•
NaN / NaN
•
NaN / NaN
Play (k)
Back
Skip navigation
Search
Search
Search with your voice
Play all
Crypto 2015
by IACR
•
Playlist
•
61 videos
•
2,158 views
Play all
Play all
Crypto 2015
by IACR
Playlist
•
61 videos
•
2,158 views
Play all
1
48:51
48:51
Now playing
The State of Cryptographic Multilinear Maps
IACR
IACR
•
1.4K views
•
9 years ago
•
2
20:30
20:30
Now playing
Constant Round MPC with Fairness and Guarantee of Output Delivery
IACR
IACR
•
219 views
•
9 years ago
•
3
19:32
19:32
Now playing
Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost
IACR
IACR
•
199 views
•
9 years ago
•
4
20:01
20:01
Now playing
Parallel Hashing via List Recoverability
IACR
IACR
•
89 views
•
9 years ago
•
5
23:21
23:21
Now playing
Statistical Concurrent Non malleable Zero knowledfe from One way Functions
IACR
IACR
•
84 views
•
9 years ago
•
6
16:23
16:23
Now playing
Capacity and Data Complexity in Multidimensional Linear Attack
IACR
IACR
•
68 views
•
9 years ago
•
7
20:23
20:23
Now playing
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
IACR
IACR
•
577 views
•
9 years ago
•
8
20:58
20:58
Now playing
Tweaking Even Mansour Ciphers
IACR
IACR
•
200 views
•
9 years ago
•
9
19:49
19:49
Now playing
Practical Round Optimal Blind Signatures in the Standard Model
IACR
IACR
•
438 views
•
9 years ago
•
10
22:42
22:42
Now playing
Secure Computation with Minimal Interaction, Revisited
IACR
IACR
•
85 views
•
9 years ago
•
11
18:48
18:48
Now playing
The Iterated Random Permutation Problem with Applications to Cascade Encryption
IACR
IACR
•
210 views
•
9 years ago
•
12
18:16
18:16
Now playing
An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security
IACR
IACR
•
226 views
•
9 years ago
•
13
21:53
21:53
Now playing
Efficient Constant Round Multi Party Computation Combining BMR and SPDZ
IACR
IACR
•
1K views
•
9 years ago
•
14
18:39
18:39
Now playing
Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation
IACR
IACR
•
134 views
•
9 years ago
•
15
22:15
22:15
Now playing
Indistinguishability Obfuscation from Compact Functional Encryption
IACR
IACR
•
644 views
•
9 years ago
•
16
17:38
17:38
Now playing
Known key Distinguisher on Full PRESENT
IACR
IACR
•
264 views
•
9 years ago
•
17
18:00
18:00
Now playing
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP
IACR
IACR
•
355 views
•
9 years ago
•
18
27:12
27:12
Now playing
Online Authenticated Encryption and its Nonce Reuse Misuse Resistance
IACR
IACR
•
1K views
•
9 years ago
•
19
22:09
22:09
Now playing
Bloom Filters in Adversarial Environments
IACR
IACR
•
267 views
•
9 years ago
•
20
20:35
20:35
Now playing
Cryptanalysis of the Co ACD Assumption
IACR
IACR
•
39 views
•
9 years ago
•
21
21:57
21:57
Now playing
Arguments of Proximity
IACR
IACR
•
58 views
•
9 years ago
•
22
16:35
16:35
Now playing
Bilinear Entropy Expansion from the Decisional Linear Assumption
IACR
IACR
•
91 views
•
9 years ago
•
23
18:22
18:22
Now playing
Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption
IACR
IACR
•
222 views
•
9 years ago
•
24
26:45
26:45
Now playing
Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information
IACR
IACR
•
79 views
•
9 years ago
•
25
23:28
23:28
Now playing
Practical Free Start Collision Attacks on the 76 Step SHA 1
IACR
IACR
•
562 views
•
9 years ago
•
26
24:10
24:10
Now playing
Quantum Homomorphic Encryption for Circuits of Low T gate Complexity
IACR
IACR
•
348 views
•
9 years ago
•
27
