The IACR
    
    File List
    
        
            
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 2 - Session 1 - Morning.mp4  410.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 3 - Session 2 - Afternoon.mp4  295.5 MB
 
                
                    - Crypto/Crypto 2020/Firmware Insider Bluetooth Randomness is Mostly Random.mp4  265.5 MB
 
                
                    - Crypto/Crypto 2020/Workshop on Attacks in Crypto 2020 Sessions I and II.mp4  236.8 MB
 
                
                    - Workshops/Unsorted/TPES 2022 Theory and Practice of Encrypted Search.mp4  225.3 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/TPES 2022 Theory and Practice of Encrypted Search.mp4  217.0 MB
 
                
                    - Crypto/Crypto 2020/Workshop on Attacks in Crypto 2020 Session III and Keynote.mp4  203.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 2 - Session 2 - Afternoon - Part 3.mp4  168.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 1 - Session 2 - Afternoon.mp4  159.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 1 - Session 1 - Morning - part 2.mp4  155.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 3 - Session 1 - Morning - Part 1.mp4  148.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES Test of Time Award Ceremony - Rump Session.mp4  141.6 MB
 
                
                    - Workshops/WAC 2019 2/RAMBleed Leaking Keys Across Address Spaces.mp4  140.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 1 - Session 1 - Morning - part 1.mp4  140.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4  133.9 MB
 
                
                    - Crypto/Crypto 2016/Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.mp4  132.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.mp4  130.9 MB
 
                
                    - Crypto/Crypto 2019/Invited talk Secure computation When theory meets.mp4  128.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 3 - Session 1 - Morning Part 2.mp4  127.5 MB
 
                
                    - Crypto/Crypto 2020/TPM-FAIL TPM meetings Timing and Lattice Attacks.mp4  127.1 MB
 
                
                    - Crypto/Crypto 2020/Rump Session.mp4  123.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Rump session.mp4  116.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.mp4  115.7 MB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 rump session.mp4  115.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.mp4  112.6 MB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 session talks part I.mp4  110.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 Rump Session.mp4  108.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/IACR Fellows Ceremony and Rump Session.mp4  107.8 MB
 
                
                    - Crypto/Crypto 2023/Emerging Paradigms 1 & 2 - Post-Quantum Signatures 1 & 2.mp4  107.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 2 - Session 2 - Afternoon - Part 1.mp4  107.5 MB
 
                
                    - Crypto/Crypto 2020/LadderLeak.mp4  101.7 MB
 
                
                    - Crypto/Crypto 2020/Pseudorandom Black Swans Cache Attacks on CTR DRBG.mp4  101.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Panel Discussion on Contact Tracing.mp4  101.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 Rump Session.mp4  100.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.mp4  98.5 MB
 
                
                    - Crypto/Crypto 2018/From Idea to Impact, the Crypto Story - What's Next.mp4  98.0 MB
 
                
                    - IACR Distinguished Lectures/From Idea to Impact, the Crypto Story What's Next.mp4  98.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.mp4  93.8 MB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 Rump Session.mp4  92.1 MB
 
                
                    - Crypto/Crypto 2024/Symmetric Cryptanalysis 2.mp4  91.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 Rump Session.mp4  89.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Rump Session.mp4  87.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.mp4  87.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Encryption 3 - Closing remarks.mp4  86.2 MB
 
                
                    - IACR Distinguished Lectures/Phil Rogaway - IACR Distinguished Lecture 2015.mp4  85.6 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Certified Randomness from Quantum Supremacy.mp4  84.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Welcome opening - Invited talk I by Nadia Heninger.mp4  84.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/IACR Business Meeting.mp4  83.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Messaging and Encryption.mp4  83.6 MB
 
                
                    - Crypto/Crypto 2020/BIAS - KNOB attack against Bluetooth.mp4  83.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.mp4  82.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.mp4  82.6 MB
 
                
                    - Crypto/Crypto 2020/Weaknesses in the Moscow Internet voting system.mp4  81.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/True Randomness - Closing Remarks.mp4  81.1 MB
 
                
                    - Crypto/Crypto 2018/CAPA The Spirit of Beaver Against Physical Attacks.mp4  80.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Symmetric Cryptanalysis.mp4  79.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Security of ECC (Implementations).mp4  79.2 MB
 
                
                    - Crypto/Crypto 2020/Workshop on Attacks in Crypto Session IV Attacks on Standards.mp4  79.1 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/A Fine Grained Approach to Complexity.mp4  78.7 MB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump session part 3.mp4  78.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Attacks - Cryptography in the Ads Ecosystem II - discussion (see description).mp4  78.3 MB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump session part 2.mp4  78.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Cryptanalysis II.mp4  77.6 MB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump Session Part 1.mp4  77.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.mp4  77.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Practical Fault Injection.mp4  76.8 MB
 
                
                    - Crypto/Crypto 2022 Live/Advanced Encryption Systems.mp4  76.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 Rump session part 1.mp4  76.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.mp4  76.1 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Theory for Society - Crypto on Steroids.mp4  76.1 MB
 
                
                    - Crypto/Crypto 2018/Crypto - A Key Ingredient to Building Respectful Products.mp4  75.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Zero Knowledge 1 - Advanced Crypto.mp4  75.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Attacks Hardness.mp4  75.3 MB
 
                
                    - Crypto/Crypto 2024/Symmetric Cryptanalysis 1.mp4  75.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.mp4  74.8 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Cryptography, Local Decoding, and Distributed Storage.mp4  74.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 Rump Session (part 2).mp4  74.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Proof Systems.mp4  74.1 MB
 
                
                    - Crypto/Crypto 2024/Interactive & Zero-knowledge Proofs.mp4  73.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Deep Learning Based Side Channel Attacks.mp4  73.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Best Paper Award Session.mp4  73.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on NTT Implementations.mp4  72.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Privacy and ZKP.mp4  72.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/MPC.mp4  71.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Useful Primitives - Cryptography in the Ads Ecosystem I - Lightning Rounds.mp4  71.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Machine Learning and Side-Channel Analysis II.mp4  70.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Code-Based Cryptography.mp4  70.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Cryptography in Vietnam in the French and American Wars.mp4  70.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Side Channel Attacks on Post Quantum Implementations 1.mp4  70.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Coding Theory.mp4  69.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-99 Rump Session.mp4  69.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Encryption 2 & Backdoors.mp4  69.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Symmetric Key Theory.mp4  69.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Physical Unclonable Functions.mp4  69.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Fast Implementations for Post Quantum Schemes.mp4  69.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Efficient Zero-Knowledge.mp4  69.4 MB
 
                
                    - Crypto/Crypto 2022 Live/Zero Knowledge.mp4  69.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Side Channel Metrics and Masking Schemes.mp4  69.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Randomness.mp4  69.0 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 2 Agility for converging to a PQ world.mp4  68.7 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/On Optimal Algorithms and Assumption Factories.mp4  68.4 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Machine Learning and Security - The Good, the Bad, and the Hopeful.mp4  68.4 MB
 
                
                    - Crypto/Crypto 2024/Multi-party Computation 1.mp4  68.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 Panel Discussion.mp4  68.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Rump Session at Eurocrypt 2022.mp4  68.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Cryptanalysis of Post-Quantum Cryptography.mp4  67.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Invited Talk - Failures of secret key cryptography.mp4  67.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Fault Protection Frameworks and SCA Countermeasures.mp4  66.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Efficient Masking.mp4  66.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.mp4  66.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).mp4  66.3 MB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 keynote talk by Ian Blumenfeld - session talks part II.mp4  66.1 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.mp4  66.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Leakage Resilience and Masking Verification.mp4  66.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Quantum Cryptanalysis.mp4  65.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on succinct proofs.mp4  65.9 MB
 
                
                    - Crypto/Crypto 2017/Verified Drop in Replacements for TLS&HTTPS.mp4  65.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Hashing and Hash&Sign.mp4  65.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side-Channel Attacks on Post-Quantum Implementations II.mp4  65.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 Rump Session.mp4  65.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Post Quantum Cryptography Theory.mp4  65.0 MB
 
                
                    - Crypto/Crypto 2024/Cryptanalysis.mp4  64.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Hardware Security.mp4  64.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Hardware Security.mp4  64.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side-Channel Attacks on Symmetric Algorithms I.mp4  64.4 MB
 
                
                    - Crypto/Crypto 2022 Live/Quantum Cryptography I.mp4  64.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Masking Schemes and their Analysis.mp4  64.2 MB
 
                
                    - Workshops/WAC 2019 2/Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.mp4  64.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Lower Bounds.mp4  64.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Invited talk - Advances in computer aided cryptography.mp4  64.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Post Quantum Cryptography.mp4  64.1 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/test of time award session.mp4  64.1 MB
 
                
                    - Crypto/Crypto 2016/Probabilistic Termination and Composability of Cryptographic Protocols.mp4  63.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Threshold Cryptography.mp4  63.9 MB
 
                
                    - Crypto/Crypto 2024/Fully Homomorphic Encryption.mp4  63.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Machine Learning and Side-Channel Analysis I.mp4  63.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Functional Encryption 1.mp4  63.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side-Channel Attacks on Symmetric Algorithms II.mp4  63.1 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/opening remarks and session on Post-Quantum Cryptography.mp4  63.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Fully Homomorphic Encryption.mp4  62.9 MB
 
                
                    - Crypto/Crypto 2022 Live/Public Key Cryptography.mp4  62.8 MB
 
                
                    - Workshops/WAC 2019 2/The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.mp4  62.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4  62.6 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 Contributed Talks II.mp4  62.5 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 2 AI and Cryptanalysis.mp4  62.3 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.mp4  62.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Tools for SCA and Cryptanalysis.mp4  62.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Opening Remarks - Invited Talk I.mp4  61.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/MPC for General Functionalities 1 & Functional Encryption 2.mp4  61.8 MB
 
                
                    - Workshops/WAC 2019 2/Dragonblood A Security Analysis of WPA3's SAE Handshake.mp4  61.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Welcome - Functional Encryption and Identity Based Encryption.mp4  61.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 Rump Session.mp4  61.1 MB
 
                
                    - Workshops/WAC 2019 2/Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.mp4  60.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side-Channel Evaluation and Distinguishers.mp4  60.6 MB
 
                
                    - Crypto/Crypto 2019/Efficient Pseudorandom Correlation Generators Silent OT Extension and More.mp4  60.4 MB
 
                
                    - Crypto/Crypto 2022 Live/Best Paper Awards Crypto 2022.mp4  60.3 MB
 
                
                    - Crypto/Crypto 2017/From Obfuscation to the Security of Fiat Shamir for Proofs.mp4  60.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Invited Talk by Yehuda Lindell (reuploaded).mp4  59.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Fault Analysis on Post Quantum Cryptography II.mp4  59.4 MB
 
                
                    - Workshops/ACS 2019/HomomorphicEncryption.org - a community effort.mp4  59.4 MB
 
                
                    - Workshops/ACS 2019/A perspective on standardization of advanced cryptography at NIST.mp4  59.4 MB
 
                
                    - Crypto/Crypto 2024/Digital Signatures 1.mp4  59.4 MB
 
                
                    - Crypto/Crypto 2024/Digital Signatures 3.mp4  59.3 MB
 
                
                    - Crypto/Crypto 2016/Adaptively Secure Garbled Circuits from One Way Functions.mp4  59.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on RISC V.mp4  59.2 MB
 
                
                    - Workshops/WAC 2024 7/WAC7 talks 3 & 4.mp4  58.9 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.mp4  58.9 MB
 
                
                    - Crypto/Crypto 2024/Multi-party Computation 2.mp4  58.9 MB
 
                
                    - Crypto/Crypto 2022 Live/Secure Messaging.mp4  58.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Hardware Acceleration and Instruction Set Extensions.mp4  58.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Masking Techniques II.mp4  58.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4  58.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 opening remarks - award papers.mp4  58.4 MB
 
                
                    - Crypto/Crypto 2019/Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.mp4  58.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Proofs and SNARKs.mp4  58.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Quantum Cryptography.mp4  58.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Differential Privacy and the People's Data.mp4  58.0 MB
 
                
                    - IACR Distinguished Lectures/Differential Privacy and the People's Data.mp4  58.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Signatures 1.mp4  57.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Isogenies & Applications.mp4  57.8 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 4 Lessons Learned.mp4  57.8 MB
 
                
                    - Crypto/Crypto 2024/Key Exchange.mp4  57.7 MB
 
                
                    - Crypto/Crypto 2024/Side Channels & Leakage.mp4  57.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Functional and Witness Encryption.mp4  57.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Zero-Knowledge Proofs - Succinctness.mp4  57.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Closing Remarks - Feedback Session.mp4  57.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Crypto for Crypto.mp4  57.5 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 contributed talks IV.mp4  57.5 MB
 
                
                    - Crypto/Crypto 2019/Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.mp4  57.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Network Security and Key Exchange.mp4  57.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Real World Protocols.mp4  57.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/(Security of) Efficient Exponentiation.mp4  57.3 MB
 
                
                    - Crypto/Crypto 2019/Joint Presentation on Lattices at Crypto 2019.mp4  57.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Secure Multiparty Computation I.mp4  57.1 MB
 
                
                    - Crypto/Crypto 2024/SNARKs 2.mp4  57.1 MB
 
                
                    - Crypto/Crypto 2016/Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.mp4  56.8 MB
 
                
                    - Crypto/Crypto 2024/Multi-party Computation 4.mp4  56.7 MB
 
                
                    - Workshops/ACS 2019/Advanced Cryptography on the Way to Practice.mp4  56.5 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Quantum Cryptography II.mp4  56.5 MB
 
                
                    - Crypto/Crypto 2017/Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.mp4  56.5 MB
 
                
                    - Crypto/Crypto 2022 Live/Idealized Models.mp4  56.5 MB
 
                
                    - Crypto/Crypto 2017/Prospects for a Quantum Factoring Machine.mp4  56.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Commitments.mp4  56.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/White-Box Cryptography I.mp4  56.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/FHE and MPC.mp4  56.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The ship has sailed - the NIST Post-Quantum Cryptography - competition.mp4  56.3 MB
 
                
                    - Crypto/Crypto 2020/Practical Decryption exFiltration Breaking PDF Encryption.mp4  56.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/PQC Protocols and Agility.mp4  56.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.mp4  56.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Cryptanalysis.mp4  55.7 MB
 
                
                    - Workshops/PPML 2021/Contributed talks.mp4  55.7 MB
 
                
                    - Crypto/Crypto 2016/Two Message Oblivious Evaluation of Cryptographic Functionalities.mp4  55.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Blockchain.mp4  55.5 MB
 
                
                    - Crypto/Crypto 2019/On the Plausibility of Fully Homomorphic Encryption for RAMs.mp4  55.5 MB
 
                
                    - Crypto/Crypto 2016/Akamai Faster Forward - Crypto at Scale.mp4  55.3 MB
 
                
                    - Crypto/Crypto 2016/Semantic Security and Indistinguishability in the Quantum World.mp4  55.2 MB
 
                
                    - Crypto/Crypto 2024/Isogenies & Elliptic Curves.mp4  55.2 MB
 
                
                    - Crypto/Crypto 2018/Lattice Based Zero Knowledge Arguments for Integer Relations.mp4  55.2 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/IACR Award Ceremony.mp4  55.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Opening Remarks and Number-theoretic Cryptography.mp4  54.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Opening remarks - Theoretical Foundations.mp4  54.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-22 Invited Talk by Robert N.M. Watson.mp4  54.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Symmetric Key Cryptanalysis I.mp4  54.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Invited talk 2 by Aggelos Kiayias.mp4  54.7 MB
 
                
                    - Crypto/Crypto 2023/Functional Encryption 1 & 2.mp4  54.7 MB
 
                
                    - Crypto/Crypto 2024/Mathematical Assumptions.mp4  54.6 MB
 
                
                    - Workshops/WAC 2019 2/Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.mp4  54.6 MB
 
                
                    - Crypto/Crypto 2016/Cryptanalysis of GGH15 Multilinear Maps.mp4  54.6 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk II.mp4  54.4 MB
 
                
                    - Crypto/Crypto 2024/Award talks.mp4  54.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Lattice-Based Signatures & Elliptic-Curve Cryptography.mp4  54.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Threshold Schemes from Isogeny Assumptions.mp4  54.2 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 3 Privacy Preserving AI.mp4  54.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Crypto for people.mp4  54.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Fully Homomorphic Encryption from the Ground Up.mp4  54.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Garbled Circuits.mp4  53.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Invited talk II by Gaëtan Leurent.mp4  53.8 MB
 
                
                    - Crypto/Crypto 2024/Threshold Cryptography 1.mp4  53.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/Invited talk by Eran Tromer.mp4  53.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Side-Channel and Fault Attacks.mp4  53.6 MB
 
                
                    - Crypto/Crypto 2016/Rate 1, Linear Time and Additively Homomorphic UC Commitments.mp4  53.6 MB
 
                
                    - Crypto/Crypto 2017/Boosting Authenticated Encryption Robustness With Minimal Modifications.mp4  53.5 MB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 Roundtable 4.mp4  53.5 MB
 
                
                    - Crypto/Crypto 2024/Polynomial Commitments & SNARKs.mp4  53.1 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Invited Talk III.mp4  53.0 MB
 
                
                    - Crypto/Crypto 2024/Quantum Cryptography 1.mp4  53.0 MB
 
                
                    - Crypto/Crypto 2024/Symmetric Cryptography 2.mp4  52.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Hash Function Cryptanalysis.mp4  52.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Security Models.mp4  52.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Encryption Schemes and Secure Channels.mp4  52.6 MB
 
                
                    - Crypto/Crypto 2017/Quantum Security of NMAC and Related Constructions.mp4  52.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Welcome to RWC 2022 - Side-Channel Attacks.mp4  52.5 MB
 
                
                    - Crypto/Crypto 2022 Live/Lattice Based Signatures.mp4  52.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Building and Breaking Secure Systems.mp4  52.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/White-box Cryptomania, Pascal Paillier.mp4  52.3 MB
 
                
                    - Crypto/Crypto 2019/Invited talk Contextual Integrity.mp4  52.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Secure Messaging.mp4  52.0 MB
 
                
                    - Crypto/Crypto 2016/Bounded Indistinguishability and the Complexity of Recovering Secrets.mp4  52.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 Invited talk by Yosuke Todo.mp4  52.0 MB
 
                
                    - Crypto/Crypto 2023/Invited Talk by Scott Aaronson.mp4  51.9 MB
 
                
                    - Crypto/Crypto 2018/The Curse of Small Domains New Attacks on Format Preserving Encryption.mp4  51.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/TLS.mp4  51.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-34 Award Papers.mp4  51.7 MB
 
                
                    - Crypto/Crypto 2019/Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.mp4  51.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Advanced Encryption 2.mp4  51.4 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Invited Talk I.mp4  51.3 MB
 
                
                    - Crypto/Crypto 2024/Zero-knowledge Proofs.mp4  51.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Side Channels and Backdoors.mp4  51.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Fast Hardware Implementations and Quantum Circuits.mp4  51.2 MB
 
                
                    - Crypto/Crypto 2018/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.mp4  51.1 MB
 
                
                    - Crypto/Crypto 2022 Live/Lattice Based Zero Knowledge.mp4  51.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/PQC.mp4  51.0 MB
 
                
                    - Crypto/Crypto 2017/Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.mp4  50.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The Iterated Random Function Problem.mp4  50.7 MB
 
                
                    - Workshops/WAC 2020 3/Sessions I and II.mp4  50.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Signatures.mp4  50.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Homomorphic Crypto & LWE.mp4  50.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 opening remarks - best paper awards.mp4  50.5 MB
 
                
                    - Crypto/Crypto 2022 Live/Lower Bounds.mp4  50.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Secure Implementations.mp4  50.4 MB
 
                
                    - Crypto/Crypto 2017/Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.mp4  50.3 MB
 
                
                    - Crypto/Crypto 2020/Best Paper Awards Session.mp4  50.3 MB
 
                
                    - Crypto/Crypto 2023/Anonymous Credentials.mp4  50.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Symmetric Cryptanalysis.mp4  50.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Blockcipher cryptanalysis.mp4  50.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Unique Topics.mp4  50.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Lightning talks - Short talks by the participants.mp4  50.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Privacy.mp4  50.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Theory 1.mp4  50.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Quantum Security.mp4  50.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 Rump Session.mp4  50.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Dustin Moody - Post-quantum Cryptography.mp4  49.9 MB
 
                
                    - Crypto/Crypto 2019/New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.mp4  49.9 MB
 
                
                    - Crypto/Crypto 2024/Quantum Cryptography 2.mp4  49.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Symmetric-Key constructions.mp4  49.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Towards Secure Distance Bounding.mp4  49.8 MB
 
                
                    - Crypto/Crypto 2024/Public Key & Advanced Encryption.mp4  49.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Homomorphic Encryption.mp4  49.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/CFRG Meeting.mp4  49.7 MB
 
                
                    - Crypto/Crypto 2016/On the Power of Secure Two Party Computation.mp4  49.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/IACR Membership Meeting Part I.mp4  49.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Tweakable Block Ciphers.mp4  49.6 MB
 
                
                    - Crypto/Crypto 2016/Key Wrapping for Cryptographic APIs.mp4  49.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/How to use Metaheuristics for Design of Symmetric Key primitives.mp4  49.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Thirty Years of Digital Currency - From Digicash to the Blockchain.mp4  49.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Real World Protocols.mp4  49.3 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 4 Lessons Learned.mp4  49.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Lattice Algorithms and Cryptanalysis.mp4  49.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Signatures.mp4  49.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Functional Commitments and Proofs & MPC.mp4  49.2 MB
 
                
                    - Crypto/Crypto 2014/IACR Distinguished Lecture - Caught in Between Theory and Practice.mp4  49.2 MB
 
                
                    - Crypto/Crypto 2024/Public Key Encryption.mp4  49.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Advanced Encryption.mp4  49.1 MB
 
                
                    - Crypto/Crypto 2019/Shared presentation on Fiat-Shamir security at Crypto 2019.mp4  49.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Day 2 - Session 2 - Afternoon - Part 2.mp4  48.9 MB
 
                
                    - Crypto/Crypto 2019/The Distinction Between Fixed and Random Generators in Group-Based Assumptions.mp4  48.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.mp4  48.9 MB
 
                
                    - Crypto/Crypto 2017/Information theoretic Indistinguishability via the Chi squared Method.mp4  48.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/General IACR Business Meeting.mp4  48.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric-Key Cryptanalysis 2.mp4  48.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Opening remarks at Asiacrypt 2017.mp4  48.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Threshold Signatures.mp4  48.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Secret Sharing and Information Privacy.mp4  48.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Symmetric Designs.mp4  48.6 MB
 
                
                    - Workshops/ACS 2019/Towards Standardizing Zero Knowledge.mp4  48.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Secret Sharing.mp4  48.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.mp4  48.5 MB
 
                
                    - Crypto/Crypto 2024/Sequential Functions.mp4  48.4 MB
 
                
                    - Crypto/Crypto 2020/Test of Time Award Ceremony - Cryptanalysis 1.mp4  48.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Invited talk I by Kenny Paterson.mp4  48.2 MB
 
                
                    - Workshops/WAC 2024 7/WAC7 introduction - talks 1 & 2.mp4  48.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Side-Channel Countermeasures.mp4  48.0 MB
 
                
                    - Crypto/Crypto 2016/Linicrypt - A Model for Practical Cryptography.mp4  48.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Public-Key Cryptanalysis.mp4  47.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/IACR Distinguished Lecture by Ingrid Verbauwhede.mp4  47.9 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk I Mariana Raykova  Contributed Talks I.mp4  47.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Proofs and Arguments.mp4  47.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Masking Post-Quantum Cryptography I.mp4  47.6 MB
 
                
                    - Crypto/Crypto 2018/On Tightly Secure Non Interactive Key Exchange.mp4  47.4 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on Protocols Key Agreement and Commitments.mp4  47.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-17 Advanced Encryption and Signatures.mp4  47.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.mp4  47.4 MB
 
                
                    - Crypto/Crypto 2018/Two Round Multiparty Secure Computation Minimizing Public Key Operations.mp4  47.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Invited talk - Living Between the Ideal and Real Worlds.mp4  47.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Commitments.mp4  47.1 MB
 
                
                    - Workshops/WAC 2024 7/WAC7 talks 7 & 8.mp4  47.1 MB
 
                
                    - Workshops/PPML 2021/PPML Contributed Talks.mp4  47.0 MB
 
                
                    - Crypto/Crypto 2018/Non Malleable Secret Sharing for General Access Structures.mp4  47.0 MB
 
                
                    - Workshops/WAC 2020 3/Session III and Keynote.mp4  46.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Opening Remarks for RWC 2021 - Secure Channels.mp4  46.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Invited talk Building OpenTitan by Dominic Rizzo, Google.mp4  46.9 MB
 
                
                    - Crypto/Crypto 2024/Invited talk by Karthik Bhargavan.mp4  46.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/A Decade (or so) of fully homomorphic encryption, by Craig Gentry.mp4  46.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Cryptographic Primitives II.mp4  46.8 MB
 
                
                    - Crypto/Crypto 2024/Quantum Cryptanalysis.mp4  46.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Symmetric-Key Cryptanalysis.mp4  46.6 MB
 
                
                    - Crypto/Crypto 2019/Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.mp4  46.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Zero Knowledge and Forward Secrecy - RWC 2022 Closing Remarks.mp4  46.6 MB
 
                
                    - Crypto/Crypto 2016/Programmable Hash Functions from Lattices.mp4  46.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Post-quantum cryptography 2.mp4  46.5 MB
 
                
                    - Crypto/Crypto 2016/EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.mp4  46.5 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk II Janardhan (Jana) Kulkarni  Contributed Talks III.mp4  46.5 MB
 
                
                    - Crypto/Crypto 2021/Invited Talk I (Vanessa Teague).mp4  46.5 MB
 
                
                    - Crypto/Crypto 2017/Four Round Concurrent Non Malleable Commitments from One Way Functions.mp4  46.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4  46.4 MB
 
                
                    - Crypto/Crypto 2016/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.mp4  46.4 MB
 
                
                    - Crypto/Crypto 2017/Fast Secure Two Party ECDSA Signing.mp4  46.3 MB
 
                
                    - Crypto/Crypto 2016/Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.mp4  46.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Invited talk 2 by Mehdi Tibouchi.mp4  46.0 MB
 
                
                    - Crypto/Crypto 2018/Towards Bidirectional Ratcheted Key Exchange.mp4  45.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Lattice-Based and Code-Based Cryptography.mp4  45.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Symmetric Designs.mp4  45.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/MILP and Models.mp4  45.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-5 Post-Quantum Cryptography.mp4  45.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side-Channel Attacks on Post-Quantum Implementations III.mp4  45.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Symmetric Cryptanalysis (I).mp4  45.6 MB
 
                
                    - Workshops/PPML 2021/Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.mp4  45.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Encryption 1.mp4  45.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Adaptive partitioning.mp4  45.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Fully Homomorphic Encryption.mp4  45.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Cryptographic Attacks on Privacy.mp4  45.4 MB
 
                
                    - Crypto/Crypto 2022 Live/Secure Multiparty Computation III.mp4  45.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Session for award papers.mp4  45.3 MB
 
                
                    - Workshops/WAC 2024 7/WAC7 talks 5 & 6.mp4  45.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The first thorough side channel hardware trojan.mp4  45.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Hardware.mp4  45.2 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk I.mp4  45.1 MB
 
                
                    - Crypto/Crypto 2017/Quantum non malleability and authentication.mp4  45.1 MB
 
                
                    - Crypto/Crypto 2020/Opening remarks - Security Models.mp4  45.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Opening Remarks - Award papers.mp4  45.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Quantum Random Oracle Model.mp4  44.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Key Exchange and Messaging.mp4  44.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Post-Quantum Cryptography in Software I.mp4  44.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/MPC for Specific Functionalities.mp4  44.9 MB
 
                
                    - Crypto/Crypto 2017/Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.mp4  44.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on Theory II and Closing Remarks.mp4  44.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Committing Security.mp4  44.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Practical Attacks.mp4  44.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Automated Cryptanalysis I.mp4  44.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Enhanced PKE and Time-Lock Puzzles.mp4  44.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Cycle slicer An algorithm for building permutations on special domains.mp4  44.4 MB
 
                
                    - Crypto/Crypto 2019/Universally Composable Secure Computation with Corrupted Tokens.mp4  44.3 MB
 
                
                    - Crypto/Crypto 2019/Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.mp4  44.3 MB
 
                
                    - Crypto/Crypto 2016/TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.mp4  44.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on multi party computation I.mp4  44.2 MB
 
                
                    - Crypto/Crypto 2019/The Privacy Blanket of the Shuffle Model.mp4  44.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Analyzing Multi Key Security Degradation.mp4  44.1 MB
 
                
                    - Crypto/Crypto 2020/Our Models and Us.mp4  44.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Cryptanalysis and Concrete Security - Closing Remarks.mp4  44.1 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Proof Systems.mp4  44.1 MB
 
                
                    - Crypto/Crypto 2017/Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.mp4  44.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The Sleepy Model of Consensus.mp4  44.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Zero Knowledge 2.mp4  44.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/On Invariant Attacks.mp4  44.0 MB
 
                
                    - Crypto/Crypto 2016/Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.mp4  43.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Provable security.mp4  43.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/TLS ecosystem woes - David Benjamin (Google).mp4  43.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Signatures - Closing Remarks (session-23).mp4  43.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on interactive proofs.mp4  43.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Symmetrically and Asymmetrically Hard Cryptography.mp4  43.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Homomorphic Cryptography and Other Topics.mp4  43.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.mp4  43.5 MB
 
                
                    - Crypto/Crypto 2018/Generic Attacks Against Beyond Birthday Bound MACs.mp4  43.5 MB
 
                
                    - Crypto/Crypto 2016/Network Hiding Communication and Applications to Multi Party Protocols.mp4  43.5 MB
 
                
                    - Crypto/Crypto 2018/Correcting Subverted Random Oracles.mp4  43.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Building and deploying encrypted search systems - Seny Kamara.mp4  43.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on OT, PIR, and Secret Sharing.mp4  43.3 MB
 
                
                    - Crypto/Crypto 2023/Efficient FHE.mp4  43.3 MB
 
                
                    - Crypto/Crypto 2019/Unifying Computational Entropies via Kullback-Leibler Divergence.mp4  43.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/(Zero-Knowledge) Proofs 2.mp4  43.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Rump session.mp4  43.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Opening Remarks - Post-Quantum Cryptography.mp4  43.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Signatures 2.mp4  43.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Instantaneous Decentralized Poker.mp4  43.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.mp4  42.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Panel discussion on publications.mp4  42.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Invited talk I by Maria Eichlseder.mp4  42.9 MB
 
                
                    - Crypto/Crypto 2017/Incremental Program Obfuscation.mp4  42.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Succinct and Concretely Efficient Proof Systems.mp4  42.8 MB
 
                
                    - Crypto/Crypto 2024/Rump session part I.mp4  42.8 MB
 
                
                    - Crypto/Crypto 2018/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.mp4  42.8 MB
 
                
                    - Crypto/Crypto 2019/Exploring Constructions of Compact NIZKs from Various Assumptions.mp4  42.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Practical Cryptography 2.mp4  42.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/symmetric cryptography 1.mp4  42.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Secure Computation.mp4  42.4 MB
 
                
                    - Crypto/Crypto 2016/Efficient Algorithms for Supersingular Isogeny Diffie Hellman.mp4  42.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-13 Physical Attacks, Leakage and Countermeasures.mp4  42.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Cryptographic Protocols and Secure Computation I.mp4  42.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Obfuscation, Functional Encryption, and Attribute-Based Encryption.mp4  42.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Opening remarks - Award papers.mp4  42.3 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk III.mp4  42.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Secure Multiparty Computation II.mp4  42.1 MB
 
                
                    - Crypto/Crypto 2019/Non-malleable Codes for Decision Trees.mp4  42.1 MB
 
                
                    - Crypto/Crypto 2016/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.mp4  42.1 MB
 
                
                    - Crypto/Crypto 2018/Cryptanalysis via Algebraic Spans.mp4  42.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Provable security and attack models.mp4  42.0 MB
 
                
                    - Crypto/Crypto 2016/Obfuscation Combiners.mp4  42.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Theory of Public-Key Cryptography.mp4  42.0 MB
 
                
                    - Crypto/Crypto 2018/Faster Homomorphic Linear Transformations in HElib.mp4  42.0 MB
 
                
                    - Crypto/Crypto 2020/Public-key, Functional, & Witness Encryption.mp4  41.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Universal Hashing and Authenticated Encryption.mp4  41.9 MB
 
                
                    - Crypto/Crypto 2024/Symmetric Cryptography 1.mp4  41.8 MB
 
                
                    - Crypto/Crypto 2018/Fast Message Franking From Invisible Salamanders to Encryptment.mp4  41.8 MB
 
                
                    - Workshops/WAC 2021 4/FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.mp4  41.8 MB
 
                
                    - Crypto/Crypto 2019/On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.mp4  41.8 MB
 
                
                    - Crypto/Crypto 2017/Joint presentation.mp4  41.7 MB
 
                
                    - Crypto/Crypto 2024/SNARKs 1.mp4  41.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/NIZK and SNARKs.mp4  41.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/The Evolving Crypto War - Jennifer Granick.mp4  41.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Opening Remarks - MPC & Secret Sharing (session-2).mp4  41.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/advanced encryption 1.mp4  41.4 MB
 
                
                    - Crypto/Crypto 2016/Network Oblivious Transfer.mp4  41.4 MB
 
                
                    - Crypto/Crypto 2016/On the Communication required for Unconditionally Secure Multiplication.mp4  41.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/MPC for General Functionalities 2.mp4  41.3 MB
 
                
                    - Crypto/Crypto 2023/Foundations.mp4  41.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Zero Knowledge.mp4  41.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Authenticated Encryption Cryptanalysis.mp4  41.3 MB
 
                
                    - Crypto/Crypto 2024/Secret Sharing.mp4  41.3 MB
 
                
                    - Workshops/CFAIL 2021/Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-.mp4  41.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-6 Multiparty Computation.mp4  41.2 MB
 
                
                    - Crypto/Crypto 2018/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.mp4  41.2 MB
 
                
                    - Crypto/Crypto 2017/ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.mp4  41.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Post-Quantum Encryption.mp4  41.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-37 Invited Talk by Kazue Sako.mp4  41.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Garbling Schemes and Oblivious Transfer.mp4  41.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Side Channel Attacks on Post Quantum Implementations I.mp4  41.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on Theory I Sampling and Friends.mp4  41.0 MB
 
                
                    - Crypto/Crypto 2019/Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.mp4  41.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Side Channel Attacks and Masking.mp4  41.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 rump session part deux.mp4  40.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.mp4  40.8 MB
 
                
                    - Crypto/Crypto 2016/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.mp4  40.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.mp4  40.8 MB
 
                
                    - Crypto/Crypto 2017/Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.mp4  40.7 MB
 
                
                    - Crypto/Crypto 2024/Attribute-based Encryption.mp4  40.7 MB
 
                
                    - Crypto/Crypto 2017/Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.mp4  40.7 MB
 
                
                    - Crypto/Crypto 2017/Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.mp4  40.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4  40.6 MB
 
                
                    - Crypto/Crypto 2019/Shared presentation on Zero Knowledge at Crypto 2019.mp4  40.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.mp4  40.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Cryptographic Protocols - Tools.mp4  40.5 MB
 
