Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.mp4

28.3 MB

Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.mp4

130.0 MB

Real World Crypto 2020 Program.html

53.9 KB

Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.mp4

94.2 MB

Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.mp4

119.5 MB

The Evolving Crypto War - Jennifer Granick.mp4

94.8 MB

TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS .mp4

80.9 MB

Welcome.mp4

8.9 MB

Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.mp4

83.6 MB

/.../Real World Crypto 2020 Program_files/

bootstrap.css

131.2 KB

bootstrap.js

37.0 KB

css.css

4.9 KB

handlebars.js

75.5 KB

iacr-logo.png

16.8 KB

jasny-bootstrap.css

16.9 KB

jasny-bootstrap.js

30.9 KB

jquery-3.js

86.7 KB

main.css

5.1 KB

menus.js

0.9 KB

navmenu.css

0.7 KB

navTitleFade.js

0.2 KB

presentation.svg

0.4 KB

program.js

1.7 KB

theme.css

1.1 KB

tooltips.js

0.1 KB

/.../Real World Crypto 2021/

Anonymity - Closing Remarks.eng.srt

99.7 KB

Anonymity - Closing Remarks.mp4

38.8 MB

Contact Tracing.eng.srt

81.8 KB

Contact Tracing.mp4

40.7 MB

Crypto for the Cloud.eng.srt

81.5 KB

Crypto for the Cloud.mp4

38.7 MB

Cryptocurrency.eng.srt

102.2 KB

Cryptocurrency.mp4

44.0 MB

Formal Analysis.eng.srt

72.9 KB

Formal Analysis.mp4

32.0 MB

From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.eng.srt

82.0 KB

From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.mp4

31.7 MB

Group Messaging.eng.srt

92.9 KB

Group Messaging.mp4

40.1 MB

Hardware.eng.srt

117.4 KB

Hardware.mp4

62.7 MB

Humans, Policy, and Crypto.eng.srt

68.2 KB

Humans, Policy, and Crypto.mp4

28.1 MB

ignatures.eng.srt

92.2 KB

ignatures.mp4

36.5 MB

Invited talk by Anna Lysyanskaya.eng.srt

65.8 KB

Invited talk by Anna Lysyanskaya.mp4

26.1 MB

Invited talk by Carmela Troncoso.eng.srt

70.7 KB

Invited talk by Carmela Troncoso.mp4

38.5 MB

Invited talk by Dustin Moody - Post-quantum Cryptography.eng.srt

152.6 KB

Invited talk by Dustin Moody - Post-quantum Cryptography.mp4

81.6 MB

Invited talk by Eli Ben-Sasson.eng.srt

70.1 KB

Invited talk by Eli Ben-Sasson.mp4

37.9 MB

Invited talk by Luca De Feo.eng.srt

64.7 KB

Invited talk by Luca De Feo.mp4

40.3 MB

Invited talk by Vanessa Teague.eng.srt

52.0 KB

Invited talk by Vanessa Teague.mp4

24.1 MB

Levchin Award Ceremony.eng.srt

49.3 KB

Levchin Award Ceremony.mp4

27.9 MB

Multiparty Computation.eng.srt

83.7 KB

Multiparty Computation.mp4

35.9 MB

Opening Remarks for RWC 2021 - Secure Channels.eng.srt

139.2 KB

Opening Remarks for RWC 2021 - Secure Channels.mp4

66.1 MB

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.eng.srt

27.9 KB

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.mp4

26.9 MB

RWC 2021 Lightning talks.eng.srt

38.0 KB

RWC 2021 Lightning talks.mp4

29.8 MB

/.../Real World Crypto 2022/

Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.eng.srt

61.1 KB

Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.mp4

53.0 MB

Attacks Cryptography in the Ads Ecosystem II discussion (see description).eng.srt