Incoercible Multi Party Computation and Universally Composable Receipt Free Voting
IACR
IACR
•
150 views
•
9 years ago
•
28
Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE
IACR
IACR
•
251 views
•
9 years ago
•
29
Decaf Eliminating Cofactors Through Quotients and Isogenies
IACR
IACR
•
141 views
•
9 years ago
•
30
Algebriac Decomposition for Probing Security
IACR
IACR
•
34 views
•
9 years ago
•
31
A Punctured Programming Approach to Adaptive Security in Functional Encryption
IACR
IACR
•
149 views
•
9 years ago
•
32
From Selective to Adaptive Security in Functional Encryption
IACR
IACR
•
271 views
•
9 years ago
•
33
Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis
IACR
IACR
•
622 views
•
9 years ago
•
34
Secure Computation from Leaky Correlated Randomness
IACR
IACR
•
86 views
•
9 years ago
•
35
Multi Identity and Multi Key Leveled FHE from Learning with Errors
IACR
IACR
•
208 views
•
9 years ago
•
36
Malicious for free OT Extension The Pipe is the Limit
IACR
IACR
•
138 views
•
9 years ago
•
37
Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs
IACR
IACR
•
227 views
•
9 years ago
•
38
Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits
IACR
IACR
•
256 views
•
9 years ago
•
39
Proofs of Space
IACR
IACR
•
373 views
•
9 years ago
•
40
Predicate Encryption for Circuits from LWE
IACR
IACR
•
362 views
•
9 years ago
•
41
New Attacks on Feistel Structures with Improved Memory Complexities
IACR
IACR
•
223 views
•
9 years ago
•
42
Integral Cryptanalysis on Full MISTY1
IACR
IACR
•
874 views
•
9 years ago
•
43
Explicit Non malleable Codes against Bit wise Tampering adn Permutations
IACR
IACR
•
94 views
•
9 years ago
•
44
Data Is a Stream Security of Stream Based Channels
IACR
IACR
•
85 views
•
9 years ago
•
45
Cryptography, Security, and Public Safety A Policy Perspective
IACR
IACR
•
101 views
•
9 years ago
•
46
Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes
IACR
IACR
•
98 views
•
9 years ago
•
47
Bit Commitment schemes with Non Signaling Adversaries
IACR
IACR
•
3.2K views
•
9 years ago
•
48
Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations
IACR
IACR
•
57 views
•
9 years ago
•
49
The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC
IACR
IACR
•
91 views
•
9 years ago
•
50
Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit
IACR
IACR
•
251 views
•
9 years ago
•
51
PoW Based Distributed Cryptography with no Trusted Setup
IACR
IACR
•
173 views
•
9 years ago
•
52
Efficient Pseudorandom Functions via On the Fly Adaptation
IACR
IACR
•
145 views
•
9 years ago
•
53
Observations on the SIMON Block Cipher Family
IACR
IACR
•
2.8K views
•
9 years ago
•
54
Multi Key Security The Even Mansour Construction Revisted
IACR
IACR
•
111 views
•
9 years ago
•
55
Implicit Zero Knowledge Arguments and Applications to the Malicious Setting
IACR
IACR
•
295 views
•
9 years ago
•
56
Cryptography with One Way Communication
IACR
IACR
•
236 views
•
9 years ago
•
57
Concurrent Secure Computation with Optimal Query Complexity
IACR
IACR
•
47 views
•
9 years ago
•
58
Concurrent Secure Computation via Non Black Box Simulation
IACR
IACR
•
81 views
•
9 years ago
•
59
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
IACR
IACR
•
781 views
•
9 years ago
•
60
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
IACR
IACR
•
384 views
•
9 years ago
•
61
Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond
IACR
IACR
•
99 views
•
9 years ago
•
5
4
3
2
1