                
                    - Crypto/Crypto 2023/Symmetric Crypto with Public-Key Applications.mp4  40.5 MB
 
                
                    - Crypto/Crypto 2024/Theoretical Foundations 2.mp4  40.5 MB
 
                
                    - Crypto/Crypto 2017/The Price of Low Communication in Secure Multi Party Computation.mp4  40.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-16 Post-quantum crypto (part II).mp4  40.4 MB
 
                
                    - Crypto/Crypto 2017/Two papers on Indistinguishability Obfuscation (soft merge).mp4  40.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Messaging and Message Franking.mp4  40.3 MB
 
                
                    - Crypto/Crypto 2016/How to Prove Knowledge of Small Secrets.mp4  40.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Blockcipher based MACs Beyond the Birthday Bound without Message Length.mp4  40.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Invited talk II by Wouter Castryck.mp4  40.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Grover Meets Simon - Quantumly Attacking the FX construction.mp4  40.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Homomorphic Encryption.mp4  40.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.mp4  40.3 MB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 invited talk by Gabe Kaptchuk.mp4  40.2 MB
 
                
                    - Crypto/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.mp4  40.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 Rump Session.mp4  40.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Multiparty Computation 1.mp4  40.2 MB
 
                
                    - Crypto/Crypto 2024/Threshold Cryptography 2.mp4  40.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/multiparty computation 2.mp4  40.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4  40.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/zero knowledge 2.mp4  40.1 MB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 introduction - Roundtable 1.mp4  40.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Post-Quantum Cryptography.mp4  40.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.mp4  40.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Signatures.mp4  40.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on multi party computation II.mp4  39.9 MB
 
                
                    - Crypto/Crypto 2012/The End of Crypto.mp4  39.9 MB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 Roundtable 2.mp4  39.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Is Certificate Transparency usable - Emily Stark (Google).mp4  39.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Cryptographic Primitives.mp4  39.7 MB
 
                
                    - Crypto/Crypto 2024/Cloud Cryptography.mp4  39.7 MB
 
                
                    - Crypto/Crypto 2017/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.mp4  39.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Non interactive multiparty computation without correlated randomness.mp4  39.7 MB
 
                
                    - Crypto/Crypto 2019/Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.mp4  39.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/quantum algorithms.mp4  39.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/The Kernel Matrix Diffie Hellman Assumption.mp4  39.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Symmetric Cryptanalysis.mp4  39.6 MB
 
                
                    - Crypto/Crypto 2012/Pinning Down - Privacy - in Statistical Databases.mp4  39.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.mp4  39.6 MB
 
                
                    - Crypto/Crypto 2020/Zero Knowledge Proofs.mp4  39.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Masking Techniques I.mp4  39.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Fault Analysis on Symmetric Algorithms I.mp4  39.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Cliptography Clipping the Power of Kleptographic Attacks.mp4  39.6 MB
 
                
                    - Crypto/Crypto 2019/Shared presentation at Crypto 2019.mp4  39.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Dealing with Microarchitectural Effects.mp4  39.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Linear Layers.mp4  39.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-37 White box, obfuscation, and logic locking.mp4  39.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/rump session 3.mp4  39.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Test of Time Award.mp4  39.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Post Quantum Security of Fiat Shamir.mp4  39.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Combinatorics in Information theoretic cryptography.mp4  39.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Indistinguishable Proofs of Work or Knowledge.mp4  39.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Arithmetization-Oriented Ciphers.mp4  39.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on Lattices.mp4  39.3 MB
 
                
                    - Crypto/Crypto 2016/Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.mp4  39.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on Anonymity Verifiability and Robustness.mp4  39.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Invited Talk by Chris Peikert.mp4  39.3 MB
 
                
                    - Crypto/Crypto 2019/Trapdoor Hash Functions and Their Applications.mp4  39.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Verificatum - Douglas Wikstrom (KTH).mp4  39.2 MB
 
                
                    - Crypto/Crypto 2017/Distinguisher Dependent Simulation in Two Rounds and Its Applications.mp4  39.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Cryptographic Protocols and Secure Computation II.mp4  39.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Public-Key Encryption and Generic Models.mp4  39.1 MB
 
                
                    - Crypto/Crypto 2019/Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.mp4  39.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Delay Encryption.mp4  39.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Zero-Knowledge Proofs - Foundations.mp4  39.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-39 Machine Learning for Side-Channel Attacks.mp4  39.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.mp4  39.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Invited talk by Christian Rechberger.mp4  38.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/symmetric key cryptanalysis 2.mp4  38.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Isogenies.mp4  38.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-14 Theory.mp4  38.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Real-World Protocols.mp4  38.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Hash function cryptanalysis.mp4  38.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Optimal rate non committing encryption.mp4  38.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.mp4  38.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Signatures 1.mp4  38.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-4 ABE, FE, Obfuscation and Non Traditional Models.mp4  38.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Lattice Cryptanalysis.mp4  38.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4  38.7 MB
 
                
                    - Workshops/ACS 2019/Lessons about Standardization.mp4  38.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Invited Talk II (Eike Kiltz).mp4  38.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Invited Talk.mp4  38.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Invited talk by Orr Dunkelman.mp4  38.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Reverse Cycle Walking and Its Applications.mp4  38.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Symettric Designs 1.mp4  38.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Theory 2.mp4  38.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-33 AES and ISA extensions.mp4  38.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Improved single-round secure multiplication using regenerating codes.mp4  38.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Cryptanalysis.mp4  38.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/MPC and Proofs.mp4  38.2 MB
 
                
                    - Crypto/Crypto 2017/Cube Attacks on Non Blackbox Polynomials Based on Division Property.mp4  38.2 MB
 
                
                    - Crypto/Crypto 2019/Quantum Security Proofs Using Semi-classical Oracles.mp4  38.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Verifiable Delay Functions and Randomness Extraction.mp4  38.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Microarchitectural Leakage Modeling.mp4  38.0 MB
 
                
                    - Crypto/Crypto 2017/Compact Structure Preserving Signatures with Almost Tight Security.mp4  38.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Fine-Grained Cryptography A New Frontier.mp4  38.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/IACR Distinguished Lecture by Professor Andrew Yao.mp4  38.0 MB
 
                
                    - Workshops/PPML 2021/Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.mp4  38.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Attacks.mp4  38.0 MB
 
                
                    - Crypto/Crypto 2016/On Statistically Secure Obfuscation with Approximate Correctness.mp4  37.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Oblivious Data Access 1.mp4  37.9 MB
 
                
                    - Crypto/Crypto 2019/SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.mp4  37.8 MB
 
                
                    - Crypto/Crypto 2018/TinyKeys A New Approach to Efficient Multi Party Computation.mp4  37.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Symmetric Cryptanalysis (II).mp4  37.7 MB
 
                
                    - Crypto/Crypto 2017/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.mp4  37.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.mp4  37.7 MB
 
                
                    - Crypto/Crypto 2016/On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.mp4  37.7 MB
 
                
                    - Crypto/Crypto 2019/How to Record Quantum Queries, and Applications to Quantum Indifferentiability.mp4  37.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Boomerang and Rectangle Attacks 2.mp4  37.6 MB
 
                
                    - Crypto/Crypto 2017/Be Adaptive, Avoid Overcommitting.mp4  37.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.mp4  37.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4  37.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Differential, Impossible Differential and Neural Distinguishers.mp4  37.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Secure Two-Party Computation - talks 1 3 & 2 3.mp4  37.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).mp4  37.5 MB
 
                
                    - Crypto/Crypto 2023/Consensus 2.mp4  37.5 MB
 
                
                    - Crypto/Crypto 2018/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.mp4  37.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Fault Analysis on Symmetric Algorithms II.mp4  37.4 MB
 
                
                    - Crypto/Crypto 2018/Simplifying Game Based Definitions.mp4  37.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC Test of Time Award Ceremony.mp4  37.4 MB
 
                
                    - Crypto/Crypto 2021/Succinct Arguments.mp4  37.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-109 Multi-party Computation I.mp4  37.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.mp4  37.3 MB
 
                
                    - Crypto/Crypto 2018/Quantum FHE Almost As Secure As Classical.mp4  37.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Multiparty Protocols, Secure Computation and Related Primitives.mp4  37.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Schnorr Signatures and Applications.mp4  37.2 MB
 
                
                    - Workshops/ACS 2019/Panel & Further Discussion.mp4  37.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-113 Foundations II.mp4  37.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/SNARKs.mp4  37.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Functional Encryption and Even More.mp4  37.1 MB
 
                
                    - Crypto/Crypto 2024/Private Information Retrieval.mp4  37.1 MB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 Roundtable 3.mp4  37.0 MB
 
                
                    - Crypto/Crypto 2017/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.mp4  37.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Information-Theoretic Security.mp4  37.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Hash Function Cryptanalysis.mp4  37.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Rump session.mp4  37.0 MB
 
                
                    - Crypto/Crypto 2019/Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.mp4  36.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/White-Box Cryptography II.mp4  36.9 MB
 
                
                    - Crypto/Crypto 2019/Homomorphic Time-Lock Puzzles and Applications.mp4  36.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Block Chain, Privacy and Law Enforcement.mp4  36.8 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 invited talk III by Nishanth Chandran.mp4  36.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Consolidating Inner product Masking.mp4  36.8 MB
 
                
                    - Crypto/Crypto 2019/Non-interactive Non-malleability from Quantum Supremacy.mp4  36.8 MB
 
                
                    - Crypto/Crypto 2020/Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.mp4  36.8 MB
 
                
                    - Crypto/Crypto 2017/Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.mp4  36.8 MB
 
                
                    - Crypto/Crypto 2017/Message Franking via Committing Authenticated Encryption.mp4  36.8 MB
 
                
                    - Crypto/Crypto 2024/New Primitives.mp4  36.7 MB
 
                
                    - Crypto/Crypto 2017/Laconic Oblivious Transfer and its Applications.mp4  36.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-28 Attacks (and Defenses).mp4  36.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/An Evolution of Models for Zero-Knowledge Proofs.mp4  36.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Quantum Cryptography & Quantum Cryptanalysis.mp4  36.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Invited Talk with Dustin Moody.mp4  36.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Invited Talk I (Léo Ducas).mp4  36.5 MB
 
                
                    - Crypto/Crypto 2024/Rump session part II.mp4  36.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Multiparty Computation and Garbled Circuits.mp4  36.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Design and Analysis of Tweakable Block Ciphers.mp4  36.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-20 Attacks against Real-World Systems.mp4  36.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Stream Ciphers and Cryptanalysis 1.mp4  36.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Stream Ciphers and Cryptanalysis 2.mp4  36.3 MB
 
                
                    - Crypto/Crypto 2016/Quantum Homomorphic Encryption for Polynomial sized Circuits.mp4  36.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-8 Invited Talk by Carmela Troncoso.mp4  36.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-4 Masking.mp4  36.2 MB
 
                
                    - Crypto/Crypto 2020/Lattices and Related Problems.mp4  36.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Mathematics and Cryptography A Marriage of Convenience.mp4  36.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/New designs and efficient implementations.mp4  36.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/SNARKs and NIZKs - Key Exchange (session-74).mp4  36.1 MB
 
                
                    - Crypto/Crypto 2017/The first collision for full SHA 1.mp4  36.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/s-198 Mathematics and Cryptography A Marriage of Convenience.mp4  36.1 MB
 
                
                    - Crypto/Crypto 2023/Quantum Security.mp4  36.1 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL invited talk.mp4  36.1 MB
 
                
                    - Workshops/WAC 2019 2/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4  36.1 MB
 
                
                    - Crypto/Crypto 2019/New Constructions of Reusable Designated-Verifier NIZKs.mp4  36.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Zero-Knowledge Proofs, Threshold and Multi-Signatures.mp4  35.9 MB
 
                
                    - Crypto/Crypto 2017/Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.mp4  35.9 MB
 
                
                    - Crypto/Crypto 2018/SPDZ2k Efficient MPC mod 2k for Dishonest Majority.mp4  35.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Quantum authentication with key recycling.mp4  35.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-7 Invited talk by Abhishek Jain.mp4  35.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Isogenies 2.mp4  35.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Geo manager - Nick Sullivan (Cloudflare).mp4  35.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Cryptanalysis of authenticated encryption schemes.mp4  35.8 MB
 
                
                    - Crypto/Crypto 2017/Anonymous Attestation with Subverted TPMs.mp4  35.8 MB
 
                
                    - Workshops/WAC 2019 2/Automating the Development of Chosen Ciphertext Attacks.mp4  35.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Algebraic and Integral Attacks 1.mp4  35.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Constructions of MPC.mp4  35.7 MB
 
                
                    - Crypto/Crypto 2023/Cryptanalysis of Digital Signatures.mp4  35.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Lower Bounds.mp4  35.7 MB
 
                
                    - Crypto/Crypto 2024/Digital Signatures 2.mp4  35.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Practical Cryptography 3 and Closing Remarks.mp4  35.7 MB
 
                
                    - Crypto/Crypto 2017/New security notions and feasibility results for authentication of quantum data.mp4  35.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Sensors Sensors Sensors.mp4  35.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Isogenies and Lattices.mp4  35.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Classification of Designs and Components - AES-like Hashing Cryptanalysis.mp4  35.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).mp4  35.6 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 contributed talks II.mp4  35.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/The Noise protocol framework - Trevor Perrin.mp4  35.6 MB
 
                
                    - Crypto/Crypto 2019/Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.mp4  35.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Post-Quantum Cryptography in Software II.mp4  35.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Partial session on High Order Masking.mp4  35.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Attribute Based Encryption and Friends.mp4  35.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Provable Symmetric Cryptography.mp4  35.4 MB
 
                
                    - Crypto/Crypto 2018/Amortized Complexity of Information Theoretically Secure MPC Revisted.mp4  35.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4  35.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Functional Encryption and More.mp4  35.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Code-based Cryptography.mp4  35.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4  35.2 MB
 
                
                    - Crypto/Crypto 2023/Secret Sharing 1.mp4  35.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Structure-preserving Cryptography.mp4  35.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Pairings.mp4  35.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Lattice Constructions.mp4  35.2 MB
 
                
                    - Crypto/Crypto 2019/Explicit Rate-1 Non-malleable Codes for Local Tampering.mp4  35.0 MB
 
                
                    - Crypto/Crypto 2018/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.mp4  35.0 MB
 
                
                    - Crypto/Crypto 2019/Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.mp4  35.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Stream ciphers.mp4  35.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Multiparty Computation.mp4  35.0 MB
 
                
                    - Crypto/Crypto 2018/From Laconic Zero Knowledge to Public Key Cryptography.mp4  34.9 MB
 
                
                    - Crypto/Crypto 2017/Conditional Disclosure of Secrets via Non Linear Reconstruction.mp4  34.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-14 Let’s Get Physical.mp4  34.9 MB
 
                
                    - Crypto/Crypto 2017/Ratcheted Encryption and Key Exchange - The Security of Messaging.mp4  34.9 MB
 
                
                    - Crypto/Crypto 2018/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.mp4  34.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Statistical cryptanalysis of block ciphers.mp4  34.9 MB
 
                
                    - Crypto/Crypto 2017/Black Box Parallel Garbled RAM.mp4  34.8 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 contributed talks III.mp4  34.8 MB
 
                
                    - Crypto/Crypto 2024/Multi-party Computation 3.mp4  34.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Public Key Cryptography and Isogenies.mp4  34.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Quantum Fully Homomorphic Encryption with Verification.mp4  34.8 MB
 
                
                    - Crypto/Crypto 2017/Kurosawa Desmedt Meets Tight Security.mp4  34.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.mp4  34.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/FHE and IO.mp4  34.7 MB
 
                
                    - Crypto/Crypto 2019/Cryptographic Sensing.mp4  34.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Tools for Symmetric Cryptanalysis.mp4  34.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 Rump Session.mp4  34.6 MB
 
                
                    - Crypto/Crypto 2016/Concurrent Non Malleable Commitments and More in 3 Rounds.mp4  34.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Isogeny Based Cryptography.mp4  34.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Block Cipher Cryptanalysis.mp4  34.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4  34.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Time-released Cryptography and Passwords.mp4  34.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Proof Systems.mp4  34.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Implementation Issues, Masking and Secret Sharing.mp4  34.4 MB
 
                
                    - Crypto/Crypto 2017/Key Rotation for Authenticated Encryption.mp4  34.4 MB
 
                
                    - Crypto/Crypto 2019/It Wasn't Me.mp4  34.4 MB
 
                
                    - Crypto/Crypto 2018/On the Complexity of Compressing Obfuscation.mp4  34.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Lattice-based Cryptography.mp4  34.3 MB
 
                
                    - Crypto/Crypto 2019/Memory-Hard Functions from Cryptographic Primitives.mp4  34.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Security Proofs.mp4  34.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.mp4  34.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Advanced Public-Key Encryption.mp4  34.2 MB
 
                
                    - Crypto/Crypto 2018/Limits on the Power of Garbling Techniques for Public Key Encryption.mp4  34.1 MB
 
                
                    - Crypto/Crypto 2019/On Round Optimal Statistical Zero Knowledge Arguments.mp4  34.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-34 Attacks against Classical PKC.mp4  34.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4  34.1 MB
 
                
                    - Crypto/Crypto 2019/Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019.mp4  34.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Provable Security.mp4  34.0 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Invited Talk II.mp4  34.0 MB
 
                
                    - Workshops/CFAIL 2021/Keynote by Eli Ben-Sasson.mp4  34.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Blockchains.mp4  34.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em.mp4  34.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.mp4  34.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.mp4  33.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-39 Invited Talk 2 by Yu Yu.mp4  33.9 MB
 
                
                    - Crypto/Crypto 2018/Must the Communication Graph of MPC Protocols be an Expander.mp4  33.9 MB
 
                
                    - Crypto/Crypto 2018/Non Malleable Codes for Partial Functions with Manipulation Detection.mp4  33.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Authenticated Key Exchange.mp4  33.8 MB
 
                
                    - Crypto/Crypto 2020/Leakage and Outsourced Encryption.mp4  33.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.mp4  33.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Algebraic Attacks.mp4  33.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.mp4  33.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Zero Knowledge, Property-Preserving Hashing and ORAM.mp4  33.8 MB
 
                
                    - Crypto/Crypto 2021/Opening Remarks - Signatures.mp4  33.7 MB
 
                
                    - Crypto/Crypto 2018/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.mp4  33.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/New Slide Attacks on Almost Self-Similar Ciphers.mp4  33.7 MB
 
                
                    - Crypto/Crypto 2020/Multiparty Computation 1.mp4  33.7 MB
 
                
                    - Crypto/Crypto 2017/A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.mp4  33.7 MB
 
                
                    - Workshops/PPML 2021/Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.mp4  33.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-41 Post-quantum Crypto (part III) - CHES 2021 closing remarks.mp4  33.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-1 Welcome - Foundations I.mp4  33.6 MB
 
                
                    - Crypto/Crypto 2017/Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.mp4  33.5 MB
 
                
                    - Crypto/Crypto 2021/Lattice Cryptanalysis.mp4  33.5 MB
 
                
                    - Crypto/Crypto 2021/Zero-Knowledge.mp4  33.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Finding collisions for SHA 1 - Pierre Karpman.mp4  33.5 MB
 
                
                    - Crypto/Crypto 2018/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.mp4  33.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on IBE and FE.mp4  33.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Overlaying Conditional Circuit Clauses for Secure Computation.mp4  33.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Physical Layer Group Key Agreement for Automotive Controller Area Network.mp4  33.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Encryption.mp4  33.4 MB
 
                
                    - Crypto/Crypto 2021/Multi-Party Computation 1.mp4  33.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4  33.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Cryptanalysis (1).mp4  33.3 MB
 
                
                    - Crypto/Crypto 2023/Post-Quantum ZK 1.mp4  33.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4  33.3 MB
 
                
                    - Crypto/Crypto 2016/Breaking Symmetric Cryptosystems using Quantum Period Finding.mp4  33.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Consensus Protocols.mp4  33.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/(Zero-knowledge) Proofs 1.mp4  33.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Homomorphic encryption 2.mp4  33.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Symmetric Designs and Leakage-Resilience.mp4  33.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Distributed Algorithms.mp4  33.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Blockchains and Cryptocurrencies.mp4  33.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/practical cryptography 1.mp4  33.1 MB
 
                
                    - Crypto/Crypto 2023/Side Channels 2.mp4  33.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric Key Cryptanalysis - Automated Tools - talks 2 & 3.mp4  33.1 MB
 
                
                    - Crypto/Crypto 2020/Real-world Crypto.mp4  33.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Efficient Public Key Distance Bounding Protocol.mp4  33.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Optimization of LPN Solving Algorithms.mp4  33.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.mp4  32.9 MB
 
                
                    - Crypto/Crypto 2017/Structure vs Hardness through the Obfuscation Lens.mp4  32.9 MB
 
                
                    - Crypto/Crypto 2023/Obfuscation.mp4  32.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4  32.9 MB
 
                
                    - Crypto/Crypto 2018/Proofs of Work from Worst Case Assumptions.mp4  32.9 MB
 
                
                    - Crypto/Crypto 2016/Separate Separations of CPA and Circular Security for Any Cycle Length.mp4  32.9 MB
 
                
                    - Crypto/Crypto 2021/Codes and Extractors.mp4  32.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on encryption galore.mp4  32.8 MB
 
                
                    - Crypto/Crypto 2018/On Distributional Collision Resistant Hashing.mp4  32.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Tight Proofs of Space and Replication.mp4  32.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Quantum Cryptography.mp4  32.8 MB
 
                
                    - Crypto/Crypto 2018/Fast Large Scale Honest Majority MPC for Malicious Adversaries.mp4  32.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Secure Outsourcing.mp4  32.7 MB
 
                
                    - Workshops/WAC 2020 3/Firmware Insider Bluetooth Randomness is Mostly Random.mp4  32.7 MB
 
                
                    - Crypto/Crypto 2021/Encryption.mp4  32.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Analysing the HPKE Standard.mp4  32.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Fully Homomorphic Encryption.mp4  32.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Quantum Cryptography.mp4  32.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Tools for Blockchains.mp4  32.7 MB
 
                
                    - Crypto/Crypto 2017/Encryption switching protocols revisited - switching modulo p.mp4  32.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.mp4  32.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Key transparency introduction, recent results, and open problems.mp4  32.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Secret Sharing and Secure Multiparty Computation.mp4  32.6 MB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 talks part II.mp4  32.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Isogenies 1.mp4  32.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/A simple and compact algorithm for SIDH with arbitrary degree isogenies.mp4  32.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Whitebox Cryptography.mp4  32.6 MB
 
                
                    - Crypto/Crypto 2023/Symmetric Cryptanalysis 2.mp4  32.6 MB
 
                
                    - Crypto/Crypto 2016/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.mp4  32.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/A Shuffle Argument Secure in the Generic Model.mp4  32.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4  32.5 MB
 
                
                    - Crypto/Crypto 2016/Efficiently Computing Data Independent Memory Hard Functions.mp4  32.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.mp4  32.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Cryptographic Primitives I.mp4  32.4 MB
 
                
                    - Crypto/Crypto 2021/Award Papers.mp4  32.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Simple Schemes in the Bounded Storage Model.mp4  32.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).mp4  32.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Luca De Feo.mp4  32.3 MB
 
                
                    - Crypto/Crypto 2018/Lower Bounds on Lattice Enumeration with Extreme Pruning.mp4  32.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Security Analysis of CPace.mp4  32.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Arguments and Proofs - Closing Remarks.mp4  32.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Homomorphic Encryption and Encrypted Search.mp4  32.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Quantum Multicollision Finding Algorithm.mp4  32.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/0 RTT Key Exchange with Full Forward Secrecy.mp4  32.2 MB
 
                
                    - Crypto/Crypto 2019/Highly Efficient Key Exchange Protocols with Optimal Tightness.mp4  32.1 MB
 
                
                    - Crypto/Crypto 2019/Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.mp4  32.1 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Generalized Proofs of Knowledge with Fully Dynamic Setup.mp4  32.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Isogenies.mp4  32.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Digital Signatures.mp4  31.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Signatures.mp4  31.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Construction of Random Functions.mp4  31.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on secret sharing and ORAM.mp4  31.9 MB
 
                
                    - Crypto/Crypto 2017/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.mp4  31.8 MB
 
                
                    - Crypto/Crypto 2018/Pseudorandom Quantum States.mp4  31.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-14 PIR, Encrypted RAM, Commitments.mp4  31.8 MB
 
                
                    - Crypto/Crypto 2021/Protocols - Wrap Up.mp4  31.8 MB
 
                
                    - Crypto/Crypto 2023/Lattice-Based PKC 2.mp4  31.7 MB
 
                
                    - Crypto/Crypto 2017/LPN Decoded.mp4  31.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Non-Interactive Multi-party Computation.mp4  31.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4  31.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Lightning talks.mp4  31.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Secure Multi-Party Computation.mp4  31.7 MB
 
                
                    - Crypto/Crypto 2020/Post Quantum Crypto 1.mp4  31.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Succinct Spooky Free Compilers Are Not Black Box Sound.mp4  31.7 MB
 
                
                    - Crypto/Crypto 2019/Public-Key Cryptography in the Fine-Grained Setting.mp4  31.6 MB
 
                
                    - Crypto/Crypto 2016/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.mp4  31.6 MB
 
                
                    - Crypto/Crypto 2023/Secret Sharing 2.mp4  31.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-111 Quantum II.mp4  31.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Lower Bounds for Differentially Private RAMs.mp4  31.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-20 Zero Knowledge, OT, Key Management.mp4  31.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Post Quantum Cryptography.mp4  31.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Public Key and Messaging.mp4  31.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.mp4  31.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Pairings.mp4  31.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Post quantum signatures - Melissa Chase (Microsoft Research).mp4  31.4 MB
 
                
                    - Crypto/Crypto 2018/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.mp4  31.4 MB
 
                
                    - Crypto/Crypto 2017/Ouroboros - A Provably Secure Proof of Stake Protocol.mp4  31.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/New First-Order Secure AES Performance Records.mp4  31.4 MB
 
                
                    - Crypto/Crypto 2019/Adaptively Secure MPC with Sublinear Communication Complexity.mp4  31.3 MB
 
                
                    - Crypto/Crypto 2017/Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.mp4  31.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on quantum cryptography.mp4  31.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/LWE Encryption and Applications.mp4  31.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Levchin Prize - Award ceremony.mp4  31.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/A General Polynomial Selection Method and New Asymptotic Complexities for.mp4  31.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/On the Security of Supersingular Isogeny Cryptosystems.mp4  31.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Isogenies.mp4  31.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-12 Avant-garde crypto and protocols.mp4  31.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/An attack on the FF3 format preserving encryption - F. Betul Durak.mp4  31.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).mp4  31.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.mp4  31.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Cryptocurrency.mp4  31.0 MB
 
                
                    - Crypto/Crypto 2022 Live/Secure Hash Functions.mp4  31.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Session on Attribute Based and Fully Homomorphic Encryption.mp4  31.0 MB
 
                
                    - Crypto/Crypto 2019/Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.mp4  30.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols 1-2.mp4  30.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.mp4  30.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Towards Accountability in CRS Generation.mp4  30.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.mp4  30.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Symmetric Design 3.mp4  30.8 MB
 
                
                    - Crypto/Crypto 2018/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.mp4  30.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Amortizing Randomness Complexity in Private Circuits.mp4  30.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Leakage Resilience.mp4  30.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Block Cipher Cryptanalysis (cont.).mp4  30.7 MB
 
                
                    - Crypto/Crypto 2018/On the Round Complexity of OT Extension.mp4  30.7 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk III Sewoong Oh.mp4  30.7 MB
 
                
                    - Crypto/Crypto 2017/Generic Transformations of Predicate Encodings - Constructions and Applications.mp4  30.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/session on ABE and FE.mp4  30.6 MB
 
                
                    - Crypto/Crypto 2018/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.mp4  30.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2024/Private Information Retrieval.mp4  30.5 MB
 
                
                    - Workshops/Unsorted/TPM-FAIL TPM meetings Timing and Lattice Attacks.mp4  30.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.mp4  30.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.mp4  30.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-36 IACR Distinguished Lecture by Andrew Yao.mp4  30.5 MB
 
                
                    - Crypto/Crypto 2021/Invited Talk II (Jens Groth).mp4  30.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.mp4  30.4 MB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 Best Paper Plenary.mp4  30.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-2 Post-quantum crypto (part I).mp4  30.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.mp4  30.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/The future of cryptography.mp4  30.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Differential Trail Search and Bounds 1.mp4  30.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Verifiable Verification in Cryptographic Protocols.mp4  30.4 MB
 
                
                    - Crypto/Crypto 2016/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.mp4  30.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Attacks and New Formalizations of Cryptanalysis.mp4  30.3 MB
 
                
                    - Crypto/Crypto 2020/Constructions.mp4  30.3 MB
 
                
                    - Crypto/Crypto 2020/Cryptanalysis 2.mp4  30.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4  30.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Pseudorandom Functions.mp4  30.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/Panel Quantum Algorithms for Lattice Problems.mp4  30.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.mp4  30.2 MB
 
                
                    - Crypto/Crypto 2016/Encryption Switching Protocols.mp4  30.2 MB
 
                
                    - Crypto/Crypto 2016/The SKINNY Family of Lightweight Tweakable Block Ciphers.mp4  30.2 MB
 
                
                    - Crypto/Crypto 2019/BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.mp4  30.2 MB
 
                
                    - Crypto/Crypto 2018/Yes, There is an Oblivious RAM Lower Bound.mp4  30.1 MB
 
                
                    - Crypto/Crypto 2017/Memory Tight Reductions.mp4  30.1 MB
 
                
                    - Crypto/Crypto 2016/XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.mp4  30.1 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 4.mp4  30.1 MB
 
                
                    - Crypto/Crypto 2018/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.mp4  30.1 MB
 
                
                    - Crypto/Crypto 2019/Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.mp4  30.0 MB
 
                
                    - Crypto/Crypto 2018/Contrained PRFs for NC1 in Traditional Groups.mp4  30.0 MB
 
                
                    - Crypto/Crypto 2023/ZK Based on DL 2.mp4  30.0 MB
 
                
                    - Crypto/Crypto 2014/Invited Talk - How to delegate computations - the power of no-signaling proofs.mp4  30.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Modern transparency logs.mp4  29.9 MB
 
                
                    - Crypto/Crypto 2019/Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.mp4  29.8 MB
 
                
                    - Crypto/Crypto 2018/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.mp4  29.8 MB
 
                
                    - Crypto/Crypto 2016/Another View of the Division Property.mp4  29.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-6 Ask Me Anything (AMA) with Colin O’Flynn.mp4  29.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Algebraic and Integral Attacks 2.mp4  29.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.mp4  29.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Anamorphic Encryption Private Communication against a Dictator.mp4  29.7 MB
 
                
                    - Crypto/Crypto 2019/Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.mp4  29.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/WhatsApp Key Transparency.mp4  29.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Multi-Party Computation 2.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2023/Secure Messaging 2.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2018/Multi Theorem Preprocessing NIZKs from Lattices.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2016/The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2021/Cryptanalysis.mp4  29.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2018/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2023/Symmetric Cryptanalysis 1.mp4  29.6 MB
 
                
                    - Crypto/Crypto 2023/Attacks on Post-Quantum Crypto.mp4  29.5 MB
 
                
                    - Crypto/Crypto 2019/The Communication Complexity of Threshold Private Set Intersection.mp4  29.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Non Interactive Secure 2PC in the Offline Online and Batch Settings.mp4  29.5 MB
 
                
                    - Crypto/Crypto 2017/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.mp4  29.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.mp4  29.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Anonymity - Closing Remarks.mp4  29.4 MB
 
                
                    - Crypto/Crypto 2016/Secure Protocol Transformations.mp4  29.4 MB
 
                
                    - Workshops/Unsorted/LadderLeak.mp4  29.3 MB
 
                
                    - Crypto/Crypto 2024/Consensus Protocols.mp4  29.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Signature Schemes 2.mp4  29.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.mp4  29.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4  29.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Lattice Based Cryptography.mp4  29.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Public-Key Cryptanalysis.mp4  29.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Quantum Authentication and Encryption with Key Recycling.mp4  29.2 MB
 
                
                    - Crypto/Crypto 2019/Unconditionally Secure Computation Against Low-Complexity Leakage.mp4  29.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Cryptographic Applications.mp4  29.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Multi Input Functional Encryption with Unbounded Message Security.mp4  29.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/session-5 Symmetric Cryptography.mp4  29.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Advanced FHE Protocols for the Blockchain.mp4  29.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Weak Fiat-Shamir attacks on modern proof systems.mp4  29.1 MB
 
                
                    - Crypto/Crypto 2023/Threshold Cryptography 1.mp4  29.1 MB
 
                
                    - Crypto/Crypto 2018/The Algebraic Group Model and its Applications.mp4  29.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Best Young Researcher Award.mp4  29.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Oblivious Data Access 2.mp4  29.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/When are Fuzzy Extractors Possible.mp4  29.1 MB
 
                
                    - Crypto/Crypto 2017/Topology Hiding Computation on All Graphs.mp4  29.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.mp4  29.0 MB
 
                
                    - Crypto/Crypto 2018/On the Exact Round Complexity of Secure Three Party Computation.mp4  29.0 MB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 Round Table 2 Agility for converging to a PQ world.mp4  29.0 MB
 
                
                    - Crypto/Crypto 2019/Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.mp4  28.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Private Anonymous Data Access.mp4  28.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Cryptanalysis.mp4  28.9 MB
 
                
                    - Crypto/Crypto 2016/Automatic Search of Meet in the Middle and Impossible Differential Attacks.mp4  28.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Reducing the Number of Non linear Multiplications in Masking Schemes.mp4  28.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On Derandomizing Yao’s Weak-to-Strong OWF Construction.mp4  28.9 MB
 
                
                    - Crypto/Crypto 2019/BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.mp4  28.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-30 Ask Me Anything (AMA) with Bart Preneel.mp4  28.8 MB
 
                
                    - Crypto/Crypto 2021/Quantum Cryptography 2.mp4  28.8 MB
 
                
                    - Crypto/Crypto 2021/Applied Cryptography and Side Channels.mp4  28.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-12 Multi-party Computation II.mp4  28.8 MB
 
                
                    - Crypto/Crypto 2015/The State of Cryptographic Multilinear Maps.mp4  28.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Size-Hiding Computation for Multiple Parties.mp4  28.7 MB
 
                
                    - Crypto/Crypto 2023/Correlated Pseudorandomness.mp4  28.7 MB
 
                
                    - Crypto/Crypto 2023/Consensus 1.mp4  28.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Updatable Public Key Encryption in the Standard Model.mp4  28.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.mp4  28.7 MB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 welcome - keynote talk by Adrian Stanger.mp4  28.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/symmetric cryptography 2.mp4  28.6 MB
 
                
                    - Crypto/Crypto 2016/Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.mp4  28.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/New Constructions 1.mp4  28.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Invited Talk with Yuliang Zheng.mp4  28.5 MB
 
                
                    - Crypto/Crypto 2016/Breaking the Circuit Size Barrier for Secure Computation Under DDH.mp4  28.5 MB
 
                
                    - Crypto/Crypto 2020/NIZKs, Consensus, Delay Functions.mp4  28.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4  28.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/The Retracing Boomerang Attack.mp4  28.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/My other car is your car compromising the Tesla Model X keyless entry system.mp4  28.4 MB
 
                
                    - Crypto/Crypto 2023/Lattice-Based PKC 1.mp4  28.4 MB
 
                
                    - Crypto/Crypto 2023/Lattice Problems and Their Complexity 2.mp4  28.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Preventing CLT Attacks on Obfuscation with Linear Overhead.mp4  28.4 MB
 
                
                    - Crypto/Crypto 2024/Rump session part III.mp4  28.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Automated Cryptanalysis II.mp4  28.3 MB
 
                
                    - Crypto/Crypto 2018/On the Local Leakage Resilience of Linear Secret Sharing Schemes.mp4  28.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Duality in Lattice Based Cryptography.mp4  28.3 MB
 
                
                    - Crypto/Crypto 2016/The Magic of ELFs.mp4  28.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.mp4  28.3 MB
 
                
                    - Crypto/Crypto 2023/Lattice Problems and Their Complexity 1.mp4  28.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Quantum Constructions and Proofs.mp4  28.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/invited talk by Damien Stehlé.mp4  28.2 MB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.mp4  28.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/One Shot Verifiable Encryption from Lattices.mp4  28.1 MB
 
                
                    - Crypto/Crypto 2017/Identity based Encryption from Codes with Rank Metric.mp4  28.1 MB
 
                
                    - Crypto/Crypto 2023/Threshold Cryptography 2.mp4  28.1 MB
 
                
                    - Crypto/Crypto 2017/Identity Based Encryption from the Diffie Hellman Assumption.mp4  28.1 MB
 
                
                    - Crypto/Crypto 2017/Private Multiplication over Finite Fields.mp4  28.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.mp4  28.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.mp4  28.0 MB
 
                
                    - Crypto/Crypto 2017/Non Malleable Codes for Space Bounded Tampering.mp4  28.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt2023 Invited Talk Guy Rothblum - Indistinguishable Predictions and Multi-Group Fair Learni.mp4  28.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Mitigating SAT Attack on Logic Locking.mp4  28.0 MB
 
                
                    - Crypto/Crypto 2017/Secure Computation based on Leaky Correlations - High Resilience Setting.mp4  28.0 MB
 
                
                    - Crypto/Crypto 2021/Multi-Party Computation 2 (continued).mp4  27.9 MB
 
                
                    - Crypto/Crypto 2017/Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.mp4  27.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Efficient NIZKs for Algebraic Sets.mp4  27.9 MB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.mp4  27.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.mp4  27.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Group Messaging.mp4  27.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.mp4  27.8 MB
 
                
                    - Crypto/Crypto 2016/Optimal Security Proofs for Signatures from Identification Schemes.mp4  27.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4  27.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Improved Security for OCB3.mp4  27.8 MB
 
                
                    - Crypto/Crypto 2023/MPC Round Efficiency 1.mp4  27.8 MB
 
                
                    - Crypto/Crypto 2020/Multiparty Computation 3.mp4  27.8 MB
 
                
                    - Crypto/Crypto 2016/Memory Efficient Algorithms for Finding Needles in Haystacks.mp4  27.8 MB
 
                
                    - Crypto/Crypto 2021/Cryptanalysis (continued).mp4  27.8 MB
 
                
                    - Crypto/Crypto 2017/Lower Bounds on Obfuscation from All or Nothing Encryption.mp4  27.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/An Analysis of NIST SP 800-90A.mp4  27.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Quantum Cryptanalysis.mp4  27.7 MB
 
                
                    - Crypto/Crypto 2017/Degree Evaluation of NFSR Based Cryptosystems.mp4  27.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Random Generators.mp4  27.6 MB
 
                
                    - Crypto/Crypto 2018/Dissection BKW.mp4  27.6 MB
 
                
                    - Crypto/Crypto 2018/Private Circuits A Modular Approach.mp4  27.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/COA-Secure Obfuscation and Applications.mp4  27.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.mp4  27.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Crypto for the Cloud.mp4  27.5 MB
 
                
                    - Crypto/Crypto 2023/Random Oracle 1.mp4  27.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/A Subversion-Resistant SNARK.mp4  27.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/non interactive zero knowledge.mp4  27.4 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 rump session part II.mp4  27.4 MB
 
                
                    - Crypto/Crypto 2016/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.mp4  27.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).mp4  27.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Symmetric Design 2.mp4  27.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Compact Frequency Estimators in Adversarial Environments.mp4  27.3 MB
 
                
                    - Crypto/Crypto 2019/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.mp4  27.3 MB
 
                
                    - Crypto/Crypto 2023/ORAM 1.mp4  27.3 MB
 
                
                    - Crypto/Crypto 2024/Blind Signatures.mp4  27.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Multi Key Homomorphic Authenticators.mp4  27.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Symbolic Encryption with Pseudorandom Keys.mp4  27.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Award paper session Hybrid code lifting.mp4  27.1 MB
 
                
                    - Crypto/Crypto 2023/Quantum Protocols 2.mp4  27.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4  27.1 MB
 
                
                    - Workshops/CFAIL 2021/Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.mp4  27.1 MB
 
                
                    - Crypto/Crypto 2023/Post-Quantum ZK 2.mp4  27.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Contact Tracing.mp4  27.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4  27.0 MB
 
                
                    - Crypto/Crypto 2023/Quantum Cryptography 2.mp4  27.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Levchin Prize ceremony.mp4  26.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Quantum Crypto.mp4  26.9 MB
 
                
                    - Crypto/Crypto 2023/MPC - Emerging Models 1.mp4  26.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/The Discrete-Logarithm Problem with Preprocessing.mp4  26.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Efficient MPC Constructions.mp4  26.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Opening remarks and Best Paper Award talk.mp4  26.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.mp4  26.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.mp4  26.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Security Cryptography Implementations in Embedded Systems, Part 2.mp4  26.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.mp4  26.8 MB
 
                
                    - IACR Distinguished Lectures/The future of cryptography.mp4  26.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.mp4  26.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.mp4  26.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Jeremiah Blocki.mp4  26.7 MB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 talks part I.mp4  26.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.mp4  26.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.mp4  26.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.mp4  26.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.mp4  26.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/HW Security III.mp4  26.6 MB
 
                
                    - Workshops/TASER 2021/An overview of security topics within RISC-V, by Helena Handschuh.mp4  26.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/ignatures.mp4  26.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Tight Security Bounds for Micali’s SNARGs.mp4  26.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/QcBits constant time small key code based cryptography.mp4  26.5 MB
 
                
                    - Crypto/Crypto 2023/Quantum Protocols 1.mp4  26.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Private web search.mp4  26.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Depth Robust Graphs and Their Cumulative Memory Complexity.mp4  26.5 MB
 
                
                    - Crypto/Crypto 2021/Lattice Cryptography.mp4  26.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/New Techniques for Obfuscating Conjunctions.mp4  26.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Real World Cryptography.mp4  26.4 MB
 
                
                    - Crypto/Crypto 2016/Fine grained Cryptography.mp4  26.4 MB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.mp4  26.4 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 invited talk I by Sanjam Garg.mp4  26.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia.mp4  26.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Revisiting Non-Malleable Secret Sharing.mp4  26.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Simple Proofs of Sequential Work.mp4  26.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Securing Cryptography Implementations in Embedded Systems, part I.mp4  26.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.mp4  26.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Functional Encryption and Attributed-based Encryption.mp4  26.3 MB
 
                
                    - Crypto/Crypto 2018/A New Public Key Cryptosystem via Mersenne Numbers.mp4  26.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Invited talk by Jian Guo.mp4  26.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Anonymity Surveillance and Tampering.mp4  26.2 MB
 
                
                    - Crypto/Crypto 2023/Sublinear Proofs.mp4  26.2 MB
 
                
                    - Crypto/Crypto 2018/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.mp4  26.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4  26.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Masking (Faults).mp4  26.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Oblivious Transfer.mp4  26.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/zero knowledge 1.mp4  26.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/A faulty PRNG in a voting system - Kristian Gjosteen.mp4  26.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Masking Post-Quantum Cryptography II.mp4  26.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-22 Routing, Signatures, Commitments, Timelock.mp4  26.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Fully Homomorphic Encryption (cont.).mp4  26.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Cache Attacks Enable Bulk Key Recovery on the Cloud.mp4  26.0 MB
 
                
                    - Crypto/Crypto 2023/Provably Secure Symmetric Constructions 1.mp4  26.0 MB
 
                
                    - Crypto/Crypto 2017/A Formal Treatment of Multi key Channels.mp4  26.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.mp4  25.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Carmela Troncoso.mp4  25.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4  25.9 MB
 
                
                    - Crypto/Crypto 2018/Indifferentiable Authenticated Encryption.mp4  25.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Locality-Preserving Oblivious RAM.mp4  25.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Second-Order SCA Security with almost no Fresh Randomness.mp4  25.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).mp4  25.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/HW Security I.mp4  25.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/CoCoA Concurrent Continuous Group Key Agreement.mp4  25.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Leakage and Faults.mp4  25.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/IOPs and Succinctness.mp4  25.6 MB
 
                
                    - Crypto/Crypto 2021/Counterexamples to New Circular Security Assumptions Underlying iO.mp4  25.6 MB
 
                
                    - Crypto/Crypto 2023/ZK Based on DL 1.mp4  25.6 MB
 
                
                    - Crypto/Crypto 2016/A Practical Cryptanalysis of the Algebraic Eraser.mp4  25.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4  25.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Secrets at Scale - Manish Mehta (Netflix).mp4  25.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Antikernel A Decentralized Secure Hardware Software Operating System.mp4  25.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Reactive Garbling Foundation, Instantiation, Application.mp4  25.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Consensus Through Herding.mp4  25.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Selective Opening Security from Simulatable Data Encapsulation.mp4  25.5 MB
 
                
                    - Crypto/Crypto 2017/PRF ODH - Relations, Instantiations, and Impossibility Results.mp4  25.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.mp4  25.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4  25.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.mp4  25.4 MB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 Round Table 4 Lessons Learned.mp4  25.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.mp4  25.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/On ELFs, Deterministic Encryption, and Correlated-Input Security.mp4  25.4 MB
 
                
                    - Crypto/Crypto 2023/Isogenies and Applications.mp4  25.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/More SCA.mp4  25.4 MB
 
                
                    - IACR Distinguished Lectures/Tutorial on Homomorphic Encryption (part 2).mp4  25.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.mp4  25.4 MB
 
                
                    - Crypto/Crypto 2023/Quantum Cryptography 1.mp4  25.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.mp4  25.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On the Multi-User Security of Short Schnorr Signatures with Preprocessing.mp4  25.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Multi-Party Computation 1.mp4  25.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Non-Malleable Codes Against Bounded Polynomial Time Tampering.mp4  25.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/TRNG.mp4  25.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/More Efficient Universal Circuit Constructions.mp4  25.2 MB
 
                
                    - Crypto/Crypto 2018/Non Interactive Zero Knowledge Proofs for Composite Statements.mp4  25.2 MB
 
                
                    - Crypto/Crypto 2017/Middle Product Learning With Errors.mp4  25.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Eli Ben-Sasson.mp4  25.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Symmetric Design 2 (cont.).mp4  25.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Verifiable Functional Encryption.mp4  25.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).mp4  25.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Implementation of Linear Layers.mp4  25.1 MB
 
                
                    - Crypto/Crypto 2018/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.mp4  25.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.mp4  25.0 MB
 
                
                    - Workshops/PPML 2021/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.mp4  25.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Full state keyed duplex with built in multi user support.mp4  25.0 MB
 
                
                    - Crypto/Crypto 2018/Verifiable Delay Functions.mp4  25.0 MB
 
                
                    - Workshops/TASER 2021/RISC-V cryptography extensions current status and future plans, Ben Marshall.mp4  25.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Fault Resistance II.mp4  25.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Cryptography with Updates.mp4  24.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Block Cipher Cryptanalysis I.mp4  24.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Masking (Symmetric).mp4  24.9 MB
 
                
                    - Crypto/Crypto 2023/Succinctness 4.mp4  24.9 MB
 
                
                    - Crypto/Crypto 2016/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.mp4  24.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/vatiCAN Vetted, Authenticated CAN Bus.mp4  24.9 MB
 
                
                    - Crypto/Crypto 2024/Award ceremony.mp4  24.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/rump session 1.mp4  24.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric Key Cryptanalysis - Automated Tools - talk 1 3.mp4  24.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Secret-Sharing Schemes for General and Uniform Access Structures.mp4  24.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Differential Computation Analysis Hiding your White Box Designs is Not Enough.mp4  24.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.mp4  24.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-9 Zero Knowledge and Proof Systems.mp4  24.7 MB
 
                
                    - Crypto/Crypto 2024/Theoretical Foundations 1.mp4  24.7 MB
 
                
                    - Crypto/Crypto 2023/Provably Secure Symmetric Constructions 2.mp4  24.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Breaking the Sub Exponential Barrier in Obfustopia.mp4  24.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.mp4  24.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Quantum Lightning Never Strikes the Same State Twice.mp4  24.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.mp4  24.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4  24.5 MB
 
                
                    - Crypto/Crypto 2011/Tor and Circumvention - Lessons Learned, by Roger Dingledine.mp4  24.5 MB
 
                
                    - Crypto/Crypto 2017/Amortization with Fewer Equations for Proving Knowledge of Small Secrets.mp4  24.5 MB
 
                
                    - Crypto/Crypto 2023/Symmetric Design.mp4  24.5 MB
 
                
                    - Crypto/Crypto 2023/MPC - Emerging Models 2.mp4  24.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/An Analysis of Signal's PQXDH.mp4  24.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/From 5 pass MQ based identification to MQ based signatures.mp4  24.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Boomerang and Rectangle Attacks 1.mp4  24.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/New Constructions 2.mp4  24.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Faster Algorithms for Isogeny Problems using Torsion Point Images.mp4  24.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4  24.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Persistent Fault Analysis on Block Ciphers.mp4  24.3 MB
 
                
                    - Crypto/Crypto 2017/A New Approach to Round Optimal Secure Multiparty Computation.mp4  24.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Efficient Ring Signatures in the Standard Model.mp4  24.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Multi-Party Functional Encryption.mp4  24.1 MB
 
                
                    - Workshops/WAC 2021 4/Fault Attacks on CCA-secure Lattice KEMs.mp4  24.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Award paper session Mind your path.mp4  24.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Leakage.mp4  24.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.mp4  24.1 MB
 
                
                    - Crypto/Crypto 2016/Lightweight Multiplication in GF2n with Applications to MDS Matrices.mp4  24.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Multiparty Computation.mp4  24.1 MB
 
                
                    - Crypto/Crypto 2022/Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.mp4  24.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.mp4  24.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.mp4  24.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.mp4  24.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.mp4  23.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Composability, Consensus, and Byzantine Agreement.mp4  23.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/What Does Privacy Mean for Stock Trading.mp4  23.9 MB
 
                
                    - Workshops/Unsorted/Weaknesses in the Moscow Internet voting system.mp4  23.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.mp4  23.9 MB
 
                
                    - Crypto/Crypto 2021/Quantum Cryptography 1.mp4  23.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.mp4  23.9 MB
 
                
                    - Crypto/Crypto 2017/Hedging Public Key Encryption in the Real World.mp4  23.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Selective Opening Security in the Presence of Randomness Failures.mp4  23.8 MB
 
                
                    - Crypto/Crypto 2021/Multi-Party Computation 3.mp4  23.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Formal Analysis.mp4  23.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Sponge and Duplex.mp4  23.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Distributional Collision Resistance Beyond One-Way Functions.mp4  23.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Welcome - PQC I (Embedded).mp4  23.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.mp4  23.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Strengthening Access Control Encryption.mp4  23.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Towards robust FHE for the real world.mp4  23.7 MB
 
                
                    - Crypto/Crypto 2019/Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.mp4  23.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.mp4  23.7 MB
 
                
                    - Crypto/Crypto 2017/Bitcoin as a Transaction Ledger - A Composable Treatment.mp4  23.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Coded BKW with Sieving.mp4  23.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Faults, Tampering and Non-Malleability.mp4  23.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/STIR SHAKEN A Looming Privacy Disaster.mp4  23.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/How can cryptography help with AI regulation compliance.mp4  23.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.mp4  23.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Faster Secure Two Party Computation in the Single Execution Setting.mp4  23.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/On the Difficulty of FSM based Hardware Obfuscation.mp4  23.6 MB
 
                
                    - Crypto/Crypto 2017/Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.mp4  23.6 MB
 
                
                    - Crypto/Crypto 2019/Nonces Are Noticed AEAD Revisited.mp4  23.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Authenticated Encryption with Variable Stretch.mp4  23.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/Best Paper.mp4  23.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.mp4  23.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Conditional Cube Attack on Reduced Round Keccak Sponge Function.mp4  23.5 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 4.mp4  23.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Key Assignment Scheme with Authenticated Encryption.mp4  23.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.mp4  23.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Embedding the UC Model into the IITM Model.mp4  23.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/2023 Levchin Prize.mp4  23.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Homomorphic Encryption II.mp4  23.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Lattice Cryptanalysis.mp4  23.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Signature Schemes 1 (cont.).mp4  23.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.mp4  23.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/On the Success Probability of Solving Unique SVP via BKZ.mp4  23.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 rump session part I.mp4  23.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Non Linear Layers.mp4  23.3 MB
 
                
                    - Crypto/Crypto 2018/Fast Correlation Attack Revisted.mp4  23.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Chain Reductions for Multi-Signatures and the HBMS Scheme.mp4  23.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).mp4  23.2 MB
 
                
                    - Crypto/Crypto 2019/Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.mp4  23.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Continuous Non-Malleable Codes in the 8-Split-State Model.mp4  23.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.mp4  23.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Formal Abstractions for Attested Execution Secure Processors.mp4  23.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.mp4  23.2 MB
 
                
                    - Crypto/Crypto 2016/Indifferentiability of 8 Round Feistel Networks.mp4  23.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.mp4  23.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Symmetric I.mp4  23.2 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 1 (part I).mp4  23.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Computational integrity with a public random string from quasi linear PCPs.mp4  23.1 MB
 
                
                    - Crypto/Crypto 2023/Succinctness 3.mp4  23.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Two Round PAKE from Approximate SPH and Instantiations from Lattices.mp4  23.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.mp4  23.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Masking the GLP Lattice-Based Signature Scheme at Any Order.mp4  23.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4  23.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Attribute-based Encryption and Friends (cont.).mp4  23.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Obfuscated Key Exchange.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2023/Random Oracle 2.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2023/Secure Messaging 1.mp4  23.0 MB
 
                
                    - Workshops/WAC 2020 3/BIAS - KNOB attack against Bluetooth.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2023/ORAM 2.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2018/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2019/Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.mp4  23.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.mp4  23.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Removing the Strong RSA Assumption from Arguments over the Integers.mp4  23.0 MB
 
                
                    - Crypto/Crypto 2018/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.mp4  23.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Engineering Code Obfuscation.mp4  23.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/PQC V (SCA).mp4  23.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Anonymous, Robust Post-Quantum Public Key Encryption.mp4  22.9 MB
 
                
                    - Crypto/Crypto 2018/Round Optimal Secure Multiparty Computation with Honest Majority.mp4  22.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/SCA (μArch).mp4  22.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Private Puncturable PRFs From Standard Lattice Assumptions.mp4  22.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.mp4  22.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Founding Secure Computation on Blockchains.mp4  22.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/On the end to end security of group chats - Paul Rösler (U. Bochum).mp4  22.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Tancrede Lepoint.mp4  22.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Forward Secret Encrypted RAM Lower Bounds and Applications.mp4  22.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.mp4  22.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.mp4  22.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Updates on Standardization.mp4  22.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).mp4  22.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Compact NIZKs from Standard Assumptions on Bilinear Maps.mp4  22.8 MB
 
                
                    - Crypto/Crypto 2016/New Insights on AES Like SPN Ciphers.mp4  22.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Panel Discussion on Allyship and Inclusion.mp4  22.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.mp4  22.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Uncovering Algebraic Structures in the MPC Landscape.mp4  22.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Homomorphic Encryption for Arithmetic of Approximate Numbers.mp4  22.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Rhythmic Keccak - SCA Security and Low Latency in HW.mp4  22.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Linear Repairing Codes and Side Channel Attacks.mp4  22.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.mp4  22.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.mp4  22.7 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 rump session part IV.mp4  22.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Universal Composition with Responsive Environments.mp4  22.6 MB
 
                
                    - Crypto/Crypto 2020/Post Quantum Crypto 2.mp4  22.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Efficient and Provable White Box Primitives.mp4  22.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Quantum Security Analysis of CSIDH.mp4  22.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Tightly secure signatures from five move identification protocols.mp4  22.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Partitions in the S-Box of Streebog and Kuznyechik.mp4  22.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Physical Emissions.mp4  22.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Masking (PQC).mp4  22.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Traitor Tracing Schemes.mp4  22.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Non-malleable Commitments and Obfuscation.mp4  22.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-10 Ask Me Anything (AMA) with Tanja Lange.mp4  22.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Kummer for Genus One over Prime Order Fields.mp4  22.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/PQC III (HW).mp4  22.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.mp4  22.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Machine Learning.mp4  22.3 MB
 
                
                    - Workshops/TASER 2021/CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.mp4  22.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/On the Exact Round Complexity of Self Composable Two Party Computation.mp4  22.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Evan Jeffrey.mp4  22.3 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 contributed talks I.mp4  22.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On the Concrete Security of TLS 1.3 PSK Mode.mp4  22.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.mp4  22.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.mp4  22.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.mp4  22.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Clustering Related-Tweak Characteristics Application to MANTIS-6.mp4  22.3 MB
 
                
                    - Workshops/Unsorted/Pseudorandom Black Swans Cache Attacks on CTR DRBG.mp4  22.3 MB
 
                
                    - Crypto/Crypto 2021/Lower bounds on lattice sieving and information set decoding.mp4  22.2 MB
 
                
                    - Crypto/Crypto 2019/Synchronous, with a Chance of Partition Tolerance.mp4  22.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.mp4  22.1 MB
 
                
                    - Crypto/Crypto 2019/Simple Proofs of Space-Time and Rational Proofs of Storage.mp4  22.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Glitches.mp4  22.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.mp4  22.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Asymmetric PAKE with low computation and communication.mp4  22.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/How Fast Can Higher Order Masking Be in Software.mp4  22.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.mp4  22.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.mp4  22.0 MB
 
                
                    - Crypto/Crypto 2016/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.mp4  22.0 MB
 
                
                    - Crypto/Crypto 2021/Quantum Cryptography 1 (continued).mp4  22.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/SCA (Power).mp4  22.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/RWC 2021 Lightning talks.mp4  21.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.mp4  21.9 MB
 
                
                    - Crypto/Crypto 2021/Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.mp4  21.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.mp4  21.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.mp4  21.9 MB
 
                
                    - Crypto/Crypto 2016/Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.mp4  21.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.mp4  21.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Cryptanalyses of Candidate Branching Program Obfuscators.mp4  21.8 MB
 
                
                    - Crypto/Crypto 2019/Watermarking Public-Key Cryptographic Primitives.mp4  21.8 MB
 
                
                    - IACR Distinguished Lectures/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4  21.7 MB
 
                
                    - Crypto/Crypto 2011/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).mp4  21.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Single-Server Private Information Retrieval with Sublinear Amortized Time.mp4  21.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Software implementation of Koblitz curves over quadratic fields.mp4  21.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Efficient Perfectly Secure Computation with Optimal Resilience.mp4  21.7 MB
 
                
                    - Crypto/Crypto 2023/MPC Round Efficiency 2.mp4  21.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/An Efficient Pairing Based Shuffle Argument.mp4  21.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.mp4  21.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/PQC IV High-end.mp4  21.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Threshold Ring Signatures New Definitions and Post-quantum Security.mp4  21.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Faults (PQC).mp4  21.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Efficient Lattice-Based Inner-Product Functional Encryption.mp4  21.6 MB
 
                
                    - Crypto/Crypto 2021/A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.mp4  21.6 MB
 
                
                    - Crypto/Crypto 2023/Succinctness 2.mp4  21.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.mp4  21.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Block Cipher Cryptanalysis II.mp4  21.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Oblivious Transfer (cont.).mp4  21.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.mp4  21.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/A High-Performance Enterprise System for Key Management.mp4  21.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.mp4  21.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.mp4  21.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Short Stickelberger Class Relations and application to Ideal SVP.mp4  21.5 MB
 
                
                    - Workshops/CFAIL 2021/on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.mp4  21.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/How to Generate and use Universal Samplers.mp4  21.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.mp4  21.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/A Note on Perfect Correctness by Derandomization.mp4  21.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Classical vs Quantum Random Oracles.mp4  21.4 MB
 
                
                    - Crypto/Crypto 2020/Scalable Pseudorandom Quantum States.mp4  21.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Injection Attacks Against End-to-End Encrypted Applications.mp4  21.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/A Tutorial on High Performance Computing Applied to Cryp.mp4  21.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Post-Quantum Multi-Party Computation.mp4  21.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.mp4  21.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.mp4  21.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Multiplicative Masking for AES in Hardware.mp4  21.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Revisiting Lattice Attacks on overstretched NTRU parameters.mp4  21.3 MB
 
                
                    - Crypto/Crypto 2021/Towards faster polynomial-time lattice reduction.mp4  21.2 MB
 
                
                    - Crypto/Crypto 2014/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.mp4  21.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Statistical Witness Indistinguishability (and more) in Two Messages.mp4  21.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Random-Index PIR and Applications.mp4  21.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.mp4  21.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/An Efficiency-Preserving Transformation from.mp4  21.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Nonlinear Approximations in Cryptanalysis Revisited.mp4  21.1 MB
 
                
                    - Workshops/WAC 2021 4/Partitioning Oracle Attacks.mp4  21.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Bootstrapping.mp4  21.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.mp4  21.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/(Zero-Knowledge) Proofs 1 (cont).mp4  21.0 MB
 
                
                    - Crypto/Crypto 2016/FHE Circuit Privacy Almost For Free.mp4  21.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/HW Security II.mp4  21.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Constrain't hiding constrained PRFs for NC1 from LWE.mp4  21.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.mp4  21.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Efficient MPC Constructions (cont.).mp4  20.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/On Quantum Advantage in Information Theoretic Single-Server PIR.mp4  20.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Secure Quantum Computation with Classical Communication.mp4  20.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Differential Trail Search and Bounds 2.mp4  20.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.mp4  20.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Revisiting the functional bootstrap in TFHE.mp4  20.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Short generators without quantum computers the case of multiquadratics.mp4  20.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.mp4  20.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Invited talk I by Bart Preneel.mp4  20.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4  20.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/ECC.mp4  20.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Another Look at Provable Security.mp4  20.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Proofs for Inner Pairing Products and Applications.mp4  20.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Covert Learning How to Learn with an Untrusted Intermediary.mp4  20.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.mp4  20.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Incremental Proofs of Sequential Work.mp4  20.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Access Control Encryption for General Policies from Standard Assumptions.mp4  20.7 MB
 
                
                    - Crypto/Crypto 2018/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.mp4  20.6 MB
 
                
                    - Crypto/Crypto 2018/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.mp4  20.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.mp4  20.6 MB
 
                
                    - Crypto/Crypto 2016/Towards Sound Fresh Re Keying with Hard Physical Learning Problems.mp4  20.6 MB
 
                
                    - Workshops/WAC 2021 4/Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).mp4  20.6 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 1 (part I).mp4  20.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.mp4  20.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.mp4  20.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Attacks only Get Better How to Break FF3 on Large Domains.mp4  20.6 MB
 
                
                    - Crypto/Crypto 2015/New Attacks on Feistel Structures with Improved Memory Complexities.mp4  20.6 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks II (part III).mp4  20.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.mp4  20.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Homomorphic Secret Sharing from Lattices Without FHE.mp4  20.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.mp4  20.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Differential Privacy.mp4  20.5 MB
 
                
                    - Crypto/Crypto 2016/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.mp4  20.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.mp4  20.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.mp4  20.5 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 rump session part V.mp4  20.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Encryption.mp4  20.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.mp4  20.4 MB
 
                
                    - Crypto/Crypto 2020/Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.mp4  20.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Optimal Tightness for Chain-Based Unique Signatures.mp4  20.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.mp4  20.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.mp4  20.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.mp4  20.4 MB
 
                
                    - Crypto/Crypto 2021/Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.mp4  20.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Saber on ARM - CCA secure module lattice based key encapsulation on ARM.mp4  20.4 MB
 
                
                    - Crypto/Crypto 2016/ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.mp4  20.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Best Paper Award.mp4  20.3 MB
 
                
                    - Crypto/Crypto 2021/Low-Complexity Cryptography.mp4  20.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Secure Non-interactive Simulation Feasibility - & Rate.mp4  20.3 MB
 
                
                    - Crypto/Crypto 2018/Limits of Practical Sublinear Secure Computation.mp4  20.3 MB
 
                
                    - Crypto/Crypto 2019/Match Me if You Can Matchmaking Encryption and Its Applications.mp4  20.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Yoyo Tricks with AES.mp4  20.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Invited talk by Iftach Haitner.mp4  20.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Symmetric II - closing remarks.mp4  20.3 MB
 
                
                    - Crypto/Crypto 2018/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.mp4  20.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 rump session part III.mp4  20.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Disappearing Cryptography in the Bounded Storage Model.mp4  20.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Computing generator in cyclotomic integer rings.mp4  20.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/The One-More Discrete Logarithm Assumption in the Generic Group Model.mp4  20.2 MB
 
                
                    - Crypto/Crypto 2020/Multiparty Computation 2.mp4  20.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.mp4  20.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Efficient Verifiable Delay Functions.mp4  20.2 MB
 
                
                    - Crypto/Crypto 2013/Counter-Cryptanalysis.mp4  20.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Multi-Party Threshold Private Set Intersection with Sublinear Communication.mp4  20.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Inconsistency of Simulation and Practice in Delay-based Strong PUFs.mp4  20.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/A New Approach to Black-Box Concurrent Secure Computation.mp4  20.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.mp4  20.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.mp4  20.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Humans, Policy, and Crypto.mp4  20.1 MB
 
                
                    - Workshops/WAC 2022 5/WAC5 2022 Session 3 (part II).mp4  20.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/PQC VI (Speed).mp4  20.1 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Grafting Key Trees Efficient Key Management for Overlapping Groups.mp4  20.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/A Quantum-Proof Non-malleable Extractor.mp4  20.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Raluca Ada Popa.mp4  20.1 MB
 
                
                    - Crypto/Crypto 2021/Foundations.mp4  20.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/On the Integer Polynomial Learning with Errors Problem.mp4  20.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.mp4  20.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Public Seed Pseudorandom Permutations.mp4  20.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Improved Private Set Intersection against Malicious Adversaries.mp4  20.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Computationally Volume-Hiding Structured Encryption.mp4  20.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.mp4  19.9 MB
 
                
                    - Crypto/Crypto 2021/On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.mp4  19.9 MB
 
                
                    - Crypto/Crypto 2013/Highly-Scalable Searchable Symmetric Encryption with Sup.mp4  19.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/More Efficient Protocols for Post-Quantum Secure Messaging.mp4  19.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Trojan-Resilience without Cryptography.mp4  19.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Homomorphic Encryption I.mp4  19.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Two-Round Multiparty Secure Computation from Minimal Assumptions.mp4  19.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Adaptively Secure Computation for RAM Programs.mp4  19.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.mp4  19.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Christian Cachin.mp4  19.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Private Hierarchical Governance for Encrypted Messaging.mp4  19.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Towards Low Energy Stream Ciphers.mp4  19.8 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 3 (part II).mp4  19.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Helena Handschuh.mp4  19.7 MB
 
                
                    - Crypto/Crypto 2018/Combiners for Backdoored Random Oracles.mp4  19.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Hugo Krawczyk.mp4  19.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.mp4  19.7 MB
 
                
                    - Crypto/Crypto 2021/Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.mp4  19.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).mp4  19.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.mp4  19.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Hardware Masking, Revisited.mp4  19.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/On Recovering Affine Encodings in White Box Implementations.mp4  19.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Batching Base Oblivious Transfers.mp4  19.6 MB
 
                
                    - Crypto/Crypto 2019/Efficient Collision Attack Frameworks for RIPEMD-160.mp4  19.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Strong 8 bit Sboxes with Efficient Masking in Hardware.mp4  19.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.mp4  19.6 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 4 (part II).mp4  19.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Improved Bootstrapping for Approximate Homomorphic Encryption.mp4  19.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.mp4  19.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A Fast and Simple Partially Oblivious PRF, with Applications.mp4  19.5 MB
 
                
                    - Crypto/Crypto 2020/Multiparty Generation of an RSA Modulus.mp4  19.5 MB
 
                
                    - Workshops/WAC 2020 3/Session IV Attacks on Standards.mp4  19.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Order-C Secure Multiparty Computation for Highly Repetitive Circuits.mp4  19.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Award talks.mp4  19.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.mp4  19.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/The Multi User Security of Double Encryption.mp4  19.5 MB
 
                
                    - Crypto/Crypto 2021/Time- and Space-Efficient Arguments from Groups of Unknown Order.mp4  19.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Leakage Resilience.mp4  19.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/On the Boomerang Uniformity of Cryptographic Sboxes.mp4  19.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Dynamic Ad Hoc Clock Synchronization.mp4  19.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Masking AES with d1 Shares in Hardware.mp4  19.4 MB
 
                
                    - Crypto/Crypto 2013/Everlasting Multi-party Computation.mp4  19.4 MB
 
                
                    - Crypto/Crypto 2020/Dynamic Decentralized Functional Encryption.mp4  19.4 MB
 
                
                    - Crypto/Crypto 2018/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.mp4  19.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Impossibility Results for Lattice-Based Functional Encryption Schemes.mp4  19.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Smashing the Implementation Records of AES S box.mp4  19.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.mp4  19.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Families of SNARK-friendly 2-chains of elliptic curves.mp4  19.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.mp4  19.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4  19.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.mp4  19.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.mp4  19.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.mp4  19.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Concrete quantum cryptanalysis of binary elliptic curves.mp4  19.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Anna Lysyanskaya.mp4  19.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.mp4  19.2 MB
 
                
                    - Crypto/Crypto 2015/Cryptography, Security, and Public Safety A Policy Perspective.mp4  19.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.mp4  19.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.mp4  19.1 MB
 
                
                    - Crypto/Crypto 2019/Strong Asymmetric PAKE Based on Trapdoor CKEM.mp4  19.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/A kilobit hidden SNFS discrete logarithm computation.mp4  19.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.mp4  19.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.mp4  19.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Advancements and Future Directions in Secure Messaging with MLS and MIMI.mp4  19.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.mp4  19.1 MB
 
                
                    - Workshops/WAC 2022 5/WAC5 2022 Session 4 (part II).mp4  19.1 MB
 
                
                    - Crypto/Crypto 2017/The TinyTable protocol or - Gate scrambling Revisited.mp4  19.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.mp4  19.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.mp4  19.0 MB
 
                
                    - Crypto/Crypto 2023/Secure Two Party Computation part I.mp4  19.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On the security of ECDSA with additive key derivation and presignatures.mp4  19.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.mp4  19.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Shipping end-to-end encryption to billions.mp4  19.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Building the Next Generation of AEAD.mp4  19.0 MB
 
                
                    - Crypto/Crypto 2021/Secret Sharing.mp4  19.0 MB
 
                
                    - Crypto/Crypto 2015/Multi Identity and Multi Key Leveled FHE from Learning with Errors.mp4  19.0 MB
 
                
                    - Crypto/Crypto 2021/A Logarithmic Lower Bound for Oblivious RAM (for all parameters).mp4  19.0 MB
 
                
                    - Crypto/Crypto 2018/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.mp4  19.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Efficient Scalable Constant Round MPC via Garbled Circuits.mp4  19.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.mp4  18.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Invited talk by Zvika Brakerski.mp4  18.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/An Algebraic Approach to Maliciously Secure Private Set Intersection.mp4  18.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Adaptively Secure Garbling with Near Optimal Online Complexity.mp4  18.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Test of Time Award.mp4  18.9 MB
 
                
                    - IACR Distinguished Lectures/Tutorial on Homomorphic Encryption (part 1).mp4  18.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of Optimal Tightness for Chain-Based Unique Signatures.mp4  18.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Secure Network Coding over the Integers.mp4  18.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Linear Cryptanalysis of DES with Asymmetries.mp4  18.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.mp4  18.9 MB
 
                
                    - Crypto/Crypto 2022 Live/Implicit White Box Implementations White Boxing ARX Ciphers.mp4  18.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Clustering Effect in Simon and Simeck.mp4  18.9 MB
 
                
                    - Crypto/Crypto 2016/Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.mp4  18.8 MB
 
                
                    - Crypto/Crypto 2021/Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Misuse Attacks on Post-quantum Cryptosystems.mp4  18.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Joppe Bos.mp4  18.8 MB
 
                
                    - Crypto/Crypto 2021/DualRing Generic Construction of Ring Signatures with Efficient Instantiations.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Multi-party Virtual State Channels.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/On the Security of Homomorphic Encryption on Approximate Numbers.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/IACR Business meeting, Eurocrypt 2016.mp4  18.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Watermarks for Language Models a Cryptographic Perspective.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Robust transforming combiners from indistinguishability obfuscation to functional encryption.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Reversible Proofs of Sequential Work.mp4  18.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Increasing Precision of Division Property.mp4  18.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Influence of the Linear Layer on the Algebraic Degree in SP-Networks.mp4  18.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.mp4  18.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.mp4  18.7 MB
 
                
                    - Crypto/Crypto 2020/NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.mp4  18.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.mp4  18.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Information-Combining Differential Fault Attacks on DEFAULT.mp4  18.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle.mp4  18.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.mp4  18.7 MB
 
                
                    - Crypto/Crypto 2021/KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.mp4  18.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/The General Sieve Kernel and New Records in Lattice Reduction.mp4  18.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Memory Checking, PIR, and Secret Sharing.mp4  18.7 MB
 
                
                    - Crypto/Crypto 2016/A 270 Attack on the Full MISTY1.mp4  18.6 MB
 
                
                    - Crypto/Crypto 2021/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.mp4  18.6 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 3 (part I).mp4  18.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Rapidly Verifiable XMSS Signatures.mp4  18.6 MB
 
                
                    - Crypto/Crypto 2013/An Algebraic Framework for Diffie-Hellman Assumptions.mp4  18.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Polynomial-time targeted attacks on coin-tossing for any number of corruptions.mp4  18.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.mp4  18.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Welcome to Asiacrypt.mp4  18.5 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 3 (part II).mp4  18.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Efficient Schemes for Committing Authenticated Encryption.mp4  18.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/LLMs can do it better Patching Code for Side-Channel Leakages.mp4  18.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Invited talk II by Sam Jaques.mp4  18.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.mp4  18.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-18 CHES Test-of-Time Award Session.mp4  18.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.mp4  18.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Making Private Function Evaluation Safer, Faster, and Simpler.mp4  18.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Constant-round Blind Classical Verification of Quantum Sampling.mp4  18.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Anonymity 1 - talk 1 4.mp4  18.4 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/session-98 Quantum I.mp4  18.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/The Minimum Number of Cards in Practical Card based Protocols 2-2.mp4  18.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Twisted u4 normal form for elliptic curves.mp4  18.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Software.mp4  18.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-53 Test-of-Time Award - Program Chair Address.mp4  18.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.mp4  18.4 MB
 
                
                    - Crypto/Crypto 2021/Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.mp4  18.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.mp4  18.3 MB
 
                
                    - Crypto/Crypto 2021/Models.mp4  18.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Thai Duong.mp4  18.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Lattices and Codes.mp4  18.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Welcome - RWC steering committee.mp4  18.3 MB
 
                
                    - Crypto/Crypto 2021/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.mp4  18.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Differential Fault Attacks on Deterministic Lattice Signatures.mp4  18.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.mp4  18.3 MB
 
                
                    - Crypto/Crypto 2016/Big Key Symmetric Encryption - Resisting Key Exfiltration.mp4  18.3 MB
 
                
                    - Crypto/Crypto 2021/Multi-Party Computation 2.mp4  18.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/BKW Meets Fourier New Algorithms for LPN with Sparse Parities.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Sublinear Zero Knowledge Arguments for RAM Programs.mp4  18.2 MB
 
                
                    - Crypto/Crypto 2018/Round Optimal Secure Multi Party Computation.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/On Removing Graded Encodings from Functional Encryption.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).mp4  18.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Trevor Perrin.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Lightweight, Maliciously Secure Verifiable Function Secret Sharing.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Highly Efficient OT-Based Multiplication Protocols.mp4  18.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Elaine Shi.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.mp4  18.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/How to Extract Useful Randomness from Unreliable Sources.mp4  18.1 MB
 
                
                    - Crypto/Crypto 2023/Succinctness 1 part II.mp4  18.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.mp4  18.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Jon Millican.mp4  18.1 MB
 
                
                    - Crypto/Crypto 2021/Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.mp4  18.1 MB
 
                
                    - Crypto/Crypto 2018/Trapdoor Functions from the Computational Diffie Hellman Assumption.mp4  18.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.mp4  18.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study.mp4  18.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/From Minicrypt to Obfustopia via Private Key Functional Encryption.mp4  18.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Authentication in the Bounded Storage Model.mp4  18.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Two Round Information-Theoretic MPC with Malicious Security.mp4  18.0 MB
 
                
                    - Crypto/Crypto 2021/Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.mp4  18.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Asymptotically Quasi-Optimal Cryptography.mp4  18.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Round-Optimal Black-Box Protocol Compilers.mp4  18.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.mp4  18.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Zero Knowledge Accumulators and Set Algebra.mp4  18.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/More Accurate Differential Properties of LED64 and Midori64.mp4  18.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Boosting Verifiable Computation on Encrypted Data.mp4  18.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.mp4  18.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Separable Statistics and Multidimensional Linear Cryptanalysis.mp4  18.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.mp4  18.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.mp4  17.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.mp4  17.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.mp4  17.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Diving Deep into the Weak Keys of Round Reduced Ascon.mp4  17.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.mp4  17.9 MB
 
                
                    - Crypto/Crypto 2019/Proofs of Replicated Storage Without Timing Assumptions.mp4  17.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Levchin Award Ceremony.mp4  17.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Faster Evaluation of SBoxes via Common Shares.mp4  17.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Dismantling the AUT64 Automotive Cipher.mp4  17.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.mp4  17.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Searchable Encryption & Updatable Encryption - talk 1 4.mp4  17.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.mp4  17.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Updateable Inner Product Argument with Logarithmic Verifier and Applications.mp4  17.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Decentralized Anonymous Micropayments.mp4  17.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Paul Grubbs.mp4  17.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.mp4  17.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.mp4  17.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Watermarking PRFs against Quantum Adversaries.mp4  17.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.mp4  17.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.mp4  17.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On Actively-Secure Elementary MPC Reductions.mp4  17.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Bandwidth-Efficient Threshold EC-DSA.mp4  17.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4  17.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Fuzzy Password-Authenticated Key Exchange.mp4  17.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.mp4  17.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Stefano Tessaro.mp4  17.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn.mp4  17.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Unconditional UC Secure Computation with Stronger Malicious PUFs.mp4  17.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.mp4  17.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Non-malleable Randomness Encoders and Their Applications.mp4  17.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Towards Understanding the Known-Key Security of Block Ciphers.mp4  17.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/libInterMAC Beyond Confidentiality and Integrity in Practice.mp4  17.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/The Danish Crypto Choir - Don't Worry, Be Happy.mp4  17.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC Test of Time Awards.mp4  17.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Efficient Leakage-Resilient MACs without Idealized Assumptions.mp4  17.5 MB
 
                
                    - Crypto/Crypto 2021/Targeted Lossy Functions and Applications.mp4  17.5 MB
 
                
                    - Workshops/TASER 2021/Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.mp4  17.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Atom A Stream Cipher with Double Key Filter.mp4  17.5 MB
 
                
                    - Crypto/Crypto 2020/Cryptanalysis of LEDAcrypt.mp4  17.5 MB
 
                
                    - Crypto/Crypto 2021/Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On Succinct Non-Interactive Arguments in Relativized Worlds.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.mp4  17.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Invited talk by Vanessa Teague.mp4  17.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Standard Lattice Based Key Encapsulation on Embedded Devices.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Adaptively Secure Identity-Based Encryption from Lattices with.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/On the Streaming Indistinguishability of a Random Permutation and a Random Function.mp4  17.4 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Secure Software Leasing Without Assumptions.mp4  17.4 MB
 
                
                    - Workshops/TASER 2021/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.mp4  17.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Obfustopia Built on Secret-Key Functional Encryption.mp4  17.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.mp4  17.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Triangulating Rebound Attack on AES like Hashing.mp4  17.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Online-Extractability in the Quantum Random-Oracle Model.mp4  17.3 MB
 
                
                    - Crypto/Crypto 2020/Handling Adaptive Compromise for Practical Encryption Schemes.mp4  17.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.mp4  17.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Generic Low Latency Masking in Hardware.mp4  17.3 MB
 
                
                    - Workshops/TASER 2021/Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.mp4  17.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Strong Machine Learning Attack against PUFs with No Mathematical Model.mp4  17.3 MB
 
                
                    - Crypto/Crypto 2015/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.mp4  17.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Non-Malleable Time-Lock Puzzles and Applications.mp4  17.3 MB
 
                
                    - Crypto/Crypto 2013/Real Time Cryptanalysis of Bluetooth Encryption with Con.mp4  17.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Moti Yung.mp4  17.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/bison Instantiating the Whitened Swap-Or-Not Construction.mp4  17.2 MB
 
                
                    - Crypto/Crypto 2021/Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.mp4  17.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.mp4  17.2 MB
 
                
                    - Crypto/Crypto 2021/Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction.mp4  17.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.mp4  17.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved Security Bound of (E D)WCDM.mp4  17.2 MB
 
                
                    - Crypto/Crypto 2021/Subquadratic SNARGs in the Random Oracle Model.mp4  17.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar.mp4  17.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.mp4  17.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Smashing WEP in a Passive Attack.mp4  17.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Ben Kreuter.mp4  17.1 MB
 
                
                    - Crypto/Crypto 2021/Linear Cryptanalysis of FF3-1 and FEA.mp4  17.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Approx-SVP in Ideal Lattices with Pre-processing.mp4  17.1 MB
 
                
                    - Crypto/Crypto 2020/Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.mp4  17.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.mp4  17.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/On the Existence of Three Round Zero-Knowledge Proofs.mp4  17.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Candidate iO From Homomorphic Encryption Schemes.mp4  17.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Candidate Obfuscation via Oblivious LWE Sampling.mp4  17.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Tight Time-Memory Trade-Offs for Symmetric Encryption.mp4  17.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.mp4  17.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.mp4  17.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.mp4  17.0 MB
 
                
                    - Crypto/Crypto 2020/Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.mp4  17.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.mp4  17.0 MB
 
                
                    - Crypto/Crypto 2020/Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.mp4  17.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/MDS Matrices with Lightweight Circuits.mp4  17.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.mp4  17.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Quantum Key-length Extension.mp4  16.9 MB
 
                
                    - Crypto/Crypto 2021/Witness Authenticating NIZKs and Applications.mp4  16.9 MB
 
                
                    - Crypto/Crypto 2017/Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.mp4  16.9 MB
 
                
                    - Crypto/Crypto 2013/New Techniques for SPHFs and Efficient One-Round PAKE Pr.mp4  16.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-23 Rump Session.mp4  16.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Faster Cofactorization with ECM Using Mixed Representations.mp4  16.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.mp4  16.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Secure Non-Interactive Reduction and Spectral Analysis of Correlations.mp4  16.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.mp4  16.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.mp4  16.8 MB
 
                
                    - Crypto/Crypto 2020/Interactive Proofs for Social Graphs.mp4  16.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Private Join and Compute from PIR with Default.mp4  16.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.mp4  16.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Decentralized Multi-Authority ABE for DNFs from LWE.mp4  16.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.mp4  16.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/New Bleichenbacher Records - Fault Attacks on qDSA Signatures.mp4  16.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.mp4  16.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Patrick Longa.mp4  16.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Masking Kyber First- and Higher-Order Implementations.mp4  16.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.mp4  16.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Lattice-based Signatures with Tight Adaptive Corruptions and More.mp4  16.7 MB
 
                
                    - Workshops/ACS 2019/Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.mp4  16.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Leakage Detection with the x2 Test.mp4  16.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/The More The Merrier Reducing the Cost of Large Scale MPC.mp4  16.7 MB
 
                
                    - Crypto/Crypto 2015/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.mp4  16.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Sharon Goldberg.mp4  16.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Gadgets I.mp4  16.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Astrolabous A Universally Composable Time Lock Encryption Scheme.mp4  16.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.mp4  16.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.mp4  16.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/An Instruction Set Extension to Support Software-Based Masking.mp4  16.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Traceable PRFs Full Collusion Resistance and Active Security.mp4  16.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.mp4  16.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Ad Hoc PSM Protocols Secure Computation without Coordination.mp4  16.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Functional Encryption 1 - talk 3 4.mp4  16.6 MB
 
                
                    - Crypto/Crypto 2015/Secure Computation with Minimal Interaction, Revisited.mp4  16.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Concurrent Composition of Differential Privacy.mp4  16.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Side-channel Masking with Pseudo-Random Generator.mp4  16.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.mp4  16.6 MB
 
                
                    - Crypto/Crypto 2018/Tight Tradeoffs in Searchable Symmetric Encryption.mp4  16.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Two-Party Adaptor Signatures From Identification Schemes.mp4  16.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Small CRT Exponent RSA Revisited.mp4  16.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).mp4  16.5 MB
 
                
                    - Crypto/Crypto 2021/Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I.mp4  16.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Mitch Stoltz.mp4  16.5 MB
 
                
                    - Crypto/Crypto 2021/Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.mp4  16.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.mp4  16.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Masking (RISCV).mp4  16.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.mp4  16.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Beyond Birthday Bound Secure MAC in Faulty Nonce Model.mp4  16.5 MB
 
                
                    - Crypto/Crypto 2021/A Compressed Sigma-Protocol Theory for Lattices.mp4  16.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.mp4  16.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Quantum Linearization Attacks.mp4  16.5 MB
 
                
                    - Crypto/Crypto 2020/A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.mp4  16.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Filippo Valsorda and George Tankersley.mp4  16.5 MB
 
                
                    - Workshops/WAC 2021 4/Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.mp4  16.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.mp4  16.4 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL intro and talk I.mp4  16.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Faster Pairing Computations on Curves with High-Degree Twists.mp4  16.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/MOE Multiplication Operated Encryption with Trojan Resilience.mp4  16.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Non-malleable Commitments Against Quantum Attacks.mp4  16.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version Unclonable Polymers and Their Cryptographic Applications.mp4  16.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.mp4  16.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Boomerang Connectivity Table Revisited. Application to SKINNY and AES.mp4  16.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Hashing Garbled Circuits for Free.mp4  16.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Fault Resistance I.mp4  16.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Practical CCA2 Secure and Masked Ring LWE Implementation.mp4  16.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.mp4  16.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Attacks and Security Proofs of EAX-Prime.mp4  16.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.mp4  16.3 MB
 
                
                    - Crypto/Crypto 2014/Security of Symmetric Encryption against Mass Surveillance.mp4  16.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Efficient Circuit-Based PSI with Linear Communication.mp4  16.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.mp4  16.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Black-Box Non-Interactive Non-Malleable Commitments.mp4  16.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Efficient Side Channel Protections of ARX Ciphers.mp4  16.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.mp4  16.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.mp4  16.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.mp4  16.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On Communication Models and Best-Achievable Security in Two-Round MPC.mp4  16.3 MB
 
                
                    - Crypto/Crypto 2021/The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.mp4  16.3 MB
 
                
                    - Crypto/Crypto 2020/Fast reduction of algebraic lattices over cyclotomic fields.mp4  16.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Secure and Efficient Software Masking on Superscalar Pipelined Processors.mp4  16.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-24 Ask Me Anything (AMA) with Fatemeh Ganji.mp4  16.2 MB
 
                
                    - Workshops/WAC 2022 5/WAC5 2022 Session 3 (part I).mp4  16.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.mp4  16.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.mp4  16.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Private Circuits with Quasilinear Randomness.mp4  16.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Non-Interactive Anonymous Router.mp4  16.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/On the Power of Expansion More Efficient Constructions in the Random Probing Model.mp4  16.2 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 2 (part II).mp4  16.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Concurrently composable security with shielded super polynomial simulators.mp4  16.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/FIVER - Robust Verification of Countermeasures against Fault Injections.mp4  16.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.mp4  16.2 MB
 
                
                    - Crypto/Crypto 2020/Alzette a 64-bit ARX-box (feat. CRAX and TRAX).mp4  16.1 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part III).mp4  16.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Faults (Symmetric).mp4  16.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.mp4  16.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.mp4  16.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Lifting Standard Model Reductions to Common Setup Assumptions.mp4  16.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Secure Computation from Elastic Noisy Channels.mp4  16.1 MB
 
                
                    - Crypto/Crypto 2015/Integral Cryptanalysis on Full MISTY1.mp4  16.1 MB
 
                
                    - Crypto/Crypto 2015/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.mp4  16.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.mp4  16.1 MB
 
                
                    - Crypto/Crypto 2020/Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.mp4  16.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.mp4  16.0 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 2 (part I).mp4  16.0 MB
 
                
                    - Crypto/Crypto 2021/Multi-theorem Designated-Verifier NIZK for QMA.mp4  16.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.mp4  16.0 MB
 
                
                    - Crypto/Crypto 2020/Quantifying the Security Cost of Migrating Protocols to Practice.mp4  16.0 MB
 
                
                    - Crypto/Crypto 2021/Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.mp4  16.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili.mp4  16.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/Group-Based Crypto.mp4  16.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Rich Saltz.mp4  16.0 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 3 (part I).mp4  15.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.mp4  15.9 MB
 
                
                    - Crypto/Crypto 2021/Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.mp4  15.9 MB
 
                
                    - Crypto/Crypto 2018/Promise Zero Knowledge and its Applications to Round Optimal MPC.mp4  15.9 MB
 
                
                    - Crypto/Crypto 2021/MuSig2 Simple Two-Round Schnorr Multi-Signatures.mp4  15.9 MB
 
                
                    - Crypto/Crypto 2016/Cryptanalysis of the FLIP Family of Stream Ciphers.mp4  15.9 MB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 program chair report - best video winners.mp4  15.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Side-Channel Protections for Picnic Signatures.mp4  15.9 MB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 Session 1 (part II).mp4  15.9 MB
 
                
                    - Crypto/Crypto 2021/Secret Sharing (continued).mp4  15.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.mp4  15.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Multitarget decryption failure attacks and their application to Saber and Kyber.mp4  15.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.mp4  15.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.mp4  15.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Exact Lattice Sampling from Non-Gaussian Distributions.mp4  15.8 MB
 
                
                    - Crypto/Crypto 2013/Hard-Core Predicates for a Diffie-Hellman Problem over F.mp4  15.8 MB
 
                
                    - Crypto/Crypto 2021/Fluid MPC Secure Multiparty Computation with Dynamic Participants.mp4  15.8 MB
 
                
                    - Workshops/Unsorted/Practical Decryption exFiltration Breaking PDF Encryption.mp4  15.8 MB
 
                
                    - Crypto/Crypto 2021/Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.mp4  15.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Public-Key Puncturable Encryption Modular and Compact Constructions.mp4  15.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Revealing the Weakness of Addition Chain Based Masked SBox Implementations.mp4  15.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Snarky Ceremonies.mp4  15.7 MB
 
                
                    - Crypto/Crypto 2021/Compressing Proofs of k-Out-Of-n Partial Knowledge.mp4  15.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Gadgets II.mp4  15.7 MB
 
                
                    - Crypto/Crypto 2011/A New Variant of PMAC - Beyond the Birthday Bound.mp4  15.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.mp4  15.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Luby-Rackoff Backwards with More Users and More Security.mp4  15.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Improved High Order Conversion From Boolean to Arithmetic Masking.mp4  15.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Related-Key Attacks Against Full Hummingbird-2.mp4  15.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.mp4  15.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.mp4  15.7 MB
 
                
                    - Crypto/Crypto 2015/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.mp4  15.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Time-Memory Analysis of Parallel Collision Search Algorithms.mp4  15.7 MB
 
                
                    - Crypto/Crypto 2013/Homomorphic Encryption from Learning with Errors - Concep.mp4  15.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/On the hardness of the NTRU problem.mp4  15.6 MB
 
                
                    - Crypto/Crypto 2013/How to Run Turing Machines on Encrypted Data.mp4  15.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Secure Software Leasing from Standard Assumptions.mp4  15.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On the Impossibility of Purely Algebraic Signatures.mp4  15.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Post-Quantum Security of the Even-Mansour Cipher.mp4  15.6 MB
 
                
                    - Crypto/Crypto 2021/Thinking Outside the Superbox.mp4  15.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Fault Injection as an Oscilloscope Fault Correlation Analysis.mp4  15.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/High Order Masking of Look up Tables with Common Shares.mp4  15.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.mp4  15.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/I want to encrypt 264 bytes with AES-GCM using a single key.mp4  15.6 MB
 
                
                    - Crypto/Crypto 2020/Order-Fairness for Byzantine Consensus.mp4  15.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2013/On the Indifferentiability of Key-Alternating Ciphers.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2015/Algebriac Decomposition for Probing Security.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2021/SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential.mp4  15.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Catching the Fastest Boomerangs Application to SKINNY.mp4  15.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.mp4  15.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved Preimage Attacks on 4-Round Keccak-224 256.mp4  15.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/PQC II (HW).mp4  15.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2019/Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2023/Side Channels 1 part I.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2021/On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.mp4  15.5 MB
 
                
                    - Crypto/Crypto 2013/Hardness of SIS and LWE with Small Parameters.mp4  15.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.mp4  15.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.mp4  15.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Secure Multiparty Computation with Sublinear Preprocessing.mp4  15.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/KDM Security for the Fujisaki-Okamoto Transformations in the QROM.mp4  15.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Fault Attacks on CCA-secure Lattice KEMs.mp4  15.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Time-Memory Trade-Offs for Near-Collisions.mp4  15.4 MB
 
                
                    - Crypto/Crypto 2013/SNARKs for C - Verifying Program Executions Succinctly an.mp4  15.4 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Towards a general classification framework for cryptocurrency.mp4  15.4 MB
 
                
                    - Crypto/Crypto 2013/Attribute-Based Encryption for Circuits from Multilinear.mp4  15.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.mp4  15.4 MB
 
                
                    - Crypto/Crypto 2013/Leakage-Resilient Symmetric Cryptography under Empirical.mp4  15.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Valeria Nikolaenko.mp4  15.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Classic McEliece on the ARM Cortex-M4.mp4  15.4 MB
 
                
                    - Crypto/Crypto 2013/Secret Sharing, Rank Inequalities and Information Inequa.mp4  15.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Signatures from Sequential-OR Proofs.mp4  15.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.mp4  15.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for.mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.mp4  15.3 MB
 
                
                    - Crypto/Crypto 2021/MoSS Modular Security Specifications Framework.mp4  15.3 MB
 
                
                    - Crypto/Crypto 2015/Concurrent Secure Computation with Optimal Query Complexity.mp4  15.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Non-malleable Codes from Average-Case Hardness.mp4  15.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CTIDH faster constant-time CSIDH.mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.mp4  15.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Generic-Group Delay Functions Require Hidden-Order Groups.mp4  15.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre.mp4  15.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu.mp4  15.3 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 3 (part II).mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Cryptanalysis of Round-Reduced LED.mp4  15.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.mp4  15.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Permutation Based EDM An Inverse Free BBB Secure PRF.mp4  15.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.mp4  15.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.mp4  15.2 MB
 
                
                    - Crypto/Crypto 2020/Universally Composable Relaxed Password Authenticated Key Exchange.mp4  15.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.mp4  15.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Hierarchical Integrated Signature and Encryption.mp4  15.2 MB
 
                
                    - Crypto/Crypto 2013/Encoding Functions with Constant Online Rate or How to C.mp4  15.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Count Me In Extendablity for Threshold Ring Signatures.mp4  15.2 MB
 
                
                    - Crypto/Crypto 2020/Non-Malleability against Polynomial Tampering.mp4  15.2 MB
 
                
                    - Crypto/Crypto 2021/Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien.mp4  15.2 MB
 
                
                    - Crypto/Crypto 2020/Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.mp4  15.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Tweakable Blockciphers with Asymptotically Optimal Security.mp4  15.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.mp4  15.1 MB
 
                
                    - Crypto/Crypto 2013/Digital Signatures with Minimal Overhead from Indifferen.mp4  15.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Tight adaptive reprogramming in the QROM.mp4  15.1 MB
 
                
                    - Crypto/Crypto 2018/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.mp4  15.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Cryptanalysis of AES-PRF and Its Dual.mp4  15.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Anja Lehmann.mp4  15.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.mp4  15.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Cryptanalysis of Low-Data Instances of Full LowMCv2.mp4  15.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.mp4  15.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.mp4  15.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.mp4  15.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Rainbow on Cortex-M4.mp4  15.0 MB
 
                
                    - Crypto/Crypto 2013/Time-Optimal Interactive Proofs for Circuit Evaluation.mp4  15.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.mp4  15.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/Silent session on Masking.mp4  15.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Key Exchange - talk 3 4.mp4  15.0 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL talk III.mp4  15.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Flexible and Efficient Verifiable Computation on Encrypted Data.mp4  15.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Improved Classical Cryptanalysis of SIKE in Practice.mp4  15.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Durandal A Rank Metric Based Signature Scheme.mp4  15.0 MB
 
                
                    - Crypto/Crypto 2020/Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.mp4  14.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno.mp4  14.9 MB
 
                
                    - Workshops/WAC 2021 4/PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.mp4  14.9 MB
 
                
                    - Crypto/Crypto 2013/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.mp4  14.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Multi-Designated Receiver Signed Public Key Encryption.mp4  14.9 MB
 
                
                    - Crypto/Crypto 2021/MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.mp4  14.9 MB
 
                
                    - Crypto/Crypto 2021/MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica.mp4  14.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/The Direction of Updatable Encryption Does Matter.mp4  14.9 MB
 
                
                    - Crypto/Crypto 2020/Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.mp4  14.9 MB
 
                
                    - Crypto/Crypto 2020/Leakage-Resilient Key Exchange and Two-Seed Extractors.mp4  14.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Round-Optimal Multi-Party Computation with Identifiable Abort.mp4  14.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.mp4  14.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.mp4  14.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.mp4  14.8 MB
 
                
                    - Crypto/Crypto 2021/Sublinear GMW-Style Compiler for MPC with Preprocessing.mp4  14.8 MB
 
                
                    - Crypto/Crypto 2015/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.mp4  14.8 MB
 
                
                    - Crypto/Crypto 2014/How to Use Bitcoin to Design Fair Protocols.mp4  14.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Oblivious Transfer is in MiniQCrypt.mp4  14.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.mp4  14.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Beyond quadratic speedups in quantum attacks on symmetric schemes.mp4  14.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/A Deeper Look at Machine Learning-Based Cryptanalysis.mp4  14.8 MB
 
                
                    - Crypto/Crypto 2015/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.mp4  14.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/SPARKs Succinct Parallelizable Arguments of Knowledge.mp4  14.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On expected polynomial runtime in cryptography.mp4  14.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.mp4  14.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/The Cost of Adaptivity in Security Games on Graphs.mp4  14.8 MB
 
                
                    - Crypto/Crypto 2013/Sieve-in-the-Middle - Improved MITM Attacks.mp4  14.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).mp4  14.8 MB
 
                
                    - Crypto/Crypto 2013/Efficient Multiparty Protocols via Log-Depth Threshold F.mp4  14.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.mp4  14.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Combining Optimization Objectives New Modeling Attacks on Strong PUFs.mp4  14.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Rotational Cryptanalysis of Round-Reduced Keccak.mp4  14.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.mp4  14.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.mp4  14.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4  14.7 MB
 
                
                    - Crypto/Crypto 2021/Provable Security Analysis of FIDO2.mp4  14.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.mp4  14.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.mp4  14.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Adiantum length-preserving encryption for entry-level processors.mp4  14.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.mp4  14.7 MB
 
                
                    - Crypto/Crypto 2014/New and Improved Key-Homomorphic Pseudorandom Functions.mp4  14.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.mp4  14.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Minicrypt Primitives with Algebraic Structure and Applications.mp4  14.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Full Plain'text Recovery Attack on Broadcast RC4.mp4  14.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin.mp4  14.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.mp4  14.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Towards Tight Adaptive Security of Non-Interactive Key Exchange.mp4  14.6 MB
 
                
                    - Crypto/Crypto 2021/Quadratic Secret Sharing and Conditional Disclosure of Secrets.mp4  14.6 MB
 
                
                    - Crypto/Crypto 2021/Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.mp4  14.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Gemini elastic SNARKs for diverse environments.mp4  14.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.mp4  14.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.mp4  14.5 MB
 
                
                    - Crypto/Crypto 2020/Rounding in the Rings.mp4  14.5 MB
 
                
                    - Crypto/Crypto 2021/An Algebraic Framework for Universal and Updatable SNARKs.mp4  14.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved guess-and-determine and distinguishing attacks on SNOW-V.mp4  14.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.mp4  14.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.mp4  14.5 MB
 
                
                    - Crypto/Crypto 2020/Incompressible Encodings.mp4  14.5 MB
 
                
                    - Crypto/Crypto 2013/Instantiating Random Oracles via UCEs.mp4  14.5 MB
 
                
                    - Crypto/Crypto 2021/Signatures (continued).mp4  14.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Secure Message Authentication Against Related-Key Attack.mp4  14.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.mp4  14.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.mp4  14.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.mp4  14.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.mp4  14.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.mp4  14.4 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.mp4  14.4 MB
 
                
                    - Crypto/Crypto 2011/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.mp4  14.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.mp4  14.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other.mp4  14.4 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/IACR Award Ceremony.mp4  14.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Universal Proxy Re-Encryption.mp4  14.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Garbled Circuits With Sublinear Evaluator.mp4  14.4 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks II (part I).mp4  14.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Higher-Order Side Channel Security and Mask Refreshing.mp4  14.4 MB
 
                
                    - Crypto/Crypto 2019/How to Build Pseudorandom Functions from Public Random Permutations.mp4  14.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/On QA-NIZK in the BPK Model.mp4  14.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Information Leakages in Code-based Masking A Unified Quantification Approach.mp4  14.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/David McGrew.mp4  14.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.mp4  14.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.mp4  14.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.mp4  14.3 MB
 
                
                    - Crypto/Crypto 2021/Proof-Carrying Data without Succinct Arguments.mp4  14.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Pedro Moreno Sanchez.mp4  14.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Batching CSIDH Group Actions using AVX-512.mp4  14.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.mp4  14.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Online Template Attacks Revisited.mp4  14.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/A Geometric Approach to Linear Cryptanalysis.mp4  14.2 MB
 
                
                    - Crypto/Crypto 2013/Secure Signatures and Chosen Ciphertext Security in a Qu.mp4  14.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.mp4  14.2 MB
 
                
                    - Crypto/Crypto 2022 Live/Rotational Differential Linear Distinguishers of.mp4  14.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Functional Encryption for Inner Product - Achieving Const.mp4  14.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.mp4  14.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.mp4  14.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Anonymity of NIST PQC Round 3 KEMs.mp4  14.2 MB
 
                
                    - Crypto/Crypto 2021/How to Meet Ternary LWE Keys.mp4  14.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.mp4  14.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Multi Input Inner Product Functional Encryption from Pairings.mp4  14.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Yoroi Updatable Whitebox Cryptography.mp4  14.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4.mp4  14.2 MB
 
                
                    - Crypto/Crypto 2015/Data Is a Stream Security of Stream Based Channels.mp4  14.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/SNARGs for P from Sub-exponential DDH and QR.mp4  14.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Mike Hamburg.mp4  14.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.mp4  14.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/More Efficient Digital Signatures with Tight Multi-User Security.mp4  14.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Universally Composable Subversion-Resilient Cryptography.mp4  14.1 MB
 
                
                    - Crypto/Crypto 2015/Proofs of Space.mp4  14.1 MB
 
                
                    - Crypto/Crypto 2022/Multimodal Private Signatures.mp4  14.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).mp4  14.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.mp4  14.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.mp4  14.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.mp4  14.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.mp4  14.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/QCB Efficient Quantum-secure Authenticated Encryption.mp4  14.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Broadcast-Optimal Two-Round MPC.mp4  14.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.mp4  14.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.mp4  14.1 MB
 
                
                    - Crypto/Crypto 2013/Secure Computation against Adaptive Auxiliary Information.mp4  14.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.mp4  14.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Strong and Tight Security Guarantees against Integral Distinguishers.mp4  14.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.mp4  14.0 MB
 
                
                    - Workshops/CFAIL 2021/The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.mp4  14.0 MB
 
                
                    - Crypto/Crypto 2020/Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.mp4  14.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Whitebox I (Theory).mp4  14.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.mp4  14.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.mp4  14.0 MB
 
                
                    - Crypto/Crypto 2013/Construction of Differential Characteristics in ARX Desi.mp4  14.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/On the Depth of Oblivious Parallel RAM.mp4  14.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.mp4  14.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Faster Algorithms for Solving LPN.mp4  14.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.mp4  14.0 MB
 
                
                    - Crypto/Crypto 2020/New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.mp4  13.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Degree 2 is Complete for the Round-Complexity of Malicious MPC.mp4  13.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Redundant Code-based Masking Revisited.mp4  13.9 MB
 
                
                    - Workshops/PPML 2024/PPML 2024 invited talk II by Kunal Talwar.mp4  13.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.mp4  13.9 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 1 (part II).mp4  13.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.mp4  13.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.mp4  13.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Jean Camp.mp4  13.9 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 2 (part II).mp4  13.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.mp4  13.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/He Gives C-Sieves on the CSIDH.mp4  13.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Statistical ZAPR Arguments from Bilinear Maps.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2021/Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.mp4  13.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Cryptanalysis of WIDEA.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2015/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 3 (part I).mp4  13.8 MB
 
                
                    - Workshops/ACS 2019/BLS signatures, hashing to curves, and more dispatches from the IETF.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2015/Capacity and Data Complexity in Multidimensional Linear Attack.mp4  13.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Topology-Hiding Computation for Networks with Unknown Delays.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2013/Full Domain Hash from (Leveled) Multilinear Maps and Ide.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2014/Secure Multi-Party Computation with Identifiable Abort.mp4  13.8 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 2 (part I).mp4  13.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Whitebox II.mp4  13.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Cover and Decomposition Index Calculus on Elliptic Curve.mp4  13.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Felix Gunther.mp4  13.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Higher-Order Lookup Table Masking in Essentially Constant Memory.mp4  13.7 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Forty years and still running.mp4  13.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/RASSLE Return Address Stack based Side-channel LEakage.mp4  13.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Complementing Feistel Ciphers.mp4  13.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.mp4  13.7 MB
 
                
                    - Crypto/Crypto 2020/Cryptanalytic Extraction of Neural Network Models.mp4  13.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Non-Malleable Vector Commitments via Local Equivocability.mp4  13.7 MB
 
                
                    - Crypto/Crypto 2014/Hardness of k-LWE and Applications in Traitor Tracing.mp4  13.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Reflection Cryptanalysis of PRINCE-Like Ciphers.mp4  13.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.mp4  13.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.mp4  13.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On Treewidth, Separators and Yao’s Garbling.mp4  13.6 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks II (part II).mp4  13.6 MB
 
                
                    - Workshops/WAC 2021 4/The Role of Integrity in Attestation and Isolation.mp4  13.6 MB
 
                
                    - Crypto/Crypto 2023/Secure Two-Party Computation part II.mp4  13.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Multivariate Public Key Cryptosystem from Sidon Spaces.mp4  13.6 MB
 
                
                    - Crypto/Crypto 2013/Practical Multilinear Maps over the Integers.mp4  13.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Probing Security through Input-Output Separation and Revisited Quasilinear Masking.mp4  13.6 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks I (part II).mp4  13.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/New Collision Attacks on Round Reduced Keccak.mp4  13.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.mp4  13.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.mp4  13.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Cutting Through the Complexity of Reverse Engineering Embedded Devices.mp4  13.6 MB
 
                
                    - Crypto/Crypto 2020/Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.mp4  13.6 MB
 
                
                    - Crypto/Crypto 2015/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.mp4  13.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.mp4  13.5 MB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL talk II.mp4  13.5 MB
 
                
                    - Crypto/Crypto 2019/Reusable Non-Interactive Secure Computation.mp4  13.5 MB
 
                
                    - Crypto/Crypto 2013/Quantum One-Time Programs - (Extended Abstract).mp4  13.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.mp4  13.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Continuous Verifiable Delay Functions.mp4  13.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/The Round Complexity of Quantum Zero-Knowledge.mp4  13.5 MB
 
                
                    - Crypto/Crypto 2013/Achieving the Limits of the Noisy-Storage Model Using En.mp4  13.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Levchin Award Ceremony.mp4  13.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.mp4  13.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/Test of Time Award ceremony.mp4  13.5 MB
 
                
                    - Crypto/Crypto 2014/Interactive Proofs under Continual Memory Leakage.mp4  13.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Statistical ZAPs from Group-Based Assumptions.mp4  13.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.mp4  13.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o.mp4  13.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Dummy Shuffling against Algebraic Attacks in White-box Implementations.mp4  13.4 MB
 
                
                    - Crypto/Crypto 2014/Homomorphic Signatures with Efficient Verification for Polynomial Functions.mp4  13.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.mp4  13.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/A Modular Treatment of Blind Signatures from Identification Schemes.mp4  13.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A PCP Theorem for Interactive Proofs and Applications.mp4  13.4 MB
 
                
                    - Crypto/Crypto 2015/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.mp4  13.4 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat.mp4  13.4 MB
 
                
                    - Crypto/Crypto 2019/Seedless Fruit Is the Sweetest Random Number Generation, Revisited.mp4  13.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Near Collision Attack on the Grain v1 Stream Cipher.mp4  13.4 MB
 
                
                    - Crypto/Crypto 2020/Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.mp4  13.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/On Symmetric Encryption with Distinguishable Decryption Failures.mp4  13.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Round-Optimal Byzantine Agreement.mp4  13.4 MB
 
                
                    - Crypto/Crypto 2013/Plain versus Randomized Cascading-Based Key-Length Exten.mp4  13.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Batch-OT with Optimal Rate.mp4  13.3 MB
 
                
                    - Crypto/Crypto 2020/On Succinct Arguments and Witness Encryption from Groups.mp4  13.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.mp4  13.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Password Hashing and Preprocessing.mp4  13.3 MB
 
                
                    - Crypto/Crypto 2014/Minimizing the Two-Round Even-Mansour Cipher.mp4  13.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.mp4  13.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Transciphering Framework for Approximate Homomorphic Encryption.mp4  13.3 MB
 
                
                    - Crypto/Crypto 2021/Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.mp4  13.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Secure Multi-party Quantum Computation with a Dishonest Majority.mp4  13.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.mp4  13.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Cryptanalysis of Reduced round SKINNY Block Cipher.mp4  13.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Symmetric Key Exchange with Full Forward Security and Robust Synchronization.mp4  13.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.mp4  13.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Side-Channels & Public-key Cryptanalysis - talk 4 4.mp4  13.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Fake Near Collisions Attacks.mp4  13.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Award Papers.mp4  13.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Secure Multiparty Computation with Free Branching.mp4  13.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio.mp4  13.2 MB
 
                
                    - Crypto/Crypto 2013/Limits of Provable Security for Homomorphic Encryption.mp4  13.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Rate-1 Quantum Fully Homomorphic Encryption.mp4  13.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Fast verification of masking schemes in characteristic two.mp4  13.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Tightness of the Suffix Keyed Sponge Bound.mp4  13.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.mp4  13.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.mp4  13.2 MB
 
                
                    - Crypto/Crypto 2021/Foundations (continued).mp4  13.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Security Analysis of PRINCE.mp4  13.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Sublinear-Round Byzantine Agreement Under Corrupt Majority.mp4  13.1 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/NIST Update.mp4  13.1 MB
 
                
                    - Crypto/Crypto 2020/Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.mp4  13.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.mp4  13.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Short Pairing-Free Blind Signatures with Exponential Security.mp4  13.1 MB
 
                
                    - Crypto/Crypto 2015/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.mp4  13.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Efficient Arithmetic on Hessian Curves.mp4  13.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.mp4  13.1 MB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lecture Caught in Between Theory and Practice.mp4  13.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/A Framework for Automated Independent-Biclique Cryptanalysis.mp4  13.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Structured Encryption and Dynamic Leakage Suppression.mp4  13.0 MB
 
                
                    - Crypto/Crypto 2011/Leftover Hash Lemma, Revisited (Crypto 2011).mp4  13.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.mp4  13.0 MB
 
                
                    - Crypto/Crypto 2013/Practical Bootstrapping in Quasilinear Time.mp4  13.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.mp4  13.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Isogeny-based key compression without pairings.mp4  13.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Theory.mp4  13.0 MB
 
                
                    - Crypto/Crypto 2014/Physical Zero-Knowledge Proofs of Physical Properties.mp4  13.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.mp4  13.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.mp4  13.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Convexity of division property transitions theory, algorithms and compact models.mp4  13.0 MB
 
                
                    - Crypto/Crypto 2014/Amplifying Privacy in Privacy Amplification.mp4  13.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.mp4  13.0 MB
 
                
                    - Crypto/Crypto 2015/PoW Based Distributed Cryptography with no Trusted Setup.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2015/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Statistical Zaps and New Oblivious Transfer Protocols.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2013/A Uniform Min-Max Theorem with Applications in Cryptography.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2020/Reverse Firewalls for Actively Secure MPCs.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Round-Optimal and Communication-Efficient Multiparty Computation.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2012/Efficient Dissection of Composite Problems, with Applica.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/OptORAMa Optimal Oblivious RAM.mp4  12.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Policy-Compliant Signatures.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2015/Arguments of Proximity.mp4  12.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Witness Maps and Applications.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/TARDIS A Foundation of Time-Lock Puzzles in UC.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2022/Public-Key Watermarking Schemes for Pseudorandom Functions.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2015/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.mp4  12.9 MB
 
                
                    - Crypto/Crypto 2015/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.mp4  12.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Computationally Binding Quantum Commitments.mp4  12.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.mp4  12.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Zero-Knowledge Arguments for Lattice-Based Accumulators.mp4  12.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2014/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2020/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2020/Automatic Verification of Differential Characteristics Application to Reduced Gimli.mp4  12.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/opening remarks.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2015/Bloom Filters in Adversarial Environments.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2020/Amplifying the Security of Functional Encryption, Unconditionally.mp4  12.8 MB
 
                
                    - Crypto/Crypto 2020/Fully Deniable Interactive Encryption.mp4  12.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/How to Build a Trapdoor Function from an Encryption Scheme.mp4  12.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Radical Isogenies on Montgomery Curves.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part I).mp4  12.7 MB
 
                
                    - Crypto/Crypto 2021/Deniable Fully Homomorphic Encryption from Learning With Errors.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2020/A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2015/Practical Free Start Collision Attacks on the 76 Step SHA 1.mp4  12.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Simulation-Based Bi-Selective Opening Security for Public Key Encryption.mp4  12.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/ALE - AES-Based Lightweight Authenticated Encryption.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2012/Substitution-Permutation Networks, Pseudorandom Function.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2021/Composition with Knowledge Assumptions.mp4  12.7 MB
 
                
                    - Crypto/Crypto 2023/Side Channels 1 part II.mp4  12.6 MB
 
                
                    - Crypto/Crypto 2015/Tweaking Even Mansour Ciphers.mp4  12.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/The design of Xoodoo and Xoofff.mp4  12.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.mp4  12.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Modifying an Enciphering Scheme after Deployment.mp4  12.6 MB
 
                
                    - Crypto/Crypto 2020/The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.mp4  12.6 MB
 
                
                    - Crypto/Crypto 2021/Secure Wire Shuffling in the Probing Model.mp4  12.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Automatic Search of Cubes for Attacking Stream Ciphers.mp4  12.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Private Information Retrieval with Sublinear Online Time.mp4  12.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Daniel Franke.mp4  12.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/A compact and high-performance hardware architecture for CRYSTALS-Dilithium.mp4  12.6 MB
 
                
                    - Crypto/Crypto 2020/Random Probing Security Verification, Composition, Expansion and New Constructions.mp4  12.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Amortizing Rate-1 OT and Applications to PIR and PSI.mp4  12.6 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 4 (part I).mp4  12.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.mp4  12.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.mp4  12.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/On the Memory-Tightness of Hashed ElGamal.mp4  12.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Financially Backed Covert Security.mp4  12.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.mp4  12.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.mp4  12.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Analysis of Multivariate Encryption Schemes Application to Dob.mp4  12.5 MB
 
                
                    - Crypto/Crypto 2014/Automated Analysis of Cryptographic Assumptions in Generic Group Models.mp4  12.5 MB
 
                
                    - Crypto/Crypto 2013/On the Achievability of Simulation-Based Security for Fu.mp4  12.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Revisiting Homomorphic Encryption Schemes for Finite Fields.mp4  12.5 MB
 
                
                    - Crypto/Crypto 2021/Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio.mp4  12.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.mp4  12.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Rational isogenies from irrational endomorphisms.mp4  12.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Michael Naehrig.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2021/Tight State-Restoration Soundness in the Algebraic Group Model.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2015/Predicate Encryption for Circuits from LWE.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2013/Non-malleable Codes from Two-Source Extractors.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2015/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.mp4  12.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2014/Leakage-Tolerant Computation with Input-Independent Preprocessing.mp4  12.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.mp4  12.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.mp4  12.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Resistance of SNOW-V against Fast Correlation Attacks.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2015/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.mp4  12.4 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks II (part IV).mp4  12.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S.mp4  12.4 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part III).mp4  12.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/SIGMA Secure GPT Inference with Function Secret Sharing.mp4  12.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Post-quantum Security of Plain OAEP Transform.mp4  12.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/A New Structural Differential Property of 5 Round AES.mp4  12.3 MB
 
                
                    - Workshops/CFAIL 2021/Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.mp4  12.3 MB
 
                
                    - Crypto/Crypto 2015/Cryptanalysis of the Co ACD Assumption.mp4  12.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx.mp4  12.3 MB
 
                
                    - Crypto/Crypto 2014/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.mp4  12.3 MB
 
                
                    - Crypto/Crypto 2021/Oblivious RAM with Worst-Case Logarithmic Overhead.mp4  12.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Security of COFB against Chosen Ciphertext Attacks.mp4  12.3 MB
 
                
                    - Crypto/Crypto 2015/Parallel Hashing via List Recoverability.mp4  12.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr.mp4  12.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Cryptanalysis of an oblivious PRF from supersingular isogenies.mp4  12.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Security of Encryption Schemes in Weakened Random Oracle Models.mp4  12.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.mp4  12.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Key Prediction Security of Keyed Sponges.mp4  12.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.mp4  12.2 MB
 
                
                    - Crypto/Crypto 2015/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.mp4  12.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.mp4  12.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/A Note on the Post-Quantum Security of (Ring) Signatures.mp4  12.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved Preimage Attacks on 3-Round Keccak-224 256.mp4  12.2 MB
 
                
                    - Crypto/Crypto 2015/Concurrent Secure Computation via Non Black Box Simulation.mp4  12.2 MB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 award session.mp4  12.1 MB
 
                
                    - Crypto/Crypto 2014/Non-Interactive Secure Multiparty Computation.mp4  12.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Everybody's a Target Scalability in Public-Key Encryption.mp4  12.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Weak Tweak-Keys for the CRAFT Block Cipher.mp4  12.1 MB
 
                
                    - Crypto/Crypto 2021/You Only Speak Once Secure MPC with Stateless Ephemeral Roles.mp4  12.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Secure Software Leasing.mp4  12.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.mp4  12.1 MB
 
                
                    - Crypto/Crypto 2020/Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.mp4  12.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Low Error Efficient Computational Extractors in the CRS Model.mp4  12.1 MB
 
                
                    - Crypto/Crypto 2018/A Key recovery Attack on 855 round Trivium.mp4  12.1 MB
 
                
                    - Crypto/Crypto 2014/Scalable Zero Knowledge via Cycles of Elliptic Curves.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2020/Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2020/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2020/Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2015/Decaf Eliminating Cofactors Through Quotients and Isogenies.mp4  12.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2021/Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2013/What Information Is Leaked under Concurrent Composition.mp4  12.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.mp4  12.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Designated-Verifier Pseudorandom Generators, and Their Applications.mp4  12.0 MB
 
                
                    - Crypto/Crypto 2021/Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.mp4  12.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Two-Round Oblivious Transfer from CDH or LPN.mp4  11.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.mp4  11.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Masking Tables - An Underestimated Security Risk.mp4  11.9 MB
 
                
                    - Crypto/Crypto 2021/A Rational Protocol Treatment of 51% Attacks.mp4  11.9 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks I (part V).mp4  11.9 MB
 
                
                    - Crypto/Crypto 2013/Functional Encryption - New Perspectives and Lower Bounds.mp4  11.9 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Distributed Merkle's Puzzles.mp4  11.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Leakage Resilient Value Comparison With Application to Message Authentication.mp4  11.9 MB
 
                
                    - Crypto/Crypto 2013/Programmable Hash Functions in the Multilinear Setting.mp4  11.9 MB
 
                
                    - Crypto/Crypto 2014/Proving the TLS Handshake Secure (As It Is).mp4  11.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Provable Security of SP Networks with Partial Non-Linear Layers.mp4  11.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.mp4  11.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.mp4  11.8 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part II).mp4  11.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Unclonable Encryption, Revisited.mp4  11.8 MB
 
                
                    - Crypto/Crypto 2021/Oblivious Key-Value Stores and Amplification for Private Set Intersection.mp4  11.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Preventing Pollution Attacks in Multi-source Network Coding.mp4  11.8 MB
 
                
                    - Crypto/Crypto 2014/Optimal Non-perfect Uniform Secret Sharing Schemes.mp4  11.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.mp4  11.8 MB
 
                
                    - Crypto/Crypto 2021/A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.mp4  11.8 MB
 
                
                    - Crypto/Crypto 2021/Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.mp4  11.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Evolving Ramp Secret Sharing with a Small Gap.mp4  11.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.mp4  11.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.mp4  11.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/A General Proof Framework for Recent AES Distinguishers.mp4  11.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Updatable Signatures and Message Authentication Codes.mp4  11.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si.mp4  11.7 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks I (part III).mp4  11.7 MB
 
                
                    - Crypto/Crypto 2013/Optimal Coding for Streaming Authentication and Interact.mp4  11.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Blockchains Enable Non-Interactive MPC.mp4  11.7 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part II).mp4  11.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.mp4  11.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Improved cryptanalysis of UOV and Rainbow.mp4  11.7 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/Cryptanalysis of Draco.mp4  11.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.mp4  11.7 MB
 
                
                    - Crypto/Crypto 2022/On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.mp4  11.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.mp4  11.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Algebraic Adversaries in the Universal Composability Framework.mp4  11.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/On the Size of Pairing-Based Non-interactive Arguments.mp4  11.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.mp4  11.6 MB
 
                
                    - Crypto/Crypto 2021/Hidden Cosets and Applications to Unclonable Cryptography.mp4  11.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.mp4  11.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.mp4  11.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.mp4  11.6 MB
 
                
                    - Crypto/Crypto 2021/Non-Interactive Batch Arguments for NP from Standard Assumptions.mp4  11.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.mp4  11.6 MB
 
                
                    - Crypto/Crypto 2014/Breaking '128-bit Secure' Supersingular Binary Curves.mp4  11.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.mp4  11.6 MB
 
                
                    - Crypto/Crypto 2021/Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.mp4  11.6 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Attestation as a Service (AaaS).mp4  11.5 MB
 
                
                    - Crypto/Crypto 2021/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.mp4  11.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Keep it Unsupervised Horizontal Attacks Meet Deep Learning.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2020/Round-optimal Black-box Commit-and-prove with Succinct Communication.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2021/Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2021/Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.mp4  11.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Opening remarks.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2021/Limits on the Adaptive Security of Yao’s Garbling.mp4  11.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.mp4  11.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2020/The Memory-Tightness of Authenticated Encryption.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2014/Structure-Preserving Signatures from Type II Pairings.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2020/Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.mp4  11.5 MB
 
                
                    - Crypto/Crypto 2015/Known key Distinguisher on Full PRESENT.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2020/Collusion Resistant Watermarkable PRFs from Standard Assumptions.mp4  11.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Blazing Fast OT for Three-Round UC OT Extension.mp4  11.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.mp4  11.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.mp4  11.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2015/Secure Computation from Leaky Correlated Randomness.mp4  11.4 MB
 
                
                    - Workshops/CFAIL 2021/Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.mp4  11.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/New Yoyo Tricks with AES-based Permutations.mp4  11.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Rene Peralta.mp4  11.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part V).mp4  11.4 MB
 
                
                    - Crypto/Crypto 2014/The Security of Multiple Encryption in the Ideal Cipher Model.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2013/Learning with Rounding, Revisited - New Reduction, Prope.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2021/Towards Tight Random Probing Security.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2021/Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].mp4  11.4 MB
 
                
                    - Crypto/Crypto 2013 Rump Session/Spying NSA.mp4  11.4 MB
 
                
                    - Crypto/Crypto 2015/Constant Round MPC with Fairness and Guarantee of Output Delivery.mp4  11.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Provably Weak Instances of Ring-LWE Revisited.mp4  11.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.mp4  11.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/The Price of Active Security in Cryptographic Protocols.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2021/Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2015/Cryptography with One Way Communication.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2013/Limits on the Power of Cryptographic Cheap Talk.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2014/Improved Short Lattice Signatures in the Standard Model.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2015/From Selective to Adaptive Security in Functional Encryption.mp4  11.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Improved Rectangle Attacks on SKINNY and CRAFT.mp4  11.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/On Communication-Efficient Asynchronous MPC with Adaptive Security.mp4  11.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Indifferentiability of Confusion-Diffusion Networks.mp4  11.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Gladius LWR based efficient hybrid public key encryption with distributed decryption.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2024/Women & Allies in Cryptography.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2021/Large Message Homomorphic Secret Sharing from DCR and Applications.mp4  11.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2020/Indifferentiability for Public Key Cryptosystems.mp4  11.3 MB
 
                
                    - Crypto/Crypto 2021/On the Round Complexity of Secure Quantum Computation.mp4  11.2 MB
 
                
                    - Crypto/Crypto 2021/Improved Computational Extractors and their Applications.mp4  11.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Adaptively Secure ABE for DFA from k-Lin and More.mp4  11.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Master-Key KDM-Secure IBE from Pairings.mp4  11.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.mp4  11.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.mp4  11.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Provably Quantum-Secure Tweakable Block Ciphers.mp4  11.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Multi-Source Non-Malleable Extractors and Applications.mp4  11.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Luke Garratt.mp4  11.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Masked Triples Amortizing Multiplication Triples across Conditionals.mp4  11.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Efficient simulation of random states and random unitaries.mp4  11.1 MB
 
                
                    - Crypto/Crypto 2015/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.mp4  11.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Syndrome Decoding Estimator.mp4  11.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/TNT How to Tweak a Block Cipher.mp4  11.1 MB
 
                
                    - Crypto/Crypto 2014/Cryptography with Streaming Algorithms.mp4  11.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/CNF-FSS and its Applications.mp4  11.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Secure, Accurate, and Practical Narrow-Band Ranging System.mp4  11.1 MB
 
                
                    - Crypto/Crypto 2014/FleXOR - Flexible garbling for XOR gates that beats free-XOR.mp4  11.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.mp4  11.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.mp4  11.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.mp4  11.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Fair and Robust MPC using a Global Transaction Ledger.mp4  11.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.mp4  11.0 MB
 
                
                    - Crypto/Crypto 2021/Non-Malleable Codes for Bounded Parallel-Time Tampering.mp4  11.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Public Key Encryption with Flexible Pattern Matching.mp4  11.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Categorization of Faulty Nonce Misuse Resistant Message Authentication.mp4  11.0 MB
 
                
                    - Crypto/Crypto 2013 Rump Session/Spying NSA (reprise).mp4  11.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/DEFAULT Cipher Level Resistance Against Differential Fault Attack.mp4  11.0 MB
 
                
                    - Crypto/Crypto 2015/Malicious for free OT Extension The Pipe is the Limit.mp4  10.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Constraining and Watermarking PRFs from Milder Assumptions.mp4  10.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/SeaSign Compact Isogeny Signatures from Class Group Actions.mp4  10.9 MB
 
                
                    - Crypto/Crypto 2014/On Virtual Grey Box Obfuscation for General Circuits.mp4  10.9 MB
 
                
                    - Crypto/Crypto 2015/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.mp4  10.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.mp4  10.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Online Offline OR Composition of Sigma Protocols.mp4  10.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Laurent Simon.mp4  10.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Leonid Reyzin.mp4  10.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.mp4  10.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Abuse Resistant Law Enforcement Access Systems.mp4  10.9 MB
 
                
                    - Crypto/Crypto 2020/Functional Encryption for Attribute-Weighted Sums from k-Lin.mp4  10.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.mp4  10.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.mp4  10.9 MB
 
                
                    - Crypto/Crypto 2020/Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.mp4  10.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Direct Product Hardness Amplification.mp4  10.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.mp4  10.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/PSI from PaXoS Fast, Malicious Private Set Intersection.mp4  10.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/A Practical Key-Recovery Attack on 805-Round Trivium.mp4  10.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.mp4  10.8 MB
 
                
                    - Crypto/Crypto 2015/The Iterated Random Permutation Problem with Applications to Cascade Encryption.mp4  10.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Weak Keys in Reduced AEGIS and Tiaoxin.mp4  10.8 MB
 
                
                    - Crypto/Crypto 2021/Compact Ring Signatures from Learning With Errors.mp4  10.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Puncturable Key Wrapping and Its Applications.mp4  10.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.mp4  10.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.mp4  10.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2021/SSE and SSD Page-Efficient Searchable Symmetric Encryption.mp4  10.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric-Key - Design - talk 3 3.mp4  10.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Extracting Randomness from Extractor-Dependent Sources.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2015/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.mp4  10.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.mp4  10.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Bit Security as Computational Cost for Winning Games with High Probability.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2021/Efficient Key Recovery for all HFE Signature Variants.mp4  10.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/On the Feasibility of Consistent Computations.mp4  10.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of Private Circuits with Quasilinear Randomness.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2021/One-Way Functions Imply Secure Computation in a Quantum World.mp4  10.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Massive Superpoly Recovery with Nested Monomial Predictions.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2019/Symmetric Primitives with Structured Secrets.mp4  10.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Implementing Grover oracles for quantum key search on AES and LowMC.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2020/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.mp4  10.7 MB
 
                
                    - Crypto/Crypto 2014/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2014/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.mp4  10.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Efficient Set Operations in the Presence of Malicious Adversaries.mp4  10.6 MB
 
                
                    - Workshops/WAC 2022 5/WAC5 2022 Session 4 (part I).mp4  10.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Adaptive Simulation Security for Inner Product Functional Encryption.mp4  10.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/BETA Biometric-Enabled Threshold Authentication.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2014/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.mp4  10.6 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/On Length Independent Security Bounds for the PMAC Family.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2012/Collusion-Preserving Computation.mp4  10.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Towards Easy Leakage Certification.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2014/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).mp4  10.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.mp4  10.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Incompressible Cryptography.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Microsoft's ElectionGuard.mp4  10.6 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part IV).mp4  10.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Adaptive Security of Multi-Party Protocols, Revisited.mp4  10.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Aurelie Phesso.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2015/A Punctured Programming Approach to Adaptive Security in Functional Encryption.mp4  10.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2011/Bi-Deniable Public-Key Encryption.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2013/Fast Cut-and-Choose Based Protocols for Malicious and Co.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2021/New Approaches for Quantum Copy-Protection.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2020/Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.mp4  10.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.mp4  10.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Double-Base Chains for Scalar Multiplications on Elliptic Curves.mp4  10.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.mp4  10.5 MB
 
                
                    - Workshops/PPML 2022/PPML 2022 Contributed Talks I (part IV).mp4  10.5 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Key Words.mp4  10.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/On the CCA Compatibility of Public-Key Infrastructure.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2019/Quantum Indistinguishability of Random Sponges.mp4  10.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Generic Negation of Pair Encodings.mp4  10.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Linearly-Homomorphic Signatures and Scalable Mix-Nets.mp4  10.5 MB
 
                
                    - Crypto/Crypto 2020/Verifiable Registration-Based Encryption.mp4  10.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Hardness of LWE on General Entropic Distributions.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2015/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2015/Practical Round Optimal Blind Signatures in the Standard Model.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2021/On the Concurrent Composition of Quantum Zero-Knowledge.mp4  10.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Improving Revocation for Group Signature with Redactable Signature.mp4  10.4 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Relationships between quantum IND-CPA notions.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2014/Algorithms in HElib.mp4  10.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Quantum-access-secure message authentication via blind-unforgeability.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2015/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/NIST Update.mp4  10.4 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.mp4  10.3 MB
 
                
                    - Crypto/Crypto 2020/Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.mp4  10.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Yehuda Lindell.mp4  10.3 MB
 
                
                    - Crypto/Crypto 2020/Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.mp4  10.3 MB
 
                
                    - Crypto/Crypto 2021/Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.mp4  10.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/All Complete Functionalities are Reversible.mp4  10.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Zero-Knowledge Proofs - Succinctness - talk 2 4.mp4  10.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Séta Supersingular Encryption from Torsion Attacks.mp4  10.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/On the Exact Security of Schnorr-Type Signatures in the.mp4  10.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Exploring Differential-Based Distinguishers and Forgeries for ASCON.mp4  10.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.mp4  10.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Cristina Onete.mp4  10.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/On the Impossibility of Tight Cryptographic Reductions.mp4  10.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Onion Routing with Replies.mp4  10.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.mp4  10.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Text Search Protocols with Simulation Based Security.mp4  10.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.mp4  10.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Low-Latency Keccak at any Arbitrary Order.mp4  10.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.mp4  10.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.mp4  10.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Public Key Compression and Modulus Switching for Fully H.mp4  10.2 MB
 
                
                    - Crypto/Crypto 2019/Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2014/Faster Bootstrapping with Polynomial Error.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2020/Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 - o(k.mp4  10.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Banquet Short and Fast Signatures from AES.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2011/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).mp4  10.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.mp4  10.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/PrORAM Fast O(log n) Authenticated Shares ZK ORAM.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/SoK A Consensus Taxonomy in the Blockchain Era.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2020/Guaranteed Output Delivery Comes Free in Honest Majority MPC.mp4  10.1 MB
 
                
                    - Crypto/Crypto 2020/Nearly Optimal Robust Secret Sharing against Rushing Adversaries.mp4  10.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/On the Isogeny Problem with Torsion Point Information.mp4  10.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric-Key - Design - talk 2 3.mp4  10.0 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Implementing Signal.mp4  10.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/On the Bottleneck Complexity of MPC with Correlated Randomness.mp4  10.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Double-Block-Length Hash Function for Minimum Memory Size.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Multi-Party Reusable Non-Interactive Secure Computation from LWE.mp4  10.0 MB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part IV).mp4  10.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Real world zkSNARKs updates on Zcash, libsnark.mp4  10.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Balanced Non-Adjacent Forms.mp4  10.0 MB
 
                
                    - Crypto/Crypto 2020/Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Multi-input Functional Encryption in the Private-Key Setting -.mp4  10.0 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Asymmetric distributed trust.mp4  10.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Toward RSA-OAEP Without Random Oracles.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.mp4  10.0 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Opening and Borg Early Career Award (BECA) for Nadia Heninger.mp4  10.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/On the Power of Hierarchical Identity-Based Encryption.mp4  10.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.mp4  9.9 MB
 
                
                    - Crypto/Crypto 2012/Fully Homomorphic Encryption without Modulus Switching f.mp4  9.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Welcome to Eurocrypt 2019, Marc Fischlin.mp4  9.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.mp4  9.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Fine-tuning the ISO IEC Standard LightMAC.mp4  9.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.mp4  9.9 MB
 
                
                    - Crypto/Crypto 2015/Indistinguishability Obfuscation from Compact Functional Encryption.mp4  9.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.mp4  9.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Classical proofs of quantum knowledge.mp4  9.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Provably Robust Sponge-Based PRNGs and KDFs.mp4  9.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.mp4  9.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.mp4  9.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Reusable Two-Round MPC from LPN.mp4  9.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.mp4  9.9 MB
 
                
                    - Crypto/Crypto 2021/ATLAS Efficient and Scalable MPC in the Honest Majority Setting.mp4  9.9 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.mp4  9.9 MB
 
                
                    - Crypto/Crypto 2012/Homomorphic Evaluation of the AES Circuit.mp4  9.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.mp4  9.8 MB
 
                
                    - Crypto/Crypto 2014/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.mp4  9.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/The Reality of Cryptographic Deployments on the Internet.mp4  9.8 MB
 
                
                    - Crypto/Crypto 2020/Efficient Pseudorandom Correlation Generators from Ring-LPN.mp4  9.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/business meeting.mp4  9.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/Differential, impossible differential and neural distinguishers - talk 4 4.mp4  9.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.mp4  9.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Towards a Simpler Lattice Gadget Toolkit.mp4  9.8 MB
 
                
                    - Crypto/Crypto 2023/Succinctness 1 part I.mp4  9.8 MB
 
                
                    - Crypto/Crypto 2020/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.mp4  9.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.mp4  9.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Subversion-Resilient Public Key Encryption with Practical Watchdogs.mp4  9.7 MB
 
                
                    - Crypto/Crypto 2011/Position-Based Quantum Cryptography - Impossibility and Constructions.mp4  9.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Two Round Multiparty Computation via Multi-key FHE.mp4  9.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/A Geometric Approach to Homomorphic Secret Sharing.mp4  9.7 MB
 
                
                    - Crypto/Crypto 2021/Differential-Linear Cryptanalysis from an Algebraic Perspective.mp4  9.7 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Collusion Preserving Computation without a Mediator.mp4  9.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Threshold Cryptography & Distributed Broadcast - talk 3 4.mp4  9.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2015/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2021/On the Round Complexity of Black-Box Secure MPC.mp4  9.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora.mp4  9.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Verifiable Random Functions with Optimal Tightness.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2021/No Time to HashOn Super-Efficient Entropy Accumulation.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2021/White Box Traitor Tracing.mp4  9.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Succinct Non-Interactive Secure Computation.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2021/Does Fiat-Shamir Require a Cryptographic Hash Function.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2014/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.mp4  9.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Fast, Compact, and Expressive Attribute-Based Encryption.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2020/LWE with Side Information Attacks and Concrete Security Estimation.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2015/Multi Key Security The Even Mansour Construction Revisted.mp4  9.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Sanitization of FHE Ciphertexts.mp4  9.6 MB
 
                
                    - Crypto/Crypto 2021/Improved torsion-point attacks on SIDH variants.mp4  9.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.mp4  9.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Algebraic Collision Attacks on Keccak.mp4  9.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Steel Composable Hardware-based Stateful and Randomised Functional Encryption.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Circuit Compilers with O(1 - log (n)) Leakage Rate.mp4  9.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 Opening Remarks.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/On the ideal shortest vector problem over random rational primes.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.mp4  9.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Secure Two-Party Computation - talk 3 3.mp4  9.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Maximums of the Additive Differential Probability of Exclusive-Or.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Statistical ZAP Arguments.mp4  9.5 MB
 
                
                    - Crypto/Crypto 2012/Succinct Arguments from Multi-prover Interactive Proofs.mp4  9.5 MB
 
                
                    - Crypto/Crypto 2020/Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4  9.5 MB
 
                
                    - Crypto/Crypto 2022 Live/IACR Fellows 2022 Ceremony.mp4  9.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Simple Constructions from (Almost) Regular One-Way Functions.mp4  9.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Acyclicity Programming for Sigma-Protocols.mp4  9.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.mp4  9.5 MB
 
                
                    - Crypto/Crypto 2013/Improved OT Extension for Transferring Short Secrets.mp4  9.4 MB
 
                
                    - Crypto/Crypto 2019/Unifying Leakage Models on a Renyi Day.mp4  9.4 MB
 
                
                    - Crypto/Crypto 2021/Traceable Secret Sharing and Applications.mp4  9.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.mp4  9.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.mp4  9.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Mind the Middle Layer The HADES Design Strategy Revisited.mp4  9.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Revisiting (R)CCA Security and Replay Protection.mp4  9.4 MB
 
                
                    - Crypto/Crypto 2021/Computational Hardness of Optimal Fair Computation Beyond Minicrypt.mp4  9.4 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Towards Low-Latency Implementation of Linear Layers.mp4  9.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Unbounded Multi-Party Computation from Learning with Errors.mp4  9.4 MB
 
                
                    - Crypto/Crypto 2019/Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.mp4  9.4 MB
 
                
                    - Crypto/Crypto 2018/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.mp4  9.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Combiners for Functional Encryption, Unconditionally.mp4  9.3 MB
 
                
                    - Crypto/Crypto 2020/New Constructions of Hinting PRGs, OWFs with Encryption, and more.mp4  9.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.mp4  9.3 MB
 
                
                    - Crypto/Crypto 2020/Practical Product Proofs for Lattice Commitments.mp4  9.3 MB
 
                
                    - Crypto/Crypto 2014/Dishonest Majority Multi-Party Computation for Binary Circuits.mp4  9.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Formalizing Data Deletion in the Context of the Right to be Forgotten.mp4  9.3 MB
 
                
                    - Crypto/Crypto 2021/Test of Time Awards.mp4  9.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Multiparty Computation with Low Communication, Computati.mp4  9.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Classical Binding for Quantum Commitments.mp4  9.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Private Aggregation from Fewer Anonymous Messages.mp4  9.2 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Kahn Ni Melm - John Steinbeck's Secret Language.mp4  9.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.mp4  9.2 MB
 
                
                    - Crypto/Crypto 2015/Bilinear Entropy Expansion from the Decisional Linear Assumption.mp4  9.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/On the security of OSIDH.mp4  9.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Unclonable Polymers and Their Cryptographic Applications.mp4  9.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for.mp4  9.2 MB
 
                
                    - Crypto/Crypto 2020/New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.mp4  9.2 MB
 
                
                    - Crypto/Crypto 2012/Breaking and Repairing GCM Security Proofs.mp4  9.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.mp4  9.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.mp4  9.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Confidential Signatures and Deterministic Signcryption.mp4  9.1 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.mp4  9.1 MB
 
                
                    - Crypto/Crypto 2012/Actively Secure Two-Party Evaluation of Any Quantum Oper.mp4  9.1 MB
 
                
                    - Crypto/Crypto 2012/Secret Sharing Schemes for Very Dense Graphs.mp4  9.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.mp4  9.1 MB
 
                
                    - Crypto/Crypto 2020/Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.mp4  9.1 MB
 
                
                    - Crypto/Crypto 2020/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.mp4  9.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Threshold Garbled Circuits and Ad Hoc Secure Computation.mp4  9.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2012/Efficient Padding Oracle Attacks on Cryptographic Hardware.mp4  9.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Adaptive Oblivious Transfer and Generalization.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2020/Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).mp4  9.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Unconditionally Secure Computation with Reduced Interaction.mp4  9.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Tight Security Bounds for Double-block Hash-then-Sum MACs.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2021/Multi-Input Quadratic Functional Encryption from Pairings.mp4  9.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Property Preserving Symmetric Encryption.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Lockable Obfuscation.mp4  9.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Freestart Collision for Full SHA-1.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2015/Bit Commitment schemes with Non Signaling Adversaries.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/OPA.mp4  9.0 MB
 
                
                    - Crypto/Crypto 2012/Must You Know the Code of f to Securely Compute f.mp4  9.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/rump session 2.mp4  8.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Opening remarks.mp4  8.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Reverse Firewalls for Adaptively Secure MPC without Setup.mp4  8.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Private Set Operations from Oblivious Switching.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2013 Rump Session/Under Surveillance.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/New Attacks on the Concatenation and XOR Hash Combiners.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2011/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).mp4  8.9 MB
 
                
                    - Crypto/Crypto 2012/On the Distribution of Linear Biases - Three Instructive.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2020/Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2014/Hierarchical Identity Based Encryption from Affine Messafe Authentication.mp4  8.9 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/He Gives C Sieves on the CSIDH.mp4  8.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Tightly-Secure Authenticated Key Exchange, Revisited.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2021/Sumcheck Arguments and their Applications.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2012/Differential Privacy with Imperfect Randomness.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2013/On Fair Exchange, Fair Coins and Fair Sampling.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2021/Fine-grained Secure Attribute-based Encryption.mp4  8.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.mp4  8.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Fully Homomorphic Encryption with Polylog Overhead.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2014/Quantum Position Verification in the Random Oracle Model.mp4  8.8 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Test of Time Award for the best Rump Session Presentation.mp4  8.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Identity-Based Encryption Resilient to Continual Auxilia.mp4  8.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.mp4  8.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Going Beyond Dual Execution MPC for Functions with Efficient Verification.mp4  8.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Faster Algorithms for Approximate Common Divisors - Break.mp4  8.7 MB
 
                
                    - Crypto/Crypto 2014/Maliciously Circuit-Private FHE.mp4  8.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Olivier Levillain.mp4  8.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/The Exact Round Complexity of Secure Computation.mp4  8.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.mp4  8.7 MB
 
                
                    - Crypto/Crypto 2012/The Curious Case of Non-Interactive Commitments - On the.mp4  8.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.mp4  8.7 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.mp4  8.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).mp4  8.6 MB
 
                
                    - Crypto/Crypto 2012/An Enciphering Scheme Based on a Card Shuffle.mp4  8.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Adaptively Attribute-Hiding (Hierarchical) Inner Product.mp4  8.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Tightly-Secure Signatures from Lossy Identification Schemes.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2011/Inverting HFE Systems is Quasi-Polynomial for All Fields.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Obfuscation Using Tensor Products.mp4  8.6 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Vector and Functional Commitments from Lattices.mp4  8.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.mp4  8.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2020/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2012/Near-Linear Unconditionally-Secure Multiparty Computatio.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2015/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Blockchains and consensus protocols Snake oil warning.mp4  8.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Statistical Tools Flavor Side-Channel Collision Attacks.mp4  8.6 MB
 
                
                    - Crypto/Crypto 2011/Smaller Decoding Exponents - Ball-Collision Decoding.mp4  8.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.mp4  8.5 MB
 
                
                    - Crypto/Crypto 2011/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).mp4  8.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Transparent SNARKs from DARK Compilers.mp4  8.5 MB
 
                
                    - Crypto/Crypto 2020/Anonymous Tokens with Private Metadata Bit.mp4  8.5 MB
 
                
                    - Crypto/Crypto 2012/Quantum to Classical Randomness Extractors.mp4  8.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Tightly CCA-Secure Encryption Without Pairings.mp4  8.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Reusable Designated-Verifier NIZKs for all NP from CDH.mp4  8.5 MB
 
                
                    - Crypto/Crypto 2015/Efficient Pseudorandom Functions via On the Fly Adaptation.mp4  8.5 MB
 
                
                    - Crypto/Crypto 2021/Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.mp4  8.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Message Authentication, Revisited.mp4  8.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Security and Trust in Open Source Security Tokens.mp4  8.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.mp4  8.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.mp4  8.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Group Signatures with User-Controlled and Sequential Linkability.mp4  8.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.mp4  8.4 MB
 
                
                    - Crypto/Crypto 2020/Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.mp4  8.4 MB
 
                
                    - Crypto/Crypto 2015/Observations on the SIMON Block Cipher Family.mp4  8.4 MB
 
                
                    - Crypto/Crypto 2020/Fast and Secure Updatable Encryption.mp4  8.4 MB
 
                
                    - Crypto/Crypto 2020/Spartan Efficient and general-purpose zkSNARKs without trusted setup.mp4  8.4 MB
 
                
                    - Crypto/Crypto 2012/Dynamic Credentials and Ciphertext Delegation for Attrib.mp4  8.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/LogStack Stacked Garbling with O(b log b) Computation.mp4  8.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Incremental Deterministic Public-Key Encryption.mp4  8.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.mp4  8.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Polynomial IOPs for Linear Algebra Relations.mp4  8.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.mp4  8.3 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.mp4  8.3 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Program Chair's Report by Jonathan Katz.mp4  8.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/All-But-Many Lossy Trapdoor Functions.mp4  8.3 MB
 
                
                    - Crypto/Crypto 2012/Secure Identity-Based Encryption in the Quantum Random O.mp4  8.3 MB
 
                
                    - Crypto/Crypto 2011/Time-Lock Puzzles in the Random Oracle Model.mp4  8.2 MB
 
                
                    - Crypto/Crypto 2021/The $t$-wise Independence of Substitution-Permutation Networks.mp4  8.2 MB
 
                
                    - Crypto/Crypto 2014/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.mp4  8.2 MB
 
                
                    - Crypto/Crypto 2012/On the Security of TLS-DHE in the Standard Model.mp4  8.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Quantum Proofs of Knowledge.mp4  8.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.mp4  8.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Identity-Based (Lossy) Trapdoor Functions and Applications.mp4  8.2 MB
 
                
                    - Crypto/Crypto 2011/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).mp4  8.1 MB
 
                
                    - Crypto/Crypto 2012/Hardness of Computing Individual Bits for One-Way Functi.mp4  8.1 MB
 
                
                    - Crypto/Crypto 2011/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.mp4  8.1 MB
 
                
                    - Crypto/Crypto 2012/Resistance against Iterated Attacks by Decorrelation Rev.mp4  8.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Efficient and Optimally Secure Key-Length Extension for.mp4  8.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Multiparty Cardinality Testing for Threshold Private Set Intersection.mp4  8.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Aggregatable Distributed Key Generation.mp4  8.1 MB
 
                
                    - Crypto/Crypto 2020/A Classification of Computational Assumptions in the Algebraic Group Model.mp4  8.1 MB
 
                
                    - Crypto/Crypto 2020/Security Analysis of NIST CTR-DRBG.mp4  8.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.mp4  8.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Storing and Retrieving Secrets on a blockchain.mp4  8.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Multi-Client Functional Encryption for Separable Functions.mp4  8.1 MB
 
                
                    - Crypto/Crypto 2011/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).mp4  8.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/New negative results on differing-inputs obfuscation.mp4  8.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.mp4  8.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the.mp4  8.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Advanced Lattice Sieving on GPUs, with Tensor Cores.mp4  8.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Implementing Provably Secure Detection of Direct Injection Attacks.mp4  8.0 MB
 
                
                    - Crypto/Crypto 2012/To Hash or Not to Hash Again (In)Differentiability Resu.mp4  8.0 MB
 
                
                    - Crypto/Crypto 2012/Black-Box Constructions of Composable Protocols without.mp4  8.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.mp4  8.0 MB
 
                
                    - Crypto/Crypto 2020/Lattice-Based Blind Signatures, Revisited.mp4  8.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4  8.0 MB
 
                
                    - Crypto/Crypto 2011/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).mp4  8.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/(Quantum) Collision Attacks on Reduced Simpira v2.mp4  7.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.mp4  7.9 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.mp4  7.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Bootstrapping fully homomorphic encryption over the integers in less - than one second.mp4  7.9 MB
 
                
                    - Crypto/Crypto 2011/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.mp4  7.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Welcome.mp4  7.9 MB
 
                
                    - Crypto/Crypto 2015/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.mp4  7.9 MB
 
                
                    - Crypto/Crypto 2011/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.mp4  7.9 MB
 
                
                    - Crypto/Crypto 2011/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.mp4  7.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Robust Coin Flipping.mp4  7.8 MB
 
                
                    - Crypto/Crypto 2012/Public Keys.mp4  7.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Key-Alternating Ciphers in a Provable Setting - Encryptio.mp4  7.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Efficient Constructions for Almost-everywhere Secure Computation.mp4  7.8 MB
 
                
                    - Crypto/Crypto 2012/Functional Encryption with Bounded Collusions via Multi-.mp4  7.8 MB
 
                
                    - Crypto/Crypto 2011/Cryptography with Tamperable and Leaky Memory (Crypto 2011).mp4  7.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/Symmetric-Key - Design - talk 1 3.mp4  7.8 MB
 
                
                    - Crypto/Crypto 2015/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.mp4  7.8 MB
 
                
                    - Crypto/Crypto 2012/Securing Circuits against Constant-Rate Tampering.mp4  7.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/The Convergence of Slide-type Reductions.mp4  7.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.mp4  7.7 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Succinct LWE Sampling, Random Polynomials, and Obfuscation.mp4  7.7 MB
 
                
                    - Crypto/Crypto 2011/Constant-Rate Oblivious Transfer from Noisy Channels.mp4  7.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Eva Sarafianou.mp4  7.7 MB
 
                
                    - Crypto/Crypto 2014/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.mp4  7.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/A formula for disaster a unified approach to elliptic curve special-point-based attacks.mp4  7.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Lattice Signatures without Trapdoors.mp4  7.7 MB
 
                
                    - Crypto/Crypto 2014/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.mp4  7.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Narrow-Bicliques - Cryptanalysis of Full IDEA.mp4  7.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Concurrently Secure Computation in Constant Rounds.mp4  7.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.mp4  7.7 MB
 
                
                    - Crypto/Crypto 2011/Leakage-Resilient Zero Knowledge (Crypto 2011).mp4  7.6 MB
 
                
                    - Crypto/Crypto 2012/Crowd-Blending Privacy.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2012/Tweakable Blockciphers with Beyond Birthday-Bound Security.mp4  7.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Optimal Security Proofs for Full Domain Hash, Revisited.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2022 Live/Remembering Nishant Kumar.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2011/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2012/Adaptively Secure Multi-Party Computation with Dishonest.mp4  7.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Unconditionally-Secure Robust Secret Sharing with Compac.mp4  7.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/ROTed Random Oblivious Transfer for embedded devices.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2012/Multi-instance Security and Its Application to Password-.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2011/Round Optimal Blind Signatures in the Standard Model.mp4  7.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Lattice sieving via quantum random walks.mp4  7.6 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/Closing remarks at CHES 2018.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2011/Memory Delegation (Crypto 2011).mp4  7.6 MB
 
                
                    - Crypto/Crypto 2011/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).mp4  7.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Detecting Dangerous Queries - A New Approach for Chosen C.mp4  7.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Efficient Boolean Search over Encrypted Data with Reduced Leakage.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2012/Universal Composability from Essentially Any Trusted Setup.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2014/Updates on Generic Attacks against HMAC and NMAC.mp4  7.6 MB
 
                
                    - Workshops/WAC 2021 4/A Side Journey To Titan.mp4  7.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.mp4  7.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.mp4  7.6 MB
 
                
                    - Crypto/Crypto 2014/Security Analysis of Multilinear Maps over the Integers.mp4  7.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.mp4  7.5 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Unifying Presampling via Concentration Bounds.mp4  7.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/On the Relationships between Different Methods for Degree Evaluation.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2011/The Collision Security of Tandem-DM in the Ideal Cipher Model.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2012/On the Impossibility of Constructing Efficient Key Encap.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2014/Cryptography from Compression Functions - The UCE Bridge to the ROM.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2014/Low Overhead Broadcast Encryption from Multilinear Maps.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2011/Merkle Puzzles in a Quantum World.mp4  7.5 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.mp4  7.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Verifiable Inner Product Encryption Scheme.mp4  7.4 MB
 
                
                    - Crypto/Crypto 2012/Tamper and Leakage Resilience in the Split-State Model.mp4  7.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Fair Computation with Rational Players.mp4  7.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Master-Key KDM-Secure ABE via Predicate Encoding.mp4  7.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Bounded Collusion ABE for TMs from IBE.mp4  7.4 MB
 
                
                    - Crypto/Crypto 2011/Physically Uncloneable Functions in the Universal Composition Framework.mp4  7.4 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/The 2011 IACR Fellowship Induction Ceremony.mp4  7.4 MB
 
                
                    - Crypto/Crypto 2012/Hash Functions Based on Three Permutations - A Generic Se.mp4  7.4 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/How not to pay with Bitcoin.mp4  7.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Efficient Zero-Knowledge Argument for Correctness of a S.mp4  7.3 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.mp4  7.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Constrained Pseudorandom Functions for Unconstrained Inputs.mp4  7.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/f time and best paper awards.mp4  7.3 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/DARPA Cryptographic Research.mp4  7.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.mp4  7.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Algebraically Structured LWE, Revisited.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/The early history of blockchains.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2011/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).mp4  7.2 MB
 
                
                    - Crypto/Crypto 2011/Classical Cryptographic Protocols in a Quantum World.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/What does the SHARK say.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2014/The Exact PRF-Security of NMAC and HMAC.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Self Correcting Random Oracles and Its Cliptographic Applications.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2012/Semantic Security for the Wiretap Channel.mp4  7.2 MB
 
                
                    - Crypto/Crypto 2014/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.mp4  7.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Randomness Complexity of Private Circuits for Multiplication.mp4  7.1 MB
 
                
                    - Crypto/Crypto 2012/Functional Encryption for Regular Languages.mp4  7.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/CSIDH - an efficient post-quantum commutative group action.mp4  7.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Delegatable Anonymous Credentials from Mercurial Signatures.mp4  7.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.mp4  7.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Magallanes.mp4  7.0 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Prime and Prejudice Primality Testing Under Adversarial Conditions.mp4  7.0 MB
 
                
                    - Crypto/Crypto 2013/Accuracy-Privacy Tradeoffs for Two-Party Differentially.mp4  7.0 MB
 
                
                    - Crypto/Crypto 2011/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).mp4  7.0 MB
 
                
                    - Crypto/Crypto 2011/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.mp4  7.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/NTRU Fatigue How Stretched is Overstretched.mp4  7.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Security of Symmetric Encryption in the Presence of Ciph.mp4  6.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.mp4  6.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.mp4  6.9 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/RWC 2023 Closing Remarks.mp4  6.9 MB
 
                
                    - Crypto/Crypto 2012/Stam's Conjecture and Threshold Phenomena in Collision R.mp4  6.9 MB
 
                
                    - Crypto/Crypto 2011/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.mp4  6.9 MB
 
                
                    - Crypto/Crypto 2020/Black-Box Transformations from Passive to Covert Security with Public Verifiability.mp4  6.9 MB
 
                
                    - Crypto/Crypto 2021/Broadcast-Optimal Two Round MPC with an Honest Majority.mp4  6.9 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/You are strong, FALCON, but we will break you.mp4  6.8 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Browser Security with a Grain of Salt.mp4  6.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.mp4  6.8 MB
 
                
                    - Crypto/Crypto 2011/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).mp4  6.8 MB
 
                
                    - Crypto/Crypto 2019/Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.mp4  6.8 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/The design of scalar AES Instruction Set Extensions for RISC-V.mp4  6.8 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/How to Mimic Nakamoto's Design via Proof of stake and more.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/RSA Encraption.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2020/MPC with Friends and Foes.mp4  6.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Robust Property-Preserving Hash Functions for Hamming Distance and More.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2014/Improved Generic Attacks against Hash-Based MACs and HAIFA.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2011/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2012/Tightly Secure Signatures and Public-Key Encryption.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2011/Cryptanalysis of PrintCIPHER.mp4  6.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Standard Security Does Not Imply Security against Select.mp4  6.7 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/Analysis and Comparison of Table-based Arithmetic to Boolean Masking.mp4  6.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/RSA-OAEP without Random Oracles, Featuring Eminem.mp4  6.6 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Trivial Real World Crypto.mp4  6.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.mp4  6.6 MB
 
                
                    - Crypto/Crypto 2011/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.mp4  6.6 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.mp4  6.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Efficient Redactable Signature and Application to Anonymous Credentials.mp4  6.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Forking Tweakable Even-Mansour Ciphers.mp4  6.5 MB
 
                
                    - Crypto/Crypto 2021/Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.mp4  6.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/Run time Accessible DRAM PUFs in Commodity Devices.mp4  6.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.mp4  6.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.mp4  6.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Account Management and Stake Pools in Proof of Stake Ledgers.mp4  6.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.mp4  6.3 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.mp4  6.3 MB
 
                
                    - Crypto/Crypto 2019/ABE for DFA from k-Lin.mp4  6.3 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Blockchain.mp4  6.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/Quantum Period Finding is Compression Robust.mp4  6.3 MB
 
                
                    - Workshops/TASER 2021/Opening remarks at TASER 2021, by Dan Page, Bristol University.mp4  6.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/A Correlation Attack on Full SNOW-V and SNOW-Vi.mp4  6.2 MB
 
                
                    - Crypto/Crypto 2020/The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.mp4  6.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Quan Nguyen.mp4  6.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.mp4  6.2 MB
 
                
                    - Crypto/Crypto 2014/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.mp4  6.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Boosting the Security of Blind Signature Schemes.mp4  6.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.mp4  6.1 MB
 
                
                    - Crypto/Crypto 2011/Random Oracle Reducibility (Crypto 2011).mp4  6.0 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/Laconic Private Set Intersection and Applications.mp4  6.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 closing remarks.mp4  6.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.mp4  5.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Compactness of Hashing Modes and Efficiency beyond Merkle Tree.mp4  5.9 MB
 
                
                    - Crypto/Crypto 2012/Multiparty Computation from Somewhat Homomorphic Encryption.mp4  5.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Pseudorandom Functions and Lattices.mp4  5.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2023/MPC for Specific Functionalities - talk 3 3.mp4  5.8 MB
 
                
                    - Crypto/Crypto 2012/New Impossibility Results for Concurrent Composition and.mp4  5.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Random Oracles in the Real World.mp4  5.8 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Test of Time Award Ceremony.mp4  5.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.mp4  5.7 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.mp4  5.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Synesthesia.mp4  5.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Generic Framework for Key-Guessing Improvements.mp4  5.7 MB
 
                
                    - Crypto/Crypto 2022/A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.mp4  5.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Another Application of Cryptocurrencies.mp4  5.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/On Rejection Sampling in Lyubashevsky's Signature Scheme.mp4  5.7 MB
 
                
                    - Crypto/Crypto 2012/A New Approach to Practical Active-Secure Two-Party Comp.mp4  5.6 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.mp4  5.6 MB
 
                
                    - Crypto/Crypto 2022/Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.mp4  5.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Small-Box Cryptography, and the Provable Security of SPNs.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Make Crypto Not Maps.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Security and Composition of Rational Cryptographic Protocols.mp4  5.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/David Cash.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Setup Free SNARKs from Hidden Order Groups.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2024/Opening remarks.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Stand up Crypto Comedy.mp4  5.5 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/The JMAC MAC.mp4  5.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.mp4  5.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Cryptography with Dispensable Backdoors.mp4  5.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Lower Bounds for Leakage-Resilient Secret Sharing.mp4  5.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/How to (not) share a password.mp4  5.4 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.mp4  5.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/How we avoided a second Dual-EC-DRBG fiasco.mp4  5.4 MB
 
                
                    - Crypto/Crypto 2022/On Codes and Learning with Errors over Function Fields.mp4  5.3 MB
 
                
                    - Crypto/Crypto 2022/Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.mp4  5.3 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Bringing Verifiable Delay Functions Into Production.mp4  5.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-1 CHES 2021 Opening Remarks.mp4  5.1 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Separable Statistics, New Extension to Linear Cryptanalysis.mp4  5.1 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Laconic Function Evaluation.mp4  5.1 MB
 
                
                    - Crypto/Crypto 2022/Securing Approximate Homomorphic Encryption using Differential Privacy.mp4  5.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.json  5.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.mp4  5.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/Opening Remarks.mp4  5.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Bernstein Bound is Tight.mp4  5.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.json  5.0 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/On the Round Complexity of Randomized Byzantine Agreement.mp4  5.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.json  5.0 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.mp4  4.9 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Secure MPC Laziness Leads to GOD.mp4  4.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/A - Formal Analysis of Boomerang Probabilities.mp4  4.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/Two-Round Oblivious Linear Evaluation from Learning with Errors.mp4  4.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/NIST Update.mp4  4.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.json  4.8 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.json  4.8 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/PQC Wiki.mp4  4.8 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/On parameter choices of Round5.mp4  4.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A Modular Approach to the Security Analysis of Two-Permutation Constructions.mp4  4.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Kittens, Models And Thieves.mp4  4.7 MB
 
                
                    - Crypto/Crypto 2022/Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.mp4  4.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/In memory attacks at crypto currency wallets.mp4  4.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.json  4.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.json  4.7 MB
 
                
                    - Crypto/Crypto 2022/Differential Cryptanalysis in the Fixed-Key Model.mp4  4.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-1 Opening Remarks.mp4  4.6 MB
 
                
                    - Crypto/Crypto 2022/MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.mp4  4.6 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Surveillance from Brussels Privacy at UCSB CAM for fun.mp4  4.6 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Cryptanalyzing the Legendre PRF.mp4  4.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.json  4.5 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/s-42 CHES 2021 closing remarks.mp4  4.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.mp4  4.5 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/RISC V Foundation Security Standing Committee Call to action.mp4  4.5 MB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 opening remarks.mp4  4.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.json  4.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Franchised Quantum Money.mp4  4.4 MB
 
                
                    - Crypto/Crypto 2012/New Preimage Attacks against Reduced SHA-1.mp4  4.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Security Analysis of Quantum Lightning.mp4  4.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.json  4.4 MB
 
                
                    - Crypto/Crypto 2022/Short Leakage Resilient and Non-malleable Secret Sharing Schemes.mp4  4.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/A basketful of secret shares.mp4  4.4 MB
 
                
                    - Crypto/Crypto 2022/Collision-Resistance from Multi-Collision-Resistance.mp4  4.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/session-48 Closing Remarks.mp4  4.3 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Report from ECC 2017.mp4  4.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Cryptographic Primitives with Hinting Property.mp4  4.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/General Properties of Quantum Bit Commitments (Extended Abstract).mp4  4.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/No Place to Hide Contactless Probing of Secret Data on FPGAs.mp4  4.3 MB
 
                
                    - Crypto/Crypto 2022/Correlated Pseudorandomness from Expand-Accumulate Codes.mp4  4.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.mp4  4.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Triply Adaptive UC NIZK.mp4  4.2 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/International Olympiad in Cryptography NSUCRYPTO.mp4  4.2 MB
 
                
                    - Crypto/Crypto 2014/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.mp4  4.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.json  4.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.mp4  4.2 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.mp4  4.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Random Sources in Private Computation.mp4  4.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.mp4  4.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Enhancing Differential-Neural Cryptanalysis.mp4  4.1 MB
 
                
                    - Crypto/Crypto 2022/Password-Authenticated Key Exchange from Group Actions.mp4  4.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/3rd SKINNY Breaking Competition.mp4  4.1 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Blockchain and the Identity Problem.mp4  4.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Conditional Linear Cryptanalysis.mp4  4.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.mp4  4.0 MB
 
                
                    - Crypto/Crypto 2022/Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.mp4  4.0 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Robust Property Preserving Hashes.mp4  4.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A Universally Composable Non-Interactive Aggregate Cash System.mp4  4.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.mp4  4.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/How to synchronize efficiently.mp4  4.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.json  4.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Jammin' on the deck.mp4  4.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.json  4.0 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.json  4.0 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.json  3.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Non-Interactive Secure Computation of Inner-Product from LPN and LWE.mp4  3.9 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Bodka Not V, But B.mp4  3.9 MB
 
                
                    - Crypto/Crypto 2022/Simplified MITM Modeling for Permutations New (Quantum) Attacks.mp4  3.9 MB
 
                
                    - Crypto/Crypto 2022/Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.mp4  3.9 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/decodingchallenge org.mp4  3.9 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Adversarial Correctness Favors Laziness.mp4  3.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Security of Truncated Permutation Without Initial Value.mp4  3.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Algebraic Meet-in-the-Middle Attack on LowMC.mp4  3.8 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Biclique cryptanalysis of the full AES.mp4  3.8 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/New Conference on Information Theoretic Cryptography (ITC).mp4  3.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.mp4  3.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Full Quantum Equivalence of Group Action DLog and CDH, and More.mp4  3.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.mp4  3.8 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.mp4  3.7 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/The Grand Unified Theory of Cryptology.mp4  3.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/libpqcrypto.mp4  3.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Structure Preserving Smooth Projective Hashing.mp4  3.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.json  3.7 MB
 
                
                    - Crypto/Crypto 2022/Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.mp4  3.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.mp4  3.7 MB
 
                
                    - Crypto/Crypto 2022/Universally Composable End-to-End Secure Messaging 1-2.mp4  3.7 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Quantum Computing Threat or Menace.mp4  3.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/The CERES Project Campaign to Enhance Research Experience.mp4  3.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.mp4  3.7 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.json  3.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.json  3.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Zero Knowledge Standardization.mp4  3.6 MB
 
                
                    - Crypto/Crypto 2022/Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.mp4  3.6 MB
 
                
                    - Crypto/Crypto 2022/Gossiping for Communication-Efficient Broadcast.mp4  3.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/State Machine Replication under Changing Network Conditions.mp4  3.6 MB
 
                
                    - Crypto/Crypto 2014/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.mp4  3.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/ElectroEuro.mp4  3.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.json  3.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Key-schedule Security for the TLS 1.3 Standard.mp4  3.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.mp4  3.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.mp4  3.5 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.json  3.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.json  3.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.mp4  3.5 MB
 
                
                    - Crypto/Crypto 2022/Implicit White-Box Implementations White-Boxing ARX Ciphers.mp4  3.5 MB
 
                
                    - Crypto/Crypto 2022/Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.mp4  3.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.mp4  3.5 MB
 
                
                    - Crypto/Crypto 2022/Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.mp4  3.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.json  3.5 MB
 
                
                    - Crypto/Crypto 2022/Provably Secure Reflection Ciphers.mp4  3.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.mp4  3.5 MB
 
                
                    - Crypto/Crypto 2022/Lower Bound on SNARGs in the Random Oracle Model.mp4  3.4 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.json  3.4 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/Cards Against Cryptography.mp4  3.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/PRG.mp4  3.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.mp4  3.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.mp4  3.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Linear-map Vector Commitments and their Practical Applications.mp4  3.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Decoding distortions using frequency analysis.mp4  3.4 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.mp4  3.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.mp4  3.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Attaining GOD Beyond Honest Majority With Friends and Foes.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/A small problem Regarding permutations.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.json  3.3 MB
 
                
                    - Crypto/Crypto 2022/Block-Cipher-Based Tree Hashing.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2022/Quantum Commitments and Signatures without One-Way Functions.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2022/Dynamic Local Searchable Symmetric Encryption.mp4  3.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Theory of Cryptography Conference Test-of-Time Award Recipients.mp4  3.3 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.json  3.3 MB
 
                
                    - Crypto/Crypto 2022/Oblivious Message Retrieval.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2022/Threshold Signatures with Private Accountability.mp4  3.3 MB
 
                
                    - Crypto/Crypto 2022 Live/Opening Remarks at Crypto 2022.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.mp4  3.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/IACR Fellows nomination.mp4  3.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Towards Practical Topology-Hiding Computation.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/A New Approach to Efficient Non-Malleable Zero-Knowledge.mp4  3.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Efficient Adaptively-Secure Byzantine Agreement for Long Messages.mp4  3.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Make AES great again.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Statistical Ineffective Fault Attacks.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.mp4  3.2 MB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.json  3.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.json  3.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/The ZUC-256 Stream Cipher.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/Improving Support-Minors rank attacks applications to GeMSS and Rainbow.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/A More Complete Analysis of the Signal Double Ratchet Algorithm.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/On the Insider Security of MLS.mp4  3.2 MB
 
                
                    - Crypto/Crypto 2022/Universally Composable End-to-End Secure Messaging 2-2.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2022/Multi-Input Attribute Based Encryption and Predicate Encryption.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2022/Tight Preimage Resistance of the Sponge Construction.mp4  3.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.json  3.1 MB
 
                
                    - Crypto/Crypto 2022/Programmable Distributed Point Functions.mp4  3.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Classically Verifiable NIZK for QMA with Preprocessing.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2022/Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.mp4  3.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.json  3.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Must the Communication Graph of MPC Protocols be an Expander.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2022/Batch Arguments for NP and More from Standard Bilinear Group Assumptions.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.mp4  3.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Workshops @ Crypto 2018.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Robust Coin Flipping.mp4  3.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.json  3.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Multi-User Security of the Sum of Truncated Random Permutations.mp4  3.1 MB
 
                
                    - Crypto/Crypto 2022/Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.mp4  3.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.mp4  3.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/SIDH Proof of Knowledge.mp4  3.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.json  3.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Statistical Decoding 2.0 Reducing Decoding to LPN.mp4  3.0 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).mp4  3.0 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Top secret A world of codes and ciphers an exhibition.mp4  3.0 MB
 
                
                    - Crypto/Crypto 2022/Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.mp4  3.0 MB
 
                
                    - Crypto/Crypto 2022/Cryptography from Pseudorandom Quantum States.mp4  3.0 MB
 
                
                    - Crypto/Crypto 2022/Certified Everlasting Zero-Knowledge Proof for QMA.mp4  3.0 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.mp4  3.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Opening remarks.mp4  3.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.mp4  3.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.json  2.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Reverse Kuleshov effect in cryptography.mp4  2.9 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.mp4  2.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.json  2.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.json  2.9 MB
 
                
                    - Crypto/Crypto 2022/Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.mp4  2.9 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/PQCzoo Post Quantum Beasts and Where to Find Them.mp4  2.9 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.json  2.9 MB
 
                
                    - Crypto/Crypto 2022/log∗-Round Game-Theoretically-Fair Leader Election.mp4  2.9 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/Proofs of Work for Blockchain Protocols.mp4  2.9 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/P2P social networks - why and how viable.mp4  2.9 MB
 
                
                    - Crypto/Crypto 2022/Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.mp4  2.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Authenticated Encryption with Key Identification.mp4  2.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Short-lived zero-knowledge proofs and signatures.mp4  2.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Non-interactive Mimblewimble transactions, revisited.mp4  2.9 MB
 
                
                    - Crypto/Crypto 2022/Authenticated garbling from simple correlations.mp4  2.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Recovering the tight security proof of SPHINCS.mp4  2.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.json  2.8 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.mp4  2.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Concurrently Composable Non-Interactive Secure Computation.mp4  2.8 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.json  2.8 MB
 
                
                    - Crypto/Crypto 2022/Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.mp4  2.8 MB
 
                
                    - Crypto/Crypto 2022/Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.mp4  2.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Privacy-Preserving Authenticated Key Exchange in the Standard Model.mp4  2.8 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.json  2.8 MB
 
                
                    - Crypto/Crypto 2012/Welcome to Crypto 2012.mp4  2.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.json  2.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2022/Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.mp4  2.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/EvalRound Algorithm in CKKS Bootstrapping.mp4  2.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2022/Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.mp4  2.7 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.json  2.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.json  2.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2022/Better than Advertised Security for Non-Interactive Threshold Signatures.mp4  2.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.json  2.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Nostradamus goes Quantum.mp4  2.7 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/An historical call for papers.mp4  2.7 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Remotegrity.mp4  2.7 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Extreme Threshold Cryptosystems.mp4  2.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.json  2.7 MB
 
                
                    - Crypto/Crypto 2018 Rump Session/Computational Ring LWR problem.mp4  2.7 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.mp4  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Anonymous Public Key Encryption under Corruptions.mp4  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.mp4  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.mp4  2.6 MB
 
                
                    - Crypto/Crypto 2022/An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.mp4  2.6 MB
 
                
                    - Crypto/Crypto 2022/Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.mp4  2.6 MB
 
                
                    - Crypto/Crypto 2022/Shorter Hash-and-Sign Lattice-Based Signatures.mp4  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Unconditionally Secure NIZK in the Fine-Grained Setting.mp4  2.6 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/(More) Efficient Secure Computation from Garbled Circuits.mp4  2.6 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.json  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.mp4  2.6 MB
 
                
                    - Crypto/Crypto 2022/Triangulating Rebound Attack on AES-like Hashing.mp4  2.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.mp4  2.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.json  2.6 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/The Hunting of the SNARK.mp4  2.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.json  2.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.json  2.5 MB
 
                
                    - Crypto/Crypto 2022/On the Feasibility of Unclonable Encryption and, More.mp4  2.5 MB
 
                
                    - Crypto/Crypto 2022/Nova Recursive Zero-Knowledge Arguments from Folding Schemes.mp4  2.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.json  2.5 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Pseudorandom Functions and Lattices.mp4  2.5 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/NIST Announcements.mp4  2.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.json  2.5 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.json  2.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Practical Provably Secure Flooding for Blockchains.mp4  2.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.mp4  2.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.mp4  2.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/QueerCrypt.mp4  2.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.json  2.5 MB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.json  2.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.mp4  2.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.json  2.5 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Secure Computation with Sublinear Amortized Work.mp4  2.5 MB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.json  2.5 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.mp4  2.5 MB
 
                
                    - Crypto/Crypto 2022/Statistically Sender-Private OT From LPN and Derandomization.mp4  2.5 MB
 
                
                    - Crypto/Crypto 2022/Succinct Classical Verification of Quantum Computation.mp4  2.5 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.json  2.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.json  2.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.mp4  2.4 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.mp4  2.4 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Rethinking IDEA.mp4  2.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.json  2.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.json  2.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.json  2.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.json  2.4 MB
 
                
                    - Crypto/Crypto 2022/Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.mp4  2.4 MB
 
                
                    - Crypto/Crypto 2022/Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.mp4  2.4 MB
 
                
                    - Crypto/Crypto 2022/Breaking Rainbow Takes a Weekend on a Laptop.mp4  2.4 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.json  2.4 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.json  2.4 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.json  2.4 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/An update about HiDalgo.mp4  2.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Efficient Searchable Symmetric Encryption for Join Queries.mp4  2.4 MB
 
                
                    - Crypto/Crypto 2022/Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.mp4  2.3 MB
 
                
                    - Crypto/Crypto 2022/Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.mp4  2.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.json  2.3 MB
 
                
                    - Crypto/Crypto 2022/Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.mp4  2.3 MB
 
                
                    - Crypto/Crypto 2022/Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.mp4  2.3 MB
 
                
                    - Crypto/Crypto 2022/Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.mp4  2.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.json  2.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.json  2.3 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/The Garden-Hose Model.mp4  2.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Universal Ring Signatures in the Standard Model.mp4  2.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Continuously Non-Malleable Codes against Bounded-Depth Tampering.mp4  2.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.json  2.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.mp4  2.3 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.json  2.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Functional Encryption with Secure Key Leasing.mp4  2.2 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/A brief chat about approximate GCDs.mp4  2.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.json  2.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/TCC GOA.mp4  2.2 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Blinding ballot copying in Helios - from Condorcet to IACR.mp4  2.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.json  2.2 MB
 
                
                    - Crypto/Crypto 2017 Rump Session/The Sound of Quantum.mp4  2.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Horizontal racewalking using radical isogenies.mp4  2.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.mp4  2.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.json  2.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/The Abe-Okamoto Partially Blind Signature Scheme Revisited.mp4  2.1 MB
 
                
                    - Crypto/Crypto 2022/Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.mp4  2.1 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Observations on H-PRESENT-128.mp4  2.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.json  2.1 MB
 
                
                    - Crypto/Crypto 2022/On the Impossibility of Key Agreements from Quantum Random Oracles.mp4  2.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.mp4  2.1 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Non-Malleable Codes in the Split-State Model.mp4  2.1 MB
 
                
                    - Crypto/Crypto 2022/Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.mp4  2.1 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/FlipIt and the Cramér-Rao bound.mp4  2.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.json  2.1 MB
 
                
                    - Crypto/Crypto 2022/Le Mans Dynamic and Fluid MPC for Dishonest Majority.mp4  2.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.mp4  2.0 MB
 
                
                    - Crypto/Crypto 2022/Succinct Interactive Oracle Proofs Applications and Limitations.mp4  2.0 MB
 
                
                    - Crypto/Crypto 2022/Nearly Optimal Property Preserving Hashing.mp4  2.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.mp4  2.0 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/A silent competition for ultra-fast public key cryptography.mp4  2.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.json  2.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.json  2.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.json  2.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Multi-Client Functional Encryption with Fine-Grained Access Control.mp4  2.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/A New Isogeny Representation and Applications to Cryptography.mp4  2.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/FINAL Faster FHE instantiated with NTRU and LWE.mp4  1.9 MB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.json  1.9 MB
 
                
                    - Crypto/Crypto 2022/Orion Zero Knowledge Proof with Linear Prover Time.mp4  1.9 MB
 
                
                    - Crypto/Crypto 2022/Practical Statistically-Sound Proofs of Exponentiation in any Group.mp4  1.9 MB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.json  1.9 MB
 
                
                    - Workshops/TASER 2021/Closing remarks at TASER 2021, by Dan Page of Bristol University.mp4  1.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/New Algorithms and Analyses for Sum-Preserving Encryption.mp4  1.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.mp4  1.9 MB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.json  1.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.mp4  1.9 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.json  1.9 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.json  1.8 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Identity-Based Matchmaking Encryption from Standard Assumptions.mp4  1.8 MB
 
                
                    - Crypto/Crypto 2022/Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.mp4  1.8 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.json  1.8 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 Closing Remarks.mp4  1.8 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Predicate Encryption for Inner Products from LWE.mp4  1.8 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Variants of Sponge-like Construction.mp4  1.8 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.json  1.7 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Memory-Tight Multi-Challenge Security of Public-Key Encryption.mp4  1.7 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.json  1.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.json  1.7 MB
 
                
                    - Crypto/Crypto 2022/Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.mp4  1.7 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Secure Verification of Delegated Presentation Delivery.mp4  1.7 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.json  1.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.json  1.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.json  1.7 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.json  1.7 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.json  1.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Unknown presentation.mp4  1.7 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.json  1.6 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.json  1.6 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.json  1.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.mp4  1.6 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.json  1.6 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.json  1.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.json  1.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.mp4  1.6 MB
 
                
                    - Crypto/Crypto 2022/Faster Sounder Succinct Arguments and IOPs.mp4  1.6 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.json  1.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.mp4  1.6 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.json  1.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.json  1.5 MB
 
                
                    - Crypto/Crypto 2022/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.mp4  1.5 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Panel discussion on leakage.mp4  1.5 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.json  1.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.json  1.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.json  1.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.json  1.5 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/Program Chair' Opening Remarks.mp4  1.5 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/The Chia Proof of Space construction and implementation competition.mp4  1.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.json  1.5 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.json  1.5 MB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.json  1.5 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.json  1.5 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.json  1.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.json  1.4 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.mp4  1.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.json  1.4 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.json  1.4 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.json  1.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.json  1.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Towards Tight Security Bounds for OMAC, XCBC and TMAC.mp4  1.4 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Threshold Linearly Homomorphic Encryption on Z 2kZ.mp4  1.4 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.json  1.4 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.json  1.4 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.json  1.4 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2019 Rump Session/STARK friendly hash challenge.mp4  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.json  1.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.json  1.3 MB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.json  1.3 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.json  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.json  1.3 MB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/On Module Unique-SVP and NTRU.mp4  1.3 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Bounds on Cloud File Retrievability.mp4  1.3 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.json  1.3 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.json  1.3 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.json  1.3 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.json  1.3 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2022/(Nondeterministic) Hardness vs. Non-Malleability.mp4  1.2 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.json  1.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.json  1.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.json  1.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.json  1.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.json  1.2 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.json  1.2 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.json  1.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.json  1.2 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.json  1.2 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.json  1.2 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.json  1.2 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.json  1.2 MB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.json  1.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2022/Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.mp4  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.json  1.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.json  1.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.json  1.1 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2022/New Constructions of Collapsing Hashes.mp4  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.json  1.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.json  1.1 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.json  1.1 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.json  1.1 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.json  1.1 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.json  1.1 MB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.json  1.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Announcement - Lightsec workshop.mp4  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.json  1.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.json  1.0 MB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.json  1.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.json  1.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.json  1.0 MB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2022/Augmented Random Oracles.mp4  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.json  1.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.json  1.0 MB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.json  1.0 MB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.json  1.0 MB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.json  1.0 MB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.json  1.0 MB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.json  1023.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.json  1022.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.json  1022.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.json  1022.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.json  1021.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.json  1019.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.json  1019.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.json  1018.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/An Application Of Frequency Shift Keying To Communication Resynchronisation.mp4  1018.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.json  1017.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.json  1015.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.json  1015.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.json  1015.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.json  1015.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.json  1012.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.json  1011.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.json  1011.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.json  1010.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.json  1009.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.json  1009.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.json  1008.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.json  1008.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.json  1008.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.json  1007.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.json  1007.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.json  1007.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.json  1006.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.json  1004.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.json  1004.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.json  1001.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.json  1000.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.json  1000.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.json  999.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.json  998.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.json  998.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.json  997.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.json  997.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.json  995.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.json  995.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.json  995.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.json  995.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.json  994.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.json  994.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.json  991.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.json  989.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.json  989.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.json  989.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.json  989.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.json  988.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.json  988.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.json  983.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.json  982.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.json  982.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.json  982.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.json  982.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.json  981.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.json  981.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.json  981.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.json  979.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.json  978.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.json  978.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.json  976.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.json  976.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.json  975.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.json  975.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.json  975.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.json  974.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.json  974.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.json  973.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.json  973.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.json  973.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.json  972.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.json  971.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.json  971.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.json  971.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.json  970.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.json  970.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.json  970.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.json  969.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.json  966.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.json  966.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.json  965.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.json  965.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.json  964.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.json  963.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.json  960.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.json  960.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.json  960.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.json  959.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.json  957.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.json  955.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.json  955.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.json  955.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.json  955.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.json  954.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.json  954.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.json  953.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.json  951.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.json  951.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.json  950.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.json  950.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.json  949.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.json  948.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.json  947.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.json  946.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.json  946.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.json  945.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.json  945.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.json  945.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.json  945.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.json  944.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.json  944.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.json  943.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.json  943.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.json  942.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.json  941.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.json  941.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.json  939.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.json  938.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.json  937.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.json  937.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.json  937.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.json  937.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.json  937.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.json  937.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.json  934.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.json  934.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.json  933.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.json  933.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.json  932.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.json  932.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.json  932.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.json  931.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.json  931.3 KB
 
                
                    - Crypto/Crypto 2022/To Label, or Not To Label (in Generic Groups).mp4  931.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.json  931.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.json  930.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.json  928.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.json  928.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.json  926.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.json  926.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.json  926.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.json  924.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.json  924.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.json  923.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.json  923.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.json  923.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.json  921.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.json  919.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.json  919.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.json  919.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.json  919.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.json  918.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.json  918.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.json  918.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.json  917.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.json  917.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.json  917.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.json  914.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.json  913.1 KB
 
                
                    - Crypto/Crypto 2022/Practical Sublinear Proofs for R1CS from Lattices.mp4  911.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.json  909.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.json  909.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.json  908.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.json  906.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.json  906.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.json  905.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.json  905.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.json  904.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.json  903.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.json  903.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.json  902.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.json  902.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.json  901.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.json  900.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.json  899.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.json  899.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.json  899.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.json  899.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.json  898.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.json  898.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.json  898.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.json  898.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.json  894.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.json  892.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.json  889.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.json  888.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.json  887.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.json  886.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.json  886.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.json  886.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.json  886.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.mp4  885.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.json  885.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.json  884.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.json  884.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.json  883.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.json  882.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.json  882.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.json  882.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.json  881.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.json  881.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.json  879.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.json  879.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.json  878.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.json  878.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.json  878.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.json  878.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.json  877.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.json  877.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.json  877.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.json  877.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.json  875.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.json  874.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.json  874.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.json  874.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.json  874.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.json  873.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.json  872.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.json  872.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.json  872.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.json  872.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.json  871.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.json  870.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.json  869.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.json  869.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.json  867.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.json  867.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.json  866.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.json  866.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.json  863.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.json  863.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.json  863.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.json  862.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.json  862.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.json  861.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.json  860.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.json  860.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.json  860.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.json  859.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.json  858.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.json  858.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.json  857.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.json  857.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.json  856.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.json  856.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.json  855.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.json  854.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.json  853.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.json  851.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.json  850.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.json  849.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.json  847.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.json  847.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.json  846.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.json  845.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.json  845.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.json  845.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.json  845.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.json  841.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.json  841.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.json  839.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.json  839.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.json  838.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.json  837.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.json  837.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.json  836.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.json  836.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.json  836.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.json  835.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.json  835.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.json  835.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.json  835.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.json  834.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.json  833.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.json  833.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.json  833.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.json  833.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.json  833.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.json  832.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.json  831.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.json  828.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.json  828.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.json  828.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.json  828.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.json  827.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.json  827.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.json  827.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.json  827.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.json  827.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.json  826.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.json  824.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.json  823.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.json  823.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.json  822.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.json  821.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.json  819.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.json  819.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.json  819.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.json  818.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.json  817.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.json  817.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.json  816.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.json  816.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.json  815.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.json  815.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.json  812.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.json  812.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.json  811.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.json  810.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.json  809.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.json  809.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.json  808.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.json  807.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.json  806.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.json  804.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.json  802.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.json  802.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.json  801.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.json  797.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.json  796.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.json  796.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.json  796.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.json  796.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.json  795.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.json  794.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/An Analysis of the Algebraic Group Model.mp4  794.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.json  794.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.json  793.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.json  793.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.json  793.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.json  792.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.json  790.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.json  788.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.json  785.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.json  784.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.json  784.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.json  784.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.json  781.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.json  779.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.json  778.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.json  776.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.json  775.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.json  774.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.json  772.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.json  770.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.json  770.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.json  768.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.json  768.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.json  768.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.json  765.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.json  764.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.json  763.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.json  763.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.json  763.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.json  763.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.json  762.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.json  762.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.json  761.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.json  761.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.json  758.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.json  758.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.json  754.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.json  754.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.json  753.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.json  753.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.json  752.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.json  751.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.json  751.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.json  750.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.json  749.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.json  748.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.json  747.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.json  746.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.json  746.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.json  745.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.json  745.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.json  744.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.json  742.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.json  742.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.json  742.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.json  740.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.json  740.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.json  739.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.json  738.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.json  737.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.json  736.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.json  736.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.json  735.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.json  734.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.json  732.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.json  731.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.json  730.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.json  729.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.json  728.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.json  727.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.json  726.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.json  725.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.json  725.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.json  723.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.json  723.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.json  723.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.json  722.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.json  722.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.json  721.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.json  720.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.json  719.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.json  719.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.json  716.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.json  716.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.json  716.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.json  713.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.json  711.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.json  710.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.json  709.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.json  709.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.json  709.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.json  706.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.json  706.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.json  705.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.json  704.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.json  701.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.json  699.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.json  696.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.json  696.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.json  692.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.json  692.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.json  691.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.json  691.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.json  687.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.json  686.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.json  684.9 KB
 
                
                    - Crypto/Crypto 2022/Constructive Post-Quantum Reductions.mp4  683.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.json  683.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.json  681.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.json  680.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.json  679.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.json  679.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.json  679.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.json  679.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.json  679.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.json  678.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.json  676.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.json  676.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.json  676.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.json  675.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/too short MTS.mp4  674.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.json  673.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.json  672.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.json  669.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.json  669.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.json  668.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.json  667.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.json  666.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.json  665.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.json  662.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.json  662.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.json  662.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.json  661.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.json  659.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.json  657.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.json  654.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.json  653.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.json  652.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.json  651.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.json  650.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.json  648.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.json  648.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.json  647.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.json  645.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.json  645.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.json  644.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.json  639.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.json  638.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.json  638.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.json  635.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.json  634.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.json  631.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.json  629.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.json  625.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.json  622.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.json  622.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.json  622.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.json  619.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.json  618.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.json  618.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.json  616.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.json  616.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.json  616.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.json  611.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.json  609.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.json  608.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.json  607.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.json  603.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.json  598.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.json  596.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.json  593.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.json  590.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.json  585.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.json  585.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.json  585.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.json  585.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.json  584.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.json  582.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.json  582.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.json  580.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.json  579.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.json  576.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.json  574.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.json  573.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.mp4  569.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.json  568.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.json  568.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.json  564.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.json  562.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.json  561.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.json  556.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.json  555.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.json  553.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.json  549.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.json  547.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.json  547.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.json  543.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.json  541.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.json  541.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.json  533.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.json  532.2 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/TPES 2022 Theory and Practice of Encrypted Search.srt  531.0 KB
 
                
                    - Workshops/Unsorted/TPES 2022 Theory and Practice of Encrypted Search.eng.srt  531.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.json  522.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.json  521.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.json  515.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.json  507.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.json  506.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.json  501.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.json  499.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.json  498.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.json  492.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.json  468.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.json  462.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.json  460.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.json  459.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.json  447.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.json  440.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.json  427.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.json  400.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.json  387.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.json  378.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.json  372.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 2 - Session 1 - Morning.eng.srt  347.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.json  344.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.json  344.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.json  344.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.json  328.6 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.json  319.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 1 - Session 2 - Afternoon.eng.srt  308.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Emerging Paradigms 1 & 2 - Post-Quantum Signatures 1 & 2.eng.srt  304.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.json  294.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.json  294.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.json  291.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.json  291.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.json  290.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.json  289.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.json  287.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.json  285.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.json  279.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.json  277.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.json  277.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.json  277.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.json  273.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Rump Session.eng.srt  273.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.json  258.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.json  257.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.json  256.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.json  246.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.json  245.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Attacks - Cryptography in the Ads Ecosystem II - discussion (see description).eng.srt  244.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.json  242.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.json  241.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 3 - Session 2 - Afternoon.eng.srt  234.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.json  227.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.json  225.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.json  220.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.json  219.6 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.json  218.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.json  214.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.json  214.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.json  214.4 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Crypto 2023 rump session.eng.srt  213.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.json  211.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.json  211.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.json  210.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Messaging and Encryption.eng.srt  210.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/CHES Test of Time Award Ceremony - Rump Session.eng.srt  207.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Crypto 2021 Rump Session.eng.srt  207.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Useful Primitives - Cryptography in the Ads Ecosystem I - Lightning Rounds.eng.srt  204.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.json  204.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.json  202.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/From Idea to Impact, the Crypto Story - What's Next.eng.srt  202.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.json  200.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.json  198.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.json  193.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.json  191.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.json  191.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.json  191.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Coding Theory.eng.srt  189.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-99 Rump Session.eng.srt  188.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/CHES 2018 Rump Session.eng.srt  186.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.json  186.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.json  185.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.json  185.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.json  185.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.json  183.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.json  183.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Rump session.eng.srt  182.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.json  181.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Post Quantum Cryptography Theory.eng.srt  181.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Invited talk - Living Between the Ideal and Real Worlds.eng.srt  181.2 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 Contributed Talks II.eng.srt  180.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.txt  180.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 3 - Session 1 - Morning - Part 1.eng.srt  179.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Symmetric Cryptanalysis.eng.srt  179.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Zero Knowledge.eng.srt  178.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 1 - Session 1 - Morning - part 1.eng.srt  177.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/FSE 2024 Rump Session.eng.srt  177.5 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Randomness.eng.srt  177.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.lrc  176.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Privacy and ZKP.eng.srt  176.5 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Advanced Encryption Systems.eng.srt  175.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Crypto for Crypto.eng.srt  175.9 KB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 captions/SKAW 2024 keynote talk by Ian Blumenfeld - session talks part II.eng.srt  175.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.json  175.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Proof Systems.eng.srt  173.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.json  172.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.json  171.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.json  171.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.json  170.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Invited Talk Estimating the Difficulty of Breaking Lattice Based Cryptography.eng.srt  170.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.json  170.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 2 - Session 2 - Afternoon - Part 3.eng.srt  170.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.json  169.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.json  169.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.json  168.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Symmetric Key Theory.eng.srt  167.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.srt  166.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Threshold Cryptography.eng.srt  166.0 KB
 
                
                    - Workshops/WAC 2024 7/WAC 2024 7 captions/WAC7 talks 3 & 4.eng.srt  165.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.json  165.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Zero Knowledge 1 - Advanced Crypto.eng.srt  165.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Best Paper Awards Session.eng.srt  164.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Public Key Cryptography.eng.srt  164.0 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Cryptanalysis II.eng.srt  163.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.json  163.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.json  163.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.txt  163.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Post Quantum Cryptography.eng.srt  162.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Lower Bounds.eng.srt  162.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.json  162.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.json  162.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.json  161.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Security of ECC (Implementations).eng.srt  160.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.lrc  160.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.json  159.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Invited talk I by Kenny Paterson.eng.srt  159.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-22 Invited Talk by Robert N.M. Watson.eng.srt  158.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Secure Messaging.eng.srt  158.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.json  157.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Multi-Party Computation 2.eng.srt  156.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.json  156.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Rump session.eng.srt  155.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Rump Session.eng.srt  155.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.json  155.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 3 - Session 1 - Morning Part 2.eng.srt  155.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.json  155.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Leakage Resilience and Masking Verification.eng.srt  153.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Theory 1.eng.srt  153.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Invited talk - Advances in computer aided cryptography.eng.srt  152.9 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Idealized Models.eng.srt  152.7 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/Sessions I and II.eng.srt  152.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Threshold Cryptography 1.eng.srt  152.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.json  151.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Anonymity Surveillance and Tampering.eng.srt  151.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-34 Award Papers.eng.srt  151.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.json  151.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.vtt  150.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Encryption 3 - Closing remarks.eng.srt  150.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Hardware Security.eng.srt  150.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Thirty Years of Digital Currency - From Digicash to the Blockchain.eng.srt  150.6 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/Session III and Keynote.eng.srt  150.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Welcome opening - Invited talk I by Nadia Heninger.eng.srt  149.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Best Paper Award Session.eng.srt  149.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Commitments.eng.srt  149.3 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Contributed talks.eng.srt  149.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Functional Encryption 1 & 2.eng.srt  149.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Dustin Moody - Post-quantum Cryptography.eng.srt  149.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Opening remarks - Theoretical Foundations.eng.srt  148.8 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk II Janardhan (Jana) Kulkarni  Contributed Talks III.eng.srt  148.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.json  148.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Cryptographic Attacks on Privacy.eng.srt  147.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Opening Remarks - Invited Talk I.eng.srt  147.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.srt  147.4 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Multi-party Computation 4.eng.srt  147.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.json  146.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.json  146.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Network Security and Key Exchange.eng.srt  146.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Signatures 1.eng.srt  145.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Deep Learning Based Side Channel Attacks.eng.srt  144.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Proofs and SNARKs.eng.srt  144.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Best Paper Awards Crypto 2022.eng.srt  144.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.json  144.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Building and Breaking Secure Systems.eng.srt  143.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.txt  143.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Welcome to RWC 2022 - Side-Channel Attacks.eng.srt  143.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Fault Protection Frameworks and SCA Countermeasures.eng.srt  143.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/A Decade (or so) of fully homomorphic encryption, by Craig Gentry.eng.srt  143.2 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Multi-party Computation 2.eng.srt  142.9 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Signatures.eng.srt  142.8 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk I Mariana Raykova  Contributed Talks I.eng.srt  142.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.txt  142.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Homomorphic Encryption.eng.srt  142.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Physical Unclonable Functions.eng.srt  142.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 Quantum Cryptography II.eng.srt  141.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 1 - Session 1 - Morning - part 2.eng.srt  141.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.lrc  141.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secure Messaging.eng.srt  141.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.json  141.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Masking Schemes and their Analysis.eng.srt  141.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.json  141.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.lrc  141.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Practical Fault Injection.eng.srt  140.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Digital Signatures 1.eng.srt  140.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Lower Bounds.eng.srt  139.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.srt  139.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Eurocrypt 2021 opening remarks - best paper awards.eng.srt  139.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Lattice Based Zero Knowledge.eng.srt  138.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.json  138.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/FSE 2022 opening remarks - award papers.eng.srt  138.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.json  138.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Efficient Masking.eng.srt  138.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Post-quantum cryptography 2.eng.srt  138.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.txt  137.8 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 2 Agility for converging to a PQ world.srt  137.8 KB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 captions/GHTC 2022 Round Table 2 Agility for converging to a PQ world.eng.srt  137.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.srt  137.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/An Evolution of Models for Zero-Knowledge Proofs.eng.srt  137.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Privacy.eng.srt  137.3 KB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 captions/SKAW 2024 session talks part I.eng.srt  137.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Functional and Witness Encryption.eng.srt  137.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.json  136.9 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secure Multiparty Computation II.eng.srt  136.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/FHE and MPC.eng.srt  136.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Signatures.eng.srt  136.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.lrc  136.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Zero Knowledge and Forward Secrecy - RWC 2022 Closing Remarks.eng.srt  136.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.vtt  136.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Opening Remarks for RWC 2021 - Secure Channels.eng.srt  135.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Garbled Circuits.eng.srt  135.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.json  135.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Unique Topics.eng.srt  135.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.json  135.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/FSE 2022 Rump Session.eng.srt  135.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Multiparty Computation 1.eng.srt  135.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.txt  135.0 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secure Multiparty Computation I.eng.srt  134.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Invited talk II by Wouter Castryck.eng.srt  134.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Fault Resistance II.eng.srt  134.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Crypto for the People, Invited talk at Crypto 2020 by Seny Kamara.eng.srt  134.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/PQC Protocols and Agility.eng.srt  134.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Award talks.eng.srt  134.0 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Invited Talk by Yehuda Lindell (reuploaded).eng.srt  134.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Multi-party Computation 1.eng.srt  133.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Zero Knowledge Proofs.eng.srt  133.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Cryptanalysis.eng.srt  133.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Opening remarks - Security Models.eng.srt  133.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt2023 Invited Talk Guy Rothblum - Indistinguishable Predictions and Multi-Group Fair Learni.eng.srt  133.3 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Cryptanalysis.eng.srt  133.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Advanced Encryption 2.eng.srt  133.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.lrc  133.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Polynomial Commitments & SNARKs.eng.srt  132.8 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/SNARKs 2.eng.srt  132.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-7 Invited talk by Abhishek Jain.eng.srt  132.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Proof Systems.eng.srt  132.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.json  132.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Quantum Cryptography 2.eng.srt  131.8 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/The future of cryptography.eng.srt  131.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 Blockchain.eng.srt  131.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Invited Talk I (Vanessa Teague).eng.srt  131.4 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/From Idea to Impact, the Crypto Story What's Next.eng.srt  131.3 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Mathematical Assumptions.eng.srt  131.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Real World Protocols.eng.srt  130.8 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Fully Homomorphic Encryption.eng.srt  130.7 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Digital Signatures 3.eng.srt  130.6 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/Panel & Further Discussion.eng.srt  130.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Machine Learning and Side-Channel Analysis II.eng.srt  130.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Foundations.eng.srt  130.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Fully Homomorphic Encryption.eng.srt  130.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Symmetric Cryptanalysis 1.eng.srt  129.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.json  129.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.vtt  129.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/HW Security III.eng.srt  129.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-4 ABE, FE, Obfuscation and Non Traditional Models.eng.srt  129.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Crypto for people.eng.srt  129.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Anonymous Credentials.eng.srt  129.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.json  129.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Composability, Consensus, and Byzantine Agreement.eng.srt  129.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Fast Hardware Implementations and Quantum Circuits.eng.srt  128.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/HW Security I.eng.srt  128.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Crypto - A Key Ingredient to Building Respectful Products.eng.srt  128.8 KB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 captions/CFAIL 2024 invited talk by Gabe Kaptchuk.eng.srt  128.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/MPC.eng.srt  128.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.srt  128.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/IOPs and Succinctness.eng.srt  128.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.tsv  128.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Oblivious Data Access 2.eng.srt  128.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/bootstrap.css  128.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Acceleration and Instruction Set Extensions.eng.srt  128.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage and Outsourced Encryption.eng.srt  128.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Multi-Party Computation 1.eng.srt  128.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.vtt  127.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Quantum Crypto.eng.srt  127.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Invited talk by Orr Dunkelman.eng.srt  127.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Lattice Based Signatures.eng.srt  127.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.txt  127.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.txt  127.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secure Multiparty Computation III.eng.srt  127.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.json  127.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/test of time award session.eng.srt  127.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.lrc  126.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.lrc  126.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.txt  125.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Symmetric Key Cryptanalysis I.eng.srt  125.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Attacks on Symmetric Algorithms I.eng.srt  125.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Quantum Cryptography I.eng.srt  125.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.txt  125.3 KB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 captions/GHTC 2024 Roundtable 4.eng.srt  125.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Invited Talk by Scott Aaronson.eng.srt  124.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Invited talk by Vadim Lyubashevsky.eng.srt  124.5 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Symmetric Cryptography 2.eng.srt  124.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.lrc  124.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Side Channel Metrics and Masking Schemes.eng.srt  124.2 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Zero-knowledge Proofs.eng.srt  124.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.lrc  124.1 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 introductory remarks and round table 1 Crypto Intersects AI.eng.srt  124.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Public-Key Cryptanalysis.eng.srt  123.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Fault Analysis on Post Quantum Cryptography II.eng.srt  123.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Invited talk II by Gaëtan Leurent.eng.srt  123.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.txt  123.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on Theory II and Closing Remarks.eng.srt  123.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Public-key, Functional, & Witness Encryption.eng.srt  123.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Glitches.eng.srt  123.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Key Exchange.eng.srt  122.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.srt  122.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Signatures.eng.srt  122.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.txt  122.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Panel discussion on publications.eng.srt  122.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Attacks on Post-Quantum Implementations II.eng.srt  122.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Obvious in Hindsight - From Side Channel Attacks to the Security Challenges Ahead.eng.srt  122.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.tsv  122.4 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.srt  122.2 KB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 captions/GHTC 2022 Round Table 1 An overview of NIST post-quantum standardization project.eng.srt  122.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Key Exchange and Messaging.eng.srt  122.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Secure Implementations.eng.srt  122.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Side Channels and Backdoors.eng.srt  121.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Invited Talk II (Eike Kiltz).eng.srt  121.8 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Invited talk by Karthik Bhargavan.eng.srt  121.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Invited talk I by Bart Preneel.eng.srt  121.7 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Cryptanalysis of Digital Signatures.eng.srt  121.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.json  121.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.lrc  121.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.lrc  121.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-109 Multi-party Computation I.eng.srt  121.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Tools for SCA and Cryptanalysis.eng.srt  121.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Signatures - Closing Remarks (session-23).eng.srt  120.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.vtt  120.7 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Symmetric Cryptanalysis 2.eng.srt  120.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.json  120.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Machine Learning and Side-Channel Analysis I.eng.srt  120.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-8 Invited Talk by Carmela Troncoso.eng.srt  120.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Invited talk by Zvika Brakerski.eng.srt  120.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.json  120.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Session for award papers.eng.srt  119.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on NTT Implementations.eng.srt  119.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Threshold Signatures.eng.srt  119.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Zero-Knowledge Proofs - Succinctness.eng.srt  119.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Test of Time Award.eng.srt  119.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Signatures.eng.srt  119.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.txt  119.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Isogenies & Applications.eng.srt  119.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Cryptographic Primitives II.eng.srt  119.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Masking (Faults).eng.srt  119.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.txt  118.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Invited talk by Christian Rechberger.eng.srt  118.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Cryptographic Protocols and Secure Computation I.eng.srt  118.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Invited talk Symmetric Cryptography for Long Term Security, by Maria Naya Plasencia.eng.srt  118.3 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Public Key & Advanced Encryption.eng.srt  118.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.json  118.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/MPC for General Functionalities 1 & Functional Encryption 2.eng.srt  117.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Attacks Hardness.eng.srt  117.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.txt  117.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/PQC.eng.srt  117.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/TRNG.eng.srt  117.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.srt  117.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.lrc  117.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.lrc  117.0 KB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 captions/GHTC 2024 introduction - Roundtable 1.eng.srt  116.9 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Invited Talk Privacy in Federated Learning at Scale Gascon, Kairouz, and Bonawitz.eng.srt  116.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Quantum Cryptography 1.eng.srt  116.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/More SCA.eng.srt  116.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Invited talk I by Maria Eichlseder.eng.srt  116.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/SCA (μArch).eng.srt  116.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Real World Protocols.eng.srt  116.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Cryptographic Protocols and Secure Computation II.eng.srt  116.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.tsv  116.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.tsv  116.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Opening remarks - Award papers.eng.srt  116.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.vtt  115.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Symmetric-Key constructions.eng.srt  115.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.lrc  115.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Provable security and attack models.eng.srt  115.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Invited talk II by Sam Jaques.eng.srt  115.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.tsv  115.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Tweakable Block Ciphers.eng.srt  115.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Towards an Open Approach to Secure Cryptographic Implementations (François-Xavier Standaert).eng.srt  115.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Security Proofs.eng.srt  115.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/opening remarks and session on Post-Quantum Cryptography.eng.srt  114.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Attacks on Symmetric Algorithms II.eng.srt  114.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Hardware.eng.srt  114.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattices and Related Problems.eng.srt  114.2 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk III.srt  114.1 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Invited Talk III.eng.srt  114.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/(Zero-Knowledge) Proofs 2.eng.srt  114.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Lower Bounds.eng.srt  113.8 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Invited talk What can we learn from cryptography to develop more trustworthy ML Papernot.eng.srt  113.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Public Key Encryption.eng.srt  113.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Cryptanalysis of Post-Quantum Cryptography.eng.srt  113.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/IACR Distinguished Lecture by Ingrid Verbauwhede.eng.srt  113.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Physical Emissions.eng.srt  113.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on Protocols Key Agreement and Commitments.eng.srt  113.4 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Interactive & Zero-knowledge Proofs.eng.srt  113.3 KB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 captions/GHTC 2024 Roundtable 2.eng.srt  113.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Encryption 2 & Backdoors.eng.srt  113.1 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.json  113.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.srt  113.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Invited Talk by Chris Peikert.eng.srt  113.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/(Zero-knowledge) Proofs 1.eng.srt  112.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Invited talk Secure computation When theory meets.eng.srt  112.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.srt  112.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Cryptographic Protocols - Tools.eng.srt  112.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Homomorphic Cryptography and Other Topics.eng.srt  112.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Code-Based Cryptography.eng.srt  112.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.tsv  112.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-14 Theory.eng.srt  112.3 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 3 Privacy Preserving AI.eng.srt  112.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on Anonymity Verifiability and Robustness.eng.srt  112.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/TLS.eng.srt  112.2 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Phil Rogaway - IACR Distinguished Lecture 2015.eng.srt  112.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Tools for Blockchains.eng.srt  112.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/SNARKs 1.eng.srt  111.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Blockchains.eng.srt  111.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/MPC for Specific Functionalities.eng.srt  111.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/advanced encryption 1.eng.srt  111.4 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk I.srt  111.3 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Invited Talk I.eng.srt  111.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/SNARKs.eng.srt  111.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Our Models and Us.eng.srt  111.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.json  111.2 KB
 
                
                    - Workshops/WAC 2024 7/WAC 2024 7 captions/WAC7 talks 5 & 6.eng.srt  111.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Side-Channel Countermeasures.eng.srt  111.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Masking (Symmetric).eng.srt  110.9 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Private Information Retrieval.eng.srt  110.8 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/New Primitives.eng.srt  110.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.tsv  110.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Side Channel Attacks on Post Quantum Implementations 1.eng.srt  110.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Construction of Random Functions.eng.srt  110.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.txt  110.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Consensus Protocols.eng.srt  110.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Fully Homomorphic Encryption.eng.srt  110.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-37 White box, obfuscation, and logic locking.eng.srt  110.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/PQC IV High-end.eng.srt  110.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Opening Remarks - Award papers.eng.srt  110.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.tsv  109.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Masking Post-Quantum Cryptography I.eng.srt  109.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Isogenies.eng.srt  109.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.srt  109.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.tsv  109.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Isogenies 2.eng.srt  109.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.txt  109.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Sensors Sensors Sensors.eng.srt  109.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Invited Talk with Dustin Moody.eng.srt  109.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Attribute Based Encryption and Friends.eng.srt  109.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.txt  109.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-39 Machine Learning for Side-Channel Attacks.eng.srt  109.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.lrc  108.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.vtt  108.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Opening Remarks - MPC & Secret Sharing (session-2).eng.srt  108.8 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 2 AI and Cryptanalysis.eng.srt  108.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/White-Box Cryptography I.eng.srt  108.6 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.json  108.5 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Side Channels & Leakage.eng.srt  108.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Advanced Encryption.eng.srt  108.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Masking (PQC).eng.srt  108.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Block Chain, Privacy and Law Enforcement.eng.srt  108.2 KB
 
                
                    - Workshops/WAC 2024 7/WAC 2024 7 captions/WAC7 talks 7 & 8.eng.srt  108.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Fast Implementations for Post Quantum Schemes.eng.srt  108.0 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/GHTC 2023/GHTC 2023 round table 4 Lessons Learned.eng.srt  107.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1.eng.srt  107.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.lrc  107.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Secure Outsourcing.eng.srt  107.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Cloud Cryptography.eng.srt  107.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Messaging and Message Franking.eng.srt  107.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/Invited talk by Eran Tromer.eng.srt  107.5 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Symmetric Crypto with Public-Key Applications.eng.srt  107.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Code-based Cryptography.eng.srt  107.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Isogenies and Lattices.eng.srt  107.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.srt  107.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Automated Cryptanalysis I.eng.srt  107.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Opening Remarks - Post-Quantum Cryptography.eng.srt  107.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/PQC III (HW).eng.srt  106.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Quantum Security.eng.srt  106.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Schnorr Signatures and Applications.eng.srt  106.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Invited Talk I (Léo Ducas).eng.srt  106.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.lrc  106.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.json  106.4 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Efficient FHE.eng.srt  106.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-113 Foundations II.eng.srt  106.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Real-world Crypto.eng.srt  106.2 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/IACR Distinguished Lecture Caught in Between Theory and Practice.eng.srt  106.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/PQC V (SCA).eng.srt  106.2 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 4 Lessons Learned.srt  106.2 KB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 captions/GHTC 2022 Round Table 4 Lessons Learned.eng.srt  106.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Panel Discussion on Allyship and Inclusion.eng.srt  106.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.vtt  106.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Leakage.eng.srt  105.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Encryption.eng.srt  105.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.txt  105.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.srt  105.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Masking Techniques II.eng.srt  105.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Proof Systems.eng.srt  105.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Security Models.eng.srt  105.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-13 Physical Attacks, Leakage and Countermeasures.eng.srt  104.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on Lattices.eng.srt  104.9 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Secret Sharing.eng.srt  104.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Functional Encryption and More.eng.srt  104.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/LWE Encryption and Applications.eng.srt  104.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-14 Let’s Get Physical.eng.srt  104.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Theory 2.eng.srt  104.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.txt  104.3 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Invited talk Secure Computation and PPML Progress and Challenges.Vinod Vaikuntanathan.eng.srt  104.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Signatures 1.eng.srt  104.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on multi party computation I.eng.srt  104.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Lattice Algorithms and Cryptanalysis.eng.srt  104.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/multiparty computation 2.eng.srt  103.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.lrc  103.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.tsv  103.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 2 - Session 2 - Afternoon - Part 1.eng.srt  103.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Cryptographic Primitives I.eng.srt  103.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Lattice-based Cryptography.eng.srt  103.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Digital Signatures.eng.srt  103.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Memory Checking, PIR, and Secret Sharing.eng.srt  103.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on interactive proofs.eng.srt  103.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/HW Security II.eng.srt  103.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Enhanced PKE and Time-Lock Puzzles.eng.srt  103.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.tsv  103.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Award Papers.eng.srt  102.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Invited Talk II (Jens Groth).eng.srt  102.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Functional Encryption and Even More.eng.srt  102.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.srt  102.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.vtt  102.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-14 PIR, Encrypted RAM, Commitments.eng.srt  102.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.lrc  102.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Hashing and Hash&Sign.eng.srt  102.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Multi-Party Functional Encryption.eng.srt  102.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/symmetric cryptography 1.eng.srt  102.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Multiparty Computation and Garbled Circuits.eng.srt  102.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.srt  102.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.txt  102.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.vtt  102.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/FSE 2019 Rump Session.eng.srt  102.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Attacks.eng.srt  102.1 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.srt  102.0 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secret Sharing and Secure Multiparty Computation.eng.srt  102.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Public Key Cryptography and Isogenies.eng.srt  101.7 KB
 
                
                    - Workshops/WAC 2024 7/WAC 2024 7 captions/WAC7 introduction - talks 1 & 2.eng.srt  101.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Invited talk by Iftach Haitner.eng.srt  101.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on RISC V.eng.srt  101.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.txt  101.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Homomorphic Crypto & LWE.eng.srt  101.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Encryption.eng.srt  101.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.lrc  101.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Non-Interactive Multi-party Computation.eng.srt  101.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on OT, PIR, and Secret Sharing.eng.srt  101.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Quantum Cryptanalysis.eng.srt  101.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Provable security.eng.srt  101.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/MPC for General Functionalities 2.eng.srt  101.2 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Threshold Cryptography 2.eng.srt  101.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Multiparty Computation.eng.srt  101.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Multi-party Computation 3.eng.srt  101.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Invited talk Building OpenTitan by Dominic Rizzo, Google.eng.srt  101.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Succinct Arguments.eng.srt  100.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Lattice-Based Signatures & Elliptic-Curve Cryptography.eng.srt  100.5 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 invited talk III by Nishanth Chandran.eng.srt  100.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.lrc  100.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Zero Knowledge 2.eng.srt  100.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Cryptography.eng.srt  100.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Side Channel Attacks and Masking.eng.srt  100.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Practical Cryptography 2.eng.srt  100.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/ORAM 2.eng.srt  100.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.tsv  99.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Cryptocurrency.eng.srt  99.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Crypto 2023 Best Paper Plenary.eng.srt  99.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Public Key and Messaging.eng.srt  99.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-39 Invited Talk 2 by Yu Yu.eng.srt  99.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-20 Zero Knowledge, OT, Key Management.eng.srt  99.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/SCA (Power).eng.srt  99.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Lattices and Codes.eng.srt  99.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on multi party computation II.eng.srt  99.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-6 Multiparty Computation.eng.srt  99.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/MPC and Proofs.eng.srt  99.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.vtt  99.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Blockchains and Cryptocurrencies.eng.srt  99.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.srt  99.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Rump session.eng.srt  99.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 3.eng.srt  99.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Constructions.eng.srt  99.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/SNARKs and NIZKs - Key Exchange (session-74).eng.srt  99.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Opening Remarks - Signatures.eng.srt  99.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Theoretical Foundations 2.eng.srt  98.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/non interactive zero knowledge.eng.srt  98.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Oblivious Data Access 1.eng.srt  98.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Isogenies 1.eng.srt  98.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.txt  98.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Linear Layers.eng.srt  98.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/symmetric key cryptanalysis 2.eng.srt  98.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.eng.srt  98.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Isogenies.eng.srt  98.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Time-released Cryptography and Passwords.eng.srt  98.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Secret Sharing.eng.srt  98.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Efficient Zero-Knowledge.eng.srt  98.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-37 Invited Talk by Kazue Sako.eng.srt  98.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Information-Theoretic Security.eng.srt  98.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Theory of Public-Key Cryptography.eng.srt  98.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.vtt  98.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Advanced Public-Key Encryption.eng.srt  98.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-17 Advanced Encryption and Signatures.eng.srt  98.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Crypto 2023 IACR Distinguished Lecture Hugo Krawczyk.eng.srt  98.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Eurocrypt 2021 rump session part deux.eng.srt  97.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.lrc  97.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Symmetric Designs and Leakage-Resilience.eng.srt  97.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Consensus 2.eng.srt  97.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Signature Schemes 2.eng.srt  97.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Homomorphic Encryption I.eng.srt  97.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Anonymity - Closing Remarks.eng.srt  97.3 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Invited Talk II.srt  97.3 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Invited Talk II.eng.srt  97.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Encryption.eng.srt  97.2 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL invited talk.eng.srt  97.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Improved single-round secure multiplication using regenerating codes.eng.srt  97.2 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Quantum Cryptanalysis.eng.srt  97.1 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/PPML Contributed Talks.eng.srt  97.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Universal Hashing and Authenticated Encryption.eng.srt  97.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Isogenies & Elliptic Curves.eng.srt  96.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Symettric Designs 1.eng.srt  96.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Symmetric I.eng.srt  96.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Fully Homomorphic Encryption.eng.srt  96.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.srt  96.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Practical Cryptography 3 and Closing Remarks.eng.srt  96.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-34 Attacks against Classical PKC.eng.srt  96.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.tsv  96.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-Party Computation 1.eng.srt  96.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.txt  96.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.vtt  96.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.tsv  96.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.srt  96.1 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.srt  96.1 KB
 
                
                    - Workshops/GHTC 2022/GHTC 2022 captions/GHTC 2022 Round Table 3 Crypto Agility in the context of lightweight primitives.eng.srt  96.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Statistical cryptanalysis of block ciphers.eng.srt  96.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Attribute-based Encryption.eng.srt  96.0 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/Keynote by Eli Ben-Sasson.eng.srt  95.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Invited talk Contextual Integrity.eng.srt  95.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/zero knowledge 1.eng.srt  95.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Zero-Knowledge Proofs, Threshold and Multi-Signatures.eng.srt  95.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Blockcipher cryptanalysis.eng.srt  95.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Homomorphic Encryption.eng.srt  95.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Secure Multi-Party Computation.eng.srt  95.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Messaging & Compromised Creds - (4 Talks) E2EE for Messenger and IETF MLS Standard for Group Messaging and Credential Stuffing and Checking Compromised Credentials.eng.text  95.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-12 Multi-party Computation II.eng.srt  94.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Constructions of MPC.eng.srt  94.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Symmetric Cryptanalysis (I).eng.srt  94.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Zero Knowledge, Property-Preserving Hashing and ORAM.eng.srt  94.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.lrc  94.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Panel Discussion on Contact Tracing.eng.text  94.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Lattice Problems and Their Complexity 2.eng.srt  94.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-111 Quantum II.eng.srt  94.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Bootstrapping.eng.srt  94.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Welcome - PQC I (Embedded).eng.srt  94.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-16 Post-quantum crypto (part II).eng.srt  94.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Pairings.eng.srt  94.3 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Automating the Development of Chosen Ciphertext Attacks.eng.srt  94.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Award talks.eng.srt  94.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Symmetric Cryptanalysis (II).eng.srt  94.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Quantum Protocols 2.eng.srt  94.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-5 Post-Quantum Cryptography.eng.srt  94.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Cryptanalysis.eng.srt  93.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Side Channels 2.eng.srt  93.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-16 Public-Key Cryptanalysis & Authenticated Key Exchange.eng.srt  93.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.vtt  93.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/MPC Round Efficiency 1.eng.srt  93.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/CFRG Meeting.eng.text  93.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Faults (PQC).eng.srt  93.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Codes and Extractors.eng.srt  93.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Cryptanalysis.eng.srt  93.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.json  92.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Gadgets I.eng.srt  92.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Quantum Cryptography.eng.srt  92.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Lattice Constructions.eng.srt  92.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Leakage Resilience.eng.srt  92.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Lattice Cryptanalysis.eng.srt  92.8 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 contributed talks III.eng.srt  92.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.srt  92.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.srt  92.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.vtt  92.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.srt  92.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.json  92.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Secure Hash Functions.eng.srt  92.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.srt  91.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Cryptanalysis 2.eng.srt  91.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-4 Masking.eng.srt  91.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Akamai Faster Forward - Crypto at Scale.eng.srt  91.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-41 Post-quantum Crypto (part III) - CHES 2021 closing remarks.eng.srt  91.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Sequential Functions.eng.srt  91.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.tsv  91.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Isogeny Based Cryptography.eng.srt  91.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Real-World Protocols.eng.srt  91.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-20 Attacks against Real-World Systems.eng.srt  91.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on Theory I Sampling and Friends.eng.srt  91.1 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.txt  91.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Invited talk by Yosuke Todo.eng.srt  91.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Arithmetization-Oriented Ciphers.eng.srt  91.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Provable Security.eng.srt  90.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.tsv  90.8 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 contributed talks II.eng.srt  90.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Group Messaging.eng.srt  90.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Zero-Knowledge.eng.srt  90.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/MILP and Models.eng.srt  90.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Symmetric-Key Cryptanalysis.eng.srt  90.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2023/TCC 2023 captions/Group-Based Crypto.eng.srt  90.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/On Invariant Attacks.eng.srt  90.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Cryptanalysis of authenticated encryption schemes.eng.srt  90.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.json  90.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Software.eng.srt  90.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/NIZKs, Consensus, Delay Functions.eng.srt  90.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/practical cryptography 1.eng.srt  90.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/ignatures.eng.srt  90.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.json  90.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Invited talk 2 by Aggelos Kiayias.eng.srt  89.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Information-Theoretically Secure MPC against Mixed Dynamic Adversaries.eng.srt  89.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Privacy Preserving Primitives & Side Channels - (4 Talks) Telemetry in Firefox and Direct Anonymous Attestation and Cache Attacks on CTR DRBG and PPost-Spectre World.eng.text  89.7 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.lrc  89.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/FHE and IO.eng.srt  89.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Block Cipher Cryptanalysis.eng.srt  89.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.txt  89.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-26 Designing, Implementing, Attacking, and Defending Symmetric Crypto.eng.srt  89.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/ZK Based on DL 2.eng.srt  89.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Partial session on High Order Masking.eng.srt  89.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/True Randomness - Closing Remarks.eng.srt  89.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Masking (RISCV).eng.srt  89.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/quantum algorithms.eng.srt  88.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.json  88.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Symmetric Cryptanalysis.eng.srt  88.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.vtt  88.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.txt  88.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Hash function cryptanalysis.eng.srt  88.5 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Quantum Protocols 1.eng.srt  88.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.vtt  88.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.txt  88.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Stream Ciphers and Cryptanalysis 2.eng.srt  88.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Homomorphic Encryption II.eng.srt  88.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Attacks and New Formalizations of Cryptanalysis.eng.srt  88.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.lrc  87.9 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secure Messaging 2.eng.srt  87.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.lrc  87.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-28 Attacks (and Defenses).eng.srt  87.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.srt  87.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Symmetric II - closing remarks.eng.srt  87.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.lrc  87.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.srt  87.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.tsv  87.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-33 AES and ISA extensions.eng.srt  87.4 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Lattice Problems and Their Complexity 1.eng.srt  87.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.tsv  87.2 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Distributed Algorithms.eng.srt  87.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Threshold Cryptography 1.eng.srt  87.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.tsv  87.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Zero-Knowledge Proofs - Foundations.eng.srt  87.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.vtt  86.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Protocols - Wrap Up.eng.srt  86.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Microarchitectural Leakage Modeling.eng.srt  86.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.tsv  86.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.srt  86.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Rump Session at Eurocrypt 2022.eng.text  86.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Garbling Schemes and Oblivious Transfer.eng.srt  86.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Commitments and Proofs & MPC.eng.srt  86.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Machine Learning.eng.srt  86.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Commitments.eng.srt  86.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.srt  86.1 KB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump Session captions/Crypto 2016 Rump session part 3.eng.srt  86.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-22 Routing, Signatures, Commitments, Timelock.eng.srt  85.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.json  85.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Private Information Retrieval.eng.srt  85.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.vtt  85.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-2 Post-quantum crypto (part I).eng.srt  85.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Quantum Cryptography.eng.srt  85.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.vtt  85.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Practical Attacks.eng.srt  85.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/(Security of) Efficient Exponentiation.eng.srt  85.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.json  85.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.srt  85.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.tsv  85.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Quantum Constructions and Proofs.eng.srt  85.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Encryption 1.eng.srt  85.4 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 invited talk I by Sanjam Garg.eng.srt  85.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/symmetric cryptography 2.eng.srt  85.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Quantum Random Oracle Model.eng.srt  85.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Oblivious Transfer.eng.srt  84.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Public-Key Cryptanalysis.eng.srt  84.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/ORAM 1.eng.srt  84.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/jquery-3.js  84.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.srt  84.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.tsv  84.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.json  84.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.vtt  84.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.srt  84.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Differential Privacy and the People's Data.eng.srt  84.2 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Differential Privacy and the People's Data.eng.srt  84.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secret Sharing 2.eng.srt  84.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Implementation Issues, Masking and Secret Sharing.eng.srt  84.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Rump Session.eng.srt  84.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/session-5 Symmetric Cryptography.eng.srt  84.0 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Symmetric Cryptography 1.eng.srt  83.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Stream Ciphers and Cryptanalysis 1.eng.srt  83.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on IBE and FE.eng.srt  83.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Dealing with Microarchitectural Effects.eng.srt  83.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/The Evolving Crypto War - Jennifer Granick.eng.text  83.5 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Digital Signatures 2.eng.srt  83.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.txt  83.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/ZK Based on DL 1.eng.srt  83.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Efficient MPC Constructions.eng.srt  83.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.eng.srt  83.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Consensus 1.eng.srt  83.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.srt  83.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Secure Quantum Computation with Classical Communication.eng.srt  82.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Algebraic Attacks.eng.srt  82.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.lrc  82.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Fellows Ceremony and Rump Session.eng.text  82.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.txt  82.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Hardness of Non Interactive Differential Privacy from One Way Functions & Risky Traitor Tracing and.eng.srt  81.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/SPDZ2k Efficient MPC mod 2k for Dishonest Majority.eng.srt  81.8 KB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 captions/CFAIL 2024 talks part II.eng.srt  81.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Multiparty Computation.eng.srt  81.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/PQC VI (Speed).eng.srt  81.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Post-Quantum Cryptography in Software II.eng.srt  81.5 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Succinctness 4.eng.srt  81.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Cryptography 2 - (3 Talks) Too Much Crypto and The First Chosen-Prefix Collision on SHA-1 and Adept Secret Sharing.eng.text  81.4 KB
 
                
                    - Workshops/Unsorted/LadderLeak.eng.srt  81.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.tsv  81.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/MPC - Emerging Models 2.eng.srt  81.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.lrc  80.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.vtt  80.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.txt  80.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/MPC Round Efficiency 2.eng.srt  80.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/IACR Distinguished Lecture by Professor Andrew Yao.eng.srt  80.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Signatures 2.eng.srt  80.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.txt  80.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Arguments and Proofs - Closing Remarks.eng.srt  80.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.txt  80.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Post-Quantum Cryptography in Software I.eng.srt  80.6 KB
 
                
                    - Workshops/GHTC 2024/GHTC 2024 captions/GHTC 2024 Roundtable 3.eng.srt  80.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.vtt  80.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.txt  80.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Fault Analysis on Symmetric Algorithms I.eng.srt  80.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-36 IACR Distinguished Lecture by Andrew Yao.eng.srt  80.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.txt  80.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Provable Symmetric Cryptography.eng.srt  80.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.vtt  80.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.lrc  80.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/From Crypto-Paper to Crypto-Currency the Cardano Consensus Layer.eng.srt  80.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Random Oracle 1.eng.srt  80.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.lrc  80.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Differential, Impossible Differential and Neural Distinguishers.eng.srt  80.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Lattice-Based PKC 1.eng.srt  79.9 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Obfuscation.eng.srt  79.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.vtt  79.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Contact Tracing.eng.srt  79.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.srt  79.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.lrc  79.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Dory Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment.eng.srt  79.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Hash Function Cryptanalysis.eng.srt  79.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Quantum FHE Almost As Secure As Classical.eng.srt  79.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Certificates & Enterprise Crypto - (4 Talks) CRLite and Are cert thumbprints unique and Crypto Strategy at ABN AMRO and DiSE Taking Threshold Encryption to Enterprise.eng.text  79.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Crypto for the Cloud.eng.srt  79.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.lrc  79.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.vtt  79.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.json  79.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.lrc  79.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Masking Proofs Are Tight and How to Exploit it in Security Evaluations.eng.srt  79.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.txt  79.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.txt  79.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Random Oracle 2.eng.srt  79.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Non Interactive Secure 2PC in the Offline Online and Batch Settings.eng.srt  78.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2024/Eurocrypt 2024 captions/Tools for Symmetric Cryptanalysis.eng.srt  78.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.txt  78.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Homomorphic Encryption and Encrypted Search.eng.srt  78.8 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Dragonblood A Security Analysis of WPA3's SAE Handshake.eng.srt  78.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.srt  78.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Block Cipher Cryptanalysis (cont.).eng.srt  78.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.srt  78.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.lrc  78.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.tsv  78.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Authenticated Encryption Cryptanalysis.eng.srt  78.6 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/PPML 2023/PPML 2023 invited talk III Sewoong Oh.eng.srt  78.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.vtt  78.2 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.txt  78.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-9 Zero Knowledge and Proof Systems.eng.srt  78.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.json  78.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Succinctness 3.eng.srt  77.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.vtt  77.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.lrc  77.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/New designs and efficient implementations.eng.srt  77.8 KB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump Session captions/Crypto 2016 Rump Session Part 1.eng.srt  77.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-12 Avant-garde crypto and protocols.eng.srt  77.8 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Rump session part II.eng.srt  77.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.tsv  77.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.srt  77.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.srt  77.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Non-malleable Commitments and Obfuscation.eng.srt  77.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.lrc  77.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric-Key Cryptanalysis 2.eng.srt  77.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on quantum cryptography.eng.srt  77.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Prospects for a Quantum Factoring Machine.eng.srt  77.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Lattice Based SNARGs and Their Application to More Efficient Obfuscation.eng.srt  77.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Threshold Cryptography 2.eng.srt  77.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Stream ciphers.eng.srt  77.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secure Messaging 1.eng.srt  77.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Pinning Down - Privacy - in Statistical Databases.eng.text  77.1 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.lrc  77.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Isogenies and Applications.eng.srt  77.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Post Quantum Crypto 1.eng.srt  77.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Applied Cryptography and Side Channels.eng.srt  76.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Post-Quantum ZK 1.eng.srt  76.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.txt  76.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Succinctness 2.eng.srt  76.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.srt  76.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Symmetric Design 3.eng.srt  76.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Classification of Designs and Components - AES-like Hashing Cryptanalysis.eng.srt  76.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Lattice Cryptography.eng.srt  76.2 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/Session IV Attacks on Standards.eng.srt  76.2 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 contributed talks IV.eng.srt  76.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.txt  76.1 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.srt  76.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Hash Function Cryptanalysis.eng.srt  75.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Wireless Protocol Security - (3 Talks) Model-Checking 5g and Dragonfly Handshake of WPA3 and EAP-pwd and Message Authentication for the Galileo Open Service.eng.text  75.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.lrc  75.6 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).eng.srt  75.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/MPC - Emerging Models 1.eng.srt  75.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.vtt  75.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.lrc  75.2 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.tsv  75.2 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities 081719.eng.srt  75.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Covert Learning How to Learn with an Untrusted Intermediary.eng.srt  75.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Homomorphic encryption 2.eng.srt  75.0 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/A perspective on standardization of advanced cryptography at NIST.eng.srt  74.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.tsv  74.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.srt  74.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Adaptive partitioning.eng.srt  74.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.txt  74.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Group Based Secure Computation Optimizing Rounds, Communication, and Computation.eng.srt  74.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.txt  74.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Sharon Goldberg.eng.srt  74.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.vtt  74.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Invited talk 2 by Mehdi Tibouchi.eng.srt  74.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Symmetric Designs.eng.srt  74.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Quantum authentication with key recycling.eng.srt  74.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.srt  74.2 KB
 
                
                    - Crypto/Crypto 2016 Rump Session/Crypto 2016 Rump Session captions/Crypto 2016 Rump session part 2.eng.srt  74.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Attacks on Post-Quantum Implementations III.eng.srt  73.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.lrc  73.8 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Biased Nonce Sense Lattice attacks against weak ECDSA signatures in the wild.eng.srt  73.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Post Quantum Crypto 2.eng.srt  73.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/handlebars.js  73.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.txt  73.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Authenticated Key Exchange.eng.srt  73.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/invited talk by Damien Stehlé.eng.srt  73.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.txt  73.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secret Sharing 1.eng.srt  73.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Real World Cryptography.eng.srt  73.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.lrc  73.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side Channel Attacks on Post Quantum Implementations I.eng.srt  73.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Whitebox Cryptography.eng.srt  73.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.tsv  73.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.tsv  73.2 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Quantum Security.eng.srt  73.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.txt  73.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.srt  73.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/One Shot Verifiable Encryption from Lattices.eng.srt  73.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.vtt  73.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.lrc  73.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 2.eng.srt  73.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Quantum Cryptography 1.eng.srt  73.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.txt  72.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Fully-succinct Publicly Verifiable Delegation from Constant-Size Assumptions.eng.srt  72.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.lrc  72.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.lrc  72.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Design and Analysis of Tweakable Block Ciphers.eng.srt  72.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-6 Ask Me Anything (AMA) with Colin O’Flynn.eng.srt  72.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.srt  72.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/New Constructions 1.eng.srt  72.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.tsv  72.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Boomerang and Rectangle Attacks 2.eng.srt  72.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Updatable Public Key Encryption in the Standard Model.eng.srt  72.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions.eng.srt  72.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.tsv  72.0 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/Fault Attacks on CCA-secure Lattice KEMs.eng.srt  72.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.tsv  72.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-Party Computation 3.eng.srt  71.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Whitebox I (Theory).eng.srt  71.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.lrc  71.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On Derandomizing Yao’s Weak-to-Strong OWF Construction.eng.srt  71.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.txt  71.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.txt  71.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.txt  71.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice Cryptanalysis.eng.srt  71.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.tsv  71.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.vtt  71.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.srt  71.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.json  71.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.vtt  71.4 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.txt  71.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.srt  71.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Functional Encryption and Attributed-based Encryption.eng.srt  71.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.txt  71.2 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.srt  71.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Formal Analysis.eng.srt  71.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Cryptanalysis (1).eng.srt  71.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.json  71.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.lrc  71.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Consensus Protocols.eng.srt  71.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/zero knowledge 2.eng.srt  71.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Cryptanalysis of ARX Ciphers Recent Developments and Open Questions by Siwei Sun.eng.srt  71.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.txt  70.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.vtt  70.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Masking Techniques I.eng.srt  70.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Structure-preserving Cryptography.eng.srt  70.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Ben Kreuter.eng.srt  70.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/NIZK and SNARKs.eng.srt  70.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.lrc  70.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.lrc  70.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.lrc  70.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.srt  70.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.tsv  70.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Trevor Perrin.eng.srt  70.5 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/The 9 Lives of Bleichenbacher's CAT New Cache ATtacks on TLS Implementations 081719.eng.srt  70.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Multitarget decryption failure attacks and their application to Saber and Kyber.eng.srt  70.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/COA-Secure Obfuscation and Applications.eng.srt  70.4 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.txt  70.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.txt  70.3 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.lrc  70.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-1 Welcome - Foundations I.eng.srt  70.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.vtt  70.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.srt  70.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.lrc  70.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.txt  70.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Stefano Tessaro.eng.srt  70.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Hardware - (3 Talks) Everybody be cool and TPM-Fail TPM meets Timing and Lattice Attacks and Protecting Memory Contents on ARM Cores.eng.text  70.1 KB
 
                
                    - Workshops/Unsorted/Weaknesses in the Moscow Internet voting system.eng.srt  70.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.txt  70.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on secret sharing and ORAM.eng.srt  70.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Tight Security Bounds for Micali’s SNARGs.eng.srt  70.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Foundations.eng.srt  70.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.srt  70.0 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/Towards Standardizing Zero Knowledge.eng.srt  69.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.json  69.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Masking Post-Quantum Cryptography II.eng.srt  69.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.lrc  69.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Attribute Based and Fully Homomorphic Encryption.eng.srt  69.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Cryptography 2.eng.srt  69.7 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.vtt  69.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.lrc  69.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.lrc  69.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.vtt  69.4 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Quantum Cryptography 2.eng.srt  69.4 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Attacks on Post-Quantum Crypto.eng.srt  69.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.lrc  69.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Random-Index PIR and Applications.eng.srt  69.3 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Rump session part I.eng.srt  69.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Tor and Circumvention - Lessons Learned, by Roger Dingledine.eng.text  69.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Post-Quantum Encryption.eng.srt  69.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-Party Computation 2 (continued).eng.srt  69.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Signature Schemes 1 (cont.).eng.srt  69.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Carmela Troncoso.eng.srt  69.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Multi Theorem Preprocessing NIZKs from Lattices.eng.srt  69.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Symmetric Design 2.eng.srt  68.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Fault Analysis on Symmetric Algorithms II.eng.srt  68.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.srt  68.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.vtt  68.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.srt  68.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.srt  68.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Eli Ben-Sasson.eng.srt  68.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/White-Box Cryptography II.eng.srt  68.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Cryptography 1.eng.srt  68.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Cryptanalysis.eng.srt  68.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Cryptographic Applications.eng.srt  68.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Lattice Cryptanalysis.eng.srt  68.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on encryption galore.eng.srt  68.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The future of cryptography.eng.text  68.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Committing Security.eng.srt  68.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Elaine Shi.eng.srt  68.2 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/Computer aided Verification and Software Synthesis for Secure Multi Party Computation Protocols 0818.eng.srt  68.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Algebraic and Integral Attacks 1.eng.srt  68.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Optimizing Authenticated Garbling for Faster Secure Two Party Computation.eng.srt  68.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-30 Ask Me Anything (AMA) with Bart Preneel.eng.srt  68.1 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/FragAttacks Aggregation and Fragmentation Flaws in Wi-Fi.eng.srt  68.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.srt  67.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Policy-Compliant Signatures.eng.srt  67.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.txt  67.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump session part 1.eng.text  67.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.vtt  67.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/MML and Cryptography - (3 Talks) Deep Learning Security Nugdes and CrypTen a MLframework for secure computing and Homomorphic ML Big Data Pipeline.eng.text  67.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.json  67.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.lrc  67.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.srt  67.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.txt  67.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Helena Handschuh.eng.srt  67.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Sessions I and II.eng.text  67.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.srt  67.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.tsv  67.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.srt  66.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.srt  66.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Valeria Nikolaenko.eng.srt  66.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/ECC.eng.srt  66.6 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/HomomorphicEncryption.org - a community effort.eng.srt  66.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.lrc  66.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Humans, Policy, and Crypto.eng.srt  66.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.tsv  66.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Post-Quantum ZK 2.eng.srt  66.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Leakage Resilience.eng.srt  66.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Opening remarks and Best Paper Award talk.eng.srt  66.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.txt  66.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.tsv  66.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.json  66.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.tsv  66.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.srt  66.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Pairings.eng.srt  66.3 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.srt  66.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.vtt  66.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Raluca Ada Popa.eng.srt  66.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.srt  66.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto 2020 Session III and Keynote.eng.text  66.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.txt  66.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.vtt  65.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Eurocrypt 2016 Rump Session.eng.text  65.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.vtt  65.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.srt  65.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.srt  65.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.srt  65.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Jeremiah Blocki.eng.srt  65.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.tsv  65.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.txt  65.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.vtt  65.6 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/Advanced Cryptography on the Way to Practice.eng.srt  65.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Batching Base Oblivious Transfers.eng.srt  65.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Tancrede Lepoint.eng.srt  65.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.lrc  65.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.txt  65.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.srt  65.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Evan Jeffrey.eng.srt  65.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.lrc  65.4 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.tsv  65.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.json  65.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Faults, Tampering and Non-Malleability.eng.srt  65.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Forward Secret Encrypted RAM Lower Bounds and Applications.eng.srt  65.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Anja Lehmann.eng.srt  65.2 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/Baby Sharks Small-Subgroup Attacks to Disrupt Large Distributed Systems.eng.srt  65.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Pseudorandom Functions.eng.srt  65.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Fault Resistance I.eng.srt  65.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The End of Crypto.eng.text  65.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.lrc  65.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Boolean Searchable Symmetric Encryption with Worst Case Sub Linear Complexity.eng.srt  65.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Invited talk by Jian Guo.eng.srt  64.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Symmetric Design 2 (cont.).eng.srt  64.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.lrc  64.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.tsv  64.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.tsv  64.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Out of Band Authentication in Group Messaging Computational, Statistical, Optimal.eng.srt  64.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Disappearing Cryptography in the Bounded Storage Model.eng.srt  64.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.srt  64.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Cryptography with Updates.eng.srt  64.6 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.vtt  64.6 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/Partitioning Oracle Attacks.eng.srt  64.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Formal Abstractions for Attested Execution Secure Processors.eng.srt  64.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.tsv  64.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.vtt  64.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Traitor Tracing Schemes.eng.srt  64.5 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 invited talk II by Kunal Talwar.eng.srt  64.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Anna Lysyanskaya.eng.srt  64.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/A New Security Notion for PKC in the Standard Model Weaker, Simpler, and Still Realizing Secur.eng.srt  64.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Game-Theoretic Fairness Meets Multi-Party Protocols The Case of Leader Election.eng.srt  64.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.srt  64.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Leakage and Faults.eng.srt  64.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Berstein Bound on WCS is Tight Repairing Luykx Preneel Optimal Forgeries.eng.srt  64.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.tsv  64.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Anamorphic Encryption Private Communication against a Dictator.eng.srt  64.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.vtt  64.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.txt  64.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Symmetric Design.eng.srt  64.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.txt  64.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.vtt  63.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.srt  63.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Dynamic Ad Hoc Clock Synchronization.eng.srt  63.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.srt  63.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs.eng.srt  63.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/GGH15 Beyond Permutation Branching Programs Proofs, Attacks and Candidates.eng.srt  63.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on ABE and FE.eng.srt  63.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/(Zero-Knowledge) Proofs 1 (cont).eng.srt  63.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.vtt  63.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Cryptography 1 (continued).eng.srt  63.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Efficient MPC Constructions (cont.).eng.srt  63.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.tsv  63.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Faults (Symmetric).eng.srt  63.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/A Simple Obfuscation Scheme for Pattern Matching with Wildcards.eng.srt  63.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Correcting Subverted Random Oracles.eng.srt  63.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.eng.srt  63.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Grafting Key Trees Efficient Key Management for Overlapping Groups.eng.srt  63.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.lrc  63.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Alzette a 64-bit ARX-box (feat. CRAX and TRAX).eng.srt  63.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.lrc  63.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Quantum Secure Symmetric Key Cryptography Based on Hidden Shifts.eng.srt  63.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Luca De Feo.eng.srt  63.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.tsv  63.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.srt  63.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.tsv  63.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Gadgets II.eng.srt  63.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.txt  63.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.vtt  63.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity.eng.srt  63.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Correlated Pseudorandomness.eng.srt  63.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Depth Robust Graphs and Their Cumulative Memory Complexity.eng.srt  62.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Protecting TLS from legacy crypto, Karthikeyan Bhargavan.eng.text  62.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Lattice-Based PKC 2.eng.srt  62.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Limits of Practical Sublinear Secure Computation.eng.srt  62.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Session on Isogenies.eng.srt  62.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.srt  62.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Cryptanalysis (continued).eng.srt  62.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.srt  62.5 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Sublinear Proofs.eng.srt  62.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Sponge and Duplex.eng.srt  62.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.lrc  62.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.tsv  62.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.tsv  62.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model.eng.srt  62.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.vtt  62.1 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/Opening remarks and - Oh Non Quel Malheur Standard Techniques Fail for the Prime-.eng.srt  62.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Fast Message Franking From Invisible Salamanders to Encryptment.eng.srt  62.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.txt  62.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.txt  62.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Faster Homomorphic Linear Transformations in HElib.eng.srt  61.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On the Exact Round Complexity of Secure Three Party Computation.eng.srt  61.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.tsv  61.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.txt  61.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Proofs of Work from Worst Case Assumptions.eng.srt  61.8 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 3 (part II).srt  61.6 KB
 
                
                    - Workshops/WAC 2022 5/WAC 2022 5 captions/WAC5 2022 Session 3 (part II).eng.srt  61.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.vtt  61.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.tsv  61.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Symmetric Crypto 1 - (2 Talks) Attacks only get better and The case of OCB2 and All on Deck.eng.text  61.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Hardware Security.eng.text  61.6 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Breaking the Bluetooth Pairing Fixed Coordinate Invalid Curve Attack 081719.eng.srt  61.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.vtt  61.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/session on succinct proofs.eng.text  61.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.lrc  61.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Oblivious Transfer (cont.).eng.srt  61.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.srt  61.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.lrc  61.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.vtt  61.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Patrick Longa.eng.srt  61.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Random Generators.eng.srt  61.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.lrc  61.3 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Provably Secure Symmetric Constructions 2.eng.srt  61.2 KB
 
                
                    - Workshops/Unsorted/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.srt  61.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Non-Malleable Time-Lock Puzzles and Applications.eng.srt  61.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Obvious in Hindsight From Side Channel Attacks to the Security Challenges Ahead.eng.text  61.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Side-Channel Evaluation and