Play all
Play all

Crypto 2015

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21

Arguments of Proximity

22
23
24
25
26
27
28
29
30

Algebriac Decomposition for Probing Security

31
32
33
34
35
36
37
38
39

Proofs of Space

40

Predicate Encryption for Circuits from LWE

41
42

Integral Cryptanalysis on Full MISTY1

43
44

Data Is a Stream Security of Stream Based Channels

45
46
47

Bit Commitment schemes with Non Signaling Adversaries

48
49
50
51
52
53

Observations on the SIMON Block Cipher Family

54
55
56

Cryptography with One Way Communication

57
58
59
60
61