250.3 KB

Attacks Cryptography in the Ads Ecosystem II discussion (see description).mp4

131.2 MB

Cryptographic Attacks on Privacy.eng.srt

151.3 KB

Cryptographic Attacks on Privacy.mp4

77.9 MB

Levchin Award Ceremony.eng.srt

33.2 KB

Levchin Award Ceremony.mp4

24.6 MB

Privacy.eng.srt

140.6 KB

Privacy.mp4

51.0 MB

Secure Messaging.eng.srt

162.5 KB

Secure Messaging.mp4

76.1 MB

session-5 Symmetric Cryptography.eng.srt

86.0 KB

session-5 Symmetric Cryptography.mp4

49.1 MB

TLS.eng.srt

114.9 KB

TLS.mp4

48.8 MB

Useful Primitives Cryptography in the Ads Ecosystem I Lightning Rounds.eng.srt

209.2 KB

Useful Primitives Cryptography in the Ads Ecosystem I Lightning Rounds.mp4

109.1 MB

Welcome to RWC 2022 Side-Channel Attacks.eng.srt

147.2 KB

Welcome to RWC 2022 Side-Channel Attacks.mp4

77.8 MB

Zero Knowledge and Forward Secrecy RWC 2022 Closing Remarks.eng.srt

139.5 KB

Zero Knowledge and Forward Secrecy RWC 2022 Closing Remarks.mp4

74.5 MB

/.../Real World Crypto 2023/

2023 Levchin Prize.eng.srt

37.4 KB

2023 Levchin Prize.mp4

21.9 MB

Advanced Encryption.eng.srt

110.9 KB

Advanced Encryption.mp4

46.2 MB

Building and Breaking Secure Systems.eng.srt

147.3 KB

Building and Breaking Secure Systems.mp4

46.7 MB

Crypto for people.eng.srt

132.4 KB

Crypto for people.mp4

49.5 MB

FHE and MPC.eng.srt

139.8 KB

FHE and MPC.mp4

51.3 MB

Lightning talks.eng.srt

45.0 KB

Lightning talks.mp4

25.7 MB

Messaging and Encryption.eng.srt

215.6 KB

Messaging and Encryption.mp4

75.0 MB

Network Security and Key Exchange.eng.srt

149.9 KB

Network Security and Key Exchange.mp4

53.4 MB

Opening remarks.eng.srt

16.5 KB

Opening remarks.mp4

8.7 MB

PQC Protocols and Agility.eng.srt

137.3 KB

PQC Protocols and Agility.mp4

51.1 MB

PQC.eng.srt

120.1 KB

PQC.mp4

48.4 MB

Privacy and ZKP.eng.srt

180.7 KB

Privacy and ZKP.mp4

70.3 MB

RWC 2023 Closing Remarks.eng.srt

11.2 KB

RWC 2023 Closing Remarks.mp4

6.6 MB

Secure Implementations.eng.srt

124.9 KB

Secure Implementations.mp4

48.5 MB

Side Channels and Backdoors.eng.srt

124.8 KB

Side Channels and Backdoors.mp4

47.9 MB

Threshold Cryptography.eng.srt

170.0 KB

Threshold Cryptography.mp4

58.6 MB

Updates on Standardization.eng.srt

42.8 KB

Updates on Standardization.mp4

20.5 MB

/TCC 2021/

Acyclicity Programming for Sigma-Protocols.eng.srt

42.2 KB

Acyclicity Programming for Sigma-Protocols.mp4

11.9 MB

Adaptive Security of Multi-Party Protocols, Revisited.eng.srt

32.1 KB

Adaptive Security of Multi-Party Protocols, Revisited.mp4

11.4 MB

Amortizing Rate-1 OT and Applications to PIR and PSI.eng.srt

39.0 KB

Amortizing Rate-1 OT and Applications to PIR and PSI.mp4

14.6 MB

BKW Meets Fourier New Algorithms for LPN with Sparse Parities.eng.srt

36.5 KB

BKW Meets Fourier New Algorithms for LPN with Sparse Parities.mp4

16.3 MB

Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.eng.srt

48.3 KB

Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.mp4

17.7 MB

Blockchains Enable Non-Interactive MPC.eng.srt

40.3 KB

Blockchains Enable Non-Interactive MPC.mp4

13.6 MB

Classical Binding for Quantum Commitments.eng.srt

32.2 KB

Classical Binding for Quantum Commitments.mp4

12.1 MB

Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.eng.srt

49.5 KB

Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.mp4

19.7 MB

Concurrent Composition of Differential Privacy.eng.srt

43.9 KB

Concurrent Composition of Differential Privacy.mp4

19.9 MB

Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.eng.srt

32.6 KB

Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.mp4

11.5 MB

Covert Learning How to Learn with an Untrusted Intermediary.eng.srt

76.8 KB

Covert Learning How to Learn with an Untrusted Intermediary.mp4

23.9 MB

Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.eng.srt

35.1 KB

Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.mp4

13.2 MB

Direct Product Hardness Amplification.eng.srt

33.4 KB

Direct Product Hardness Amplification.mp4

12.4 MB

Disappearing Cryptography in the Bounded Storage Model.eng.srt

66.3 KB

Disappearing Cryptography in the Bounded Storage Model.mp4

20.9 MB

Distributed Merkle's Puzzles.eng.srt

28.6 KB

Distributed Merkle's Puzzles.mp4

13.3 MB

Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.eng.srt

81.6 KB

Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.mp4

25.4 MB

Efficient Perfectly Secure Computation with Optimal Resilience.eng.srt

49.0 KB

Efficient Perfectly Secure Computation with Optimal Resilience.mp4

23.7 MB

Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.eng.srt

35.5 KB

Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.mp4

18.9 MB

Forward Secret Encrypted RAM Lower Bounds and Applications.eng.srt

66.8 KB

Forward Secret Encrypted RAM Lower Bounds and Applications.mp4

23.1 MB

Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.eng.srt

74.5 KB

Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.mp4

27.3 MB

Generalized Proofs of Knowledge with Fully Dynamic Setup.eng.srt

55.3 KB

Generalized Proofs of Knowledge with Fully Dynamic Setup.mp4

29.9 MB

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.eng.srt

55.0 KB

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.mp4

22.1 MB

Grafting Key Trees Efficient Key Management for Overlapping Groups.eng.srt

65.0 KB

Grafting Key Trees Efficient Key Management for Overlapping Groups.mp4

21.5 MB

Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.eng.srt

92.0 KB

Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.mp4

30.6 MB

Laconic Private Set Intersection and Applications.eng.srt

29.2 KB

Laconic Private Set Intersection and Applications.mp4

12.3 MB

Multi-Party Functional Encryption.eng.srt

105.1 KB

Multi-Party Functional Encryption.mp4

35.5 MB

Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.eng.srt

29.4 KB

Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.mp4

13.5 MB

Non-Malleable Time-Lock Puzzles and Applications.eng.srt

62.6 KB

Non-Malleable Time-Lock Puzzles and Applications.mp4

24.5 MB

Non-Malleable Vector Commitments via Local Equivocability.eng.srt

45.5 KB

Non-Malleable Vector Commitments via Local Equivocability.mp4

15.7 MB

Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.eng.srt

53.6 KB

Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.mp4

16.4 MB

On Actively-Secure Elementary MPC Reductions.eng.srt

43.2 KB

On Actively-Secure Elementary MPC Reductions.mp4

18.6 MB

On Communication Models and Best-Achievable Security in Two-Round MPC.eng.srt

38.5 KB

On Communication Models and Best-Achievable Security in Two-Round MPC.mp4

17.2 MB

On Communication-Efficient Asynchronous MPC with Adaptive Security.eng.srt

29.3 KB

On Communication-Efficient Asynchronous MPC with Adaptive Security.mp4

13.1 MB

On Derandomizing Yao’s Weak-to-Strong OWF Construction.eng.srt

73.4 KB

On Derandomizing Yao’s Weak-to-Strong OWF Construction.mp4

35.7 MB

On expected polynomial runtime in cryptography.eng.srt

47.9 KB

On expected polynomial runtime in cryptography.mp4

15.9 MB

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.eng.srt

51.9 KB

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.mp4

17.3 MB

On the Impossibility of Purely Algebraic Signatures.eng.srt

52.1 KB

On the Impossibility of Purely Algebraic Signatures.mp4

16.9 MB

On Treewidth, Separators and Yao’s Garbling.eng.srt

54.1 KB

On Treewidth, Separators and Yao’s Garbling.mp4

19.9 MB

Policy-Compliant Signatures.eng.srt

69.5 KB

Policy-Compliant Signatures.mp4

13.5 MB

Polynomial-time targeted attacks on coin-tossing for any number of corruptions.eng.srt

41.1 KB

Polynomial-time targeted attacks on coin-tossing for any number of corruptions.mp4

18.8 MB

Quantum Key-length Extension.eng.srt

52.2 KB

Quantum Key-length Extension.mp4

20.5 MB

Random-Index PIR and Applications.eng.srt

71.0 KB

Random-Index PIR and Applications.mp4

26.8 MB

Rate-1 Quantum Fully Homomorphic Encryption.eng.srt

44.9 KB

Rate-1 Quantum Fully Homomorphic Encryption.mp4

14.6 MB

Relationships between quantum IND-CPA notions.eng.srt

28.3 KB

Relationships between quantum IND-CPA notions.mp4

10.8 MB

Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.eng.srt

41.2 KB

Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.mp4

21.9 MB

Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.eng.srt

57.6 KB

Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.mp4

16.7 MB

Secure Quantum Computation with Classical Communication.eng.srt

84.8 KB

Secure Quantum Computation with Classical Communication.mp4

26.4 MB

Secure Software Leasing from Standard Assumptions.eng.srt

35.6 KB

Secure Software Leasing from Standard Assumptions.mp4

14.9 MB

Secure Software Leasing Without Assumptions.eng.srt

48.0 KB

Secure Software Leasing Without Assumptions.mp4

17.1 MB

session-1 Welcome - Foundations I.eng.srt

72.0 KB

session-1 Welcome - Foundations I.mp4

50.9 MB

session-4 ABE, FE, Obfuscation and Non Traditional Models.eng.srt

132.6 KB

session-4 ABE, FE, Obfuscation and Non Traditional Models.mp4

54.9 MB

session-7 Invited talk by Abhishek Jain.eng.srt

135.4 KB

session-7 Invited talk by Abhishek Jain.mp4

50.1 MB

session-9 Zero Knowledge and Proof Systems.eng.srt

80.1 KB

session-9 Zero Knowledge and Proof Systems.mp4

36.3 MB

session-12 Multi-party Computation II.eng.srt

97.2 KB

session-12 Multi-party Computation II.mp4

40.7 MB

session-14 PIR, Encrypted RAM, Commitments.eng.srt

105.3 KB

session-14 PIR, Encrypted RAM, Commitments.mp4

46.9 MB

session-20 Zero Knowledge, OT, Key Management.eng.srt

102.1 KB

session-20 Zero Knowledge, OT, Key Management.mp4

44.9 MB

session-22 Routing, Signatures, Commitments, Timelock.eng.srt

88.0 KB

session-22 Routing, Signatures, Commitments, Timelock.mp4

37.0 MB

session-98 Quantum I.eng.srt

54.8 KB

session-98 Quantum I.mp4

28.3 MB

session-109 Multi-party Computation I.eng.srt

124.3 KB

session-109 Multi-party Computation I.mp4

54.0 MB

session-111 Quantum II.eng.srt

96.8 KB

session-111 Quantum II.mp4

44.8 MB

session-113 Foundations II.eng.srt

108.8 KB

session-113 Foundations II.mp4

54.9 MB

Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.eng.srt

54.1 KB

Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.mp4

18.4 MB

Simple Constructions from (Almost) Regular One-Way Functions.mp4

11.3 MB

Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.eng.srt

42.6 KB

Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.mp4

13.6 MB

Statistical ZAPs from Group-Based Assumptions.mp4

18.8 MB

Succinct LWE Sampling, Random Polynomials, and Obfuscation.eng.srt

31.3 KB

Succinct LWE Sampling, Random Polynomials, and Obfuscation.mp4

10.9 MB

The Cost of Adaptivity in Security Games on Graphs.mp4

17.8 MB

The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.eng.srt

22.2 KB

The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.mp4

10.0 MB

The Round Complexity of Quantum Zero-Knowledge.eng.srt

58.5 KB

The Round Complexity of Quantum Zero-Knowledge.mp4

16.0 MB

Tight Security Bounds for Micali’s SNARGs.eng.srt

71.7 KB

Tight Security Bounds for Micali’s SNARGs.mp4

28.4 MB

Towards Tight Adaptive Security of Non-Interactive Key Exchange.eng.srt

39.4 KB

Towards Tight Adaptive Security of Non-Interactive Key Exchange.mp4

15.0 MB

Trojan-Resilience without Cryptography.eng.srt

53.0 KB

Trojan-Resilience without Cryptography.mp4

26.3 MB

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.eng.srt

55.7 KB

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.mp4

24.8 MB

Unclonable Encryption, Revisited.eng.srt

42.2 KB

Unclonable Encryption, Revisited.mp4

14.2 MB

Unifying Presampling via Concentration Bounds.eng.srt

25.8 KB

Unifying Presampling via Concentration Bounds.mp4

8.7 MB

Updatable Public Key Encryption in the Standard Model.eng.srt

73.8 KB

Updatable Public Key Encryption in the Standard Model.mp4

27.0 MB

Vector and Functional Commitments from Lattices.eng.srt

31.3 KB

Vector and Functional Commitments from Lattices.mp4

10.1 MB

/TCC 2022/

business meeting.eng.srt

16.2 KB

business meeting.mp4

10.0 MB

Invited talk by Eran Tromer.eng.srt

110.0 KB

Invited talk by Eran Tromer.mp4

52.1 MB

opening remarks and session on Post-Quantum Cryptography.eng.srt

117.5 KB

opening remarks and session on Post-Quantum Cryptography.mp4

57.8 MB

session on ABE and FE.eng.srt

65.3 KB

session on ABE and FE.mp4

27.9 MB

session on Anonymity Verifiability and Robustness.eng.srt

114.9 KB

session on Anonymity Verifiability and Robustness.mp4

37.5 MB

session on encryption galore.eng.srt

69.9 KB

session on encryption galore.mp4

30.4 MB

session on IBE and FE.eng.srt

85.5 KB

session on IBE and FE.mp4

32.0 MB

session on interactive proofs.eng.srt

105.5 KB

session on interactive proofs.mp4

43.1 MB

session on Lattices.eng.srt

107.4 KB

session on Lattices.mp4

38.7 MB

session on multi party computation I.eng.srt

106.7 KB

session on multi party computation I.mp4

40.8 MB

session on multi party computation II.eng.srt

101.9 KB

session on multi party computation II.mp4

37.4 MB

session on OT, PIR, and Secret Sharing.eng.srt

103.8 KB

session on OT, PIR, and Secret Sharing.mp4

39.4 MB

session on Protocols Key Agreement and Commitments.eng.srt

116.1 KB

session on Protocols Key Agreement and Commitments.mp4

42.2 MB

session on quantum cryptography.eng.srt

79.2 KB

session on quantum cryptography.mp4

28.4 MB

session on secret sharing and ORAM.eng.srt

71.7 KB

session on secret sharing and ORAM.mp4

29.8 MB

session on succinct proofs.mp4

58.7 MB

session on Theory I Sampling and Friends.eng.srt

93.3 KB

session on Theory I Sampling and Friends.mp4

38.8 MB

session on Theory II and Closing Remarks.eng.srt

126.3 KB

session on Theory II and Closing Remarks.mp4

44.1 MB

test of time award session.eng.srt

130.1 KB

test of time award session.mp4

61.2 MB

/Workshops/ACS 2019/

A perspective on standardization of advanced cryptography at NIST.eng.srt

76.7 KB

A perspective on standardization of advanced cryptography at NIST.mp4

66.1 MB

Advanced Cryptography on the Way to Practice.eng.srt

67.2 KB

Advanced Cryptography on the Way to Practice.mp4

54.0 MB

BLS signatures, hashing to curves, and more dispatches from the IETF.eng.srt

59.9 KB

BLS signatures, hashing to curves, and more dispatches from the IETF.mp4

12.7 MB

Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.eng.srt

69.8 KB

Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.mp4

16.3 MB

HomomorphicEncryption.org - a community effort.eng.srt

68.2 KB

HomomorphicEncryption.org - a community effort.mp4

54.4 MB

Lessons about Standardization.eng.srt

52.1 KB

Lessons about Standardization.mp4

35.4 MB

Panel & Further Discussion.eng.srt

133.4 KB

Panel & Further Discussion.mp4

32.7 MB

Towards Standardizing Zero Knowledge.eng.srt

71.6 KB

Towards Standardizing Zero Knowledge.mp4

47.5 MB

/.../Beyond Crypto - A TCS Perspective (At Crypto 2018)/

A Fine Grained Approach to Complexity.eng.srt

132.1 KB

A Fine Grained Approach to Complexity.mp4

83.5 MB

Certified Randomness from Quantum Supremacy.eng.srt

144.3 KB

Certified Randomness from Quantum Supremacy.mp4

87.1 MB

Cryptography, Local Decoding, and Distributed Storage.eng.srt

155.3 KB

Cryptography, Local Decoding, and Distributed Storage.mp4

48.9 MB

Machine Learning and Security The Good, the Bad, and the Hopeful.eng.srt

174.1 KB

Machine Learning and Security The Good, the Bad, and the Hopeful.mp4

71.5 MB

On Optimal Algorithms and Assumption Factories.eng.srt

130.4 KB

On Optimal Algorithms and Assumption Factories.mp4

73.8 MB

Theory for Society Crypto on Steroids.eng.srt

119.7 KB

Theory for Society Crypto on Steroids.mp4

78.8 MB

/Workshops/CFAIL 2021/

Keynote by Eli Ben-Sasson.eng.srt

98.2 KB

Keynote by Eli Ben-Sasson.mp4

55.1 MB

on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.eng.srt

52.6 KB

on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.mp4

27.1 MB

Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-....eng.srt

63.6 KB

Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-....mp4

35.2 MB

Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.eng.srt

46.7 KB

Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.mp4

19.6 MB

Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.eng.srt

12.2 KB

Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.mp4

24.2 MB

Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.eng.srt

43.8 KB

Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.mp4

18.0 MB

The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.eng.srt

39.9 KB

The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.mp4

21.2 MB

/Workshops/PPML 2021/

Contributed talks.eng.srt

152.9 KB

Contributed talks.mp4

53.9 MB

Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.eng.srt

119.4 KB

Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.mp4

42.3 MB

Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.eng.srt

106.8 KB

Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.mp4

37.3 MB

Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.eng.srt

116.3 KB

Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.mp4

44.5 MB

PPML Contributed Talks.eng(translated).eng(translated).srt

99.4 KB

PPML Contributed Talks.mp4

43.8 MB

Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.mp4

40.3 MB

/.../TASER 2021 Workshop/

An overview of security topics within RISC-V, by Helena Handschuh.eng.srt

54.2 KB

An overview of security topics within RISC-V, by Helena Handschuh.mp4

26.0 MB

Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.eng.srt

45.0 KB

Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.mp4

15.9 MB

CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.eng.srt

51.7 KB

CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.mp4

21.9 MB

Closing remarks at TASER 2021, by Dan Page of Bristol University.eng.srt

2.0 KB

Closing remarks at TASER 2021, by Dan Page of Bristol University.mp4

1.7 MB

Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.eng.srt

42.3 KB

Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.mp4

17.6 MB

Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.eng.srt

46.1 KB

Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.mp4

19.0 MB

Opening remarks at TASER 2021, by Dan Page, Bristol University.eng.srt

10.5 KB

Opening remarks at TASER 2021, by Dan Page, Bristol University.mp4

5.8 MB

RISC-V cryptography extensions current status and future plans, Ben Marshall.eng.srt

47.9 KB

RISC-V cryptography extensions current status and future plans, Ben Marshall.mp4

25.6 MB

/Workshops/WAC 2 2019/

Automating the Development of Chosen Ciphertext Attacks.eng.srt

96.6 KB

Automating the Development of Chosen Ciphertext Attacks.mp4

33.3 MB

Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.eng.srt

75.6 KB

Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.mp4

59.5 MB

Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.eng.srt

63.0 KB

Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.mp4

57.0 MB

Dragonblood A Security Analysis of WPA3's SAE Handshake.eng.srt

80.7 KB

Dragonblood A Security Analysis of WPA3's SAE Handshake.mp4

58.9 MB

Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4

41.4 MB

RAMBleed Leaking Keys Across Address Spaces.mp4

152.1 MB

Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.eng.srt

76.9 KB

Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.mp4

49.5 MB

The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.eng.srt

72.2 KB

The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.mp4

58.1 MB

/Workshops/WAC 2021 4/

A Side Journey To Titan.eng.srt

9.5 KB

A Side Journey To Titan.mp4

11.0 MB

Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.eng.srt

66.7 KB

Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.mp4

17.5 MB

Fault Attacks on CCA-secure Lattice KEMs.eng.srt

73.7 KB

Fault Attacks on CCA-secure Lattice KEMs.mp4

33.9 MB

FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.eng.srt

69.6 KB

FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.mp4

35.9 MB

PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.eng.srt

55.0 KB

PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.mp4

18.4 MB

Partitioning Oracle Attacks.eng.srt

66.1 KB

Partitioning Oracle Attacks.mp4

22.2 MB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).eng.srt

77.4 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).mp4

29.1 MB

The Role of Integrity in Attestation and Isolation.eng.srt

37.5 KB

The Role of Integrity in Attestation and Isolation.mp4

18.6 MB

 

Total files 5077


Copyright © 2025 FileMood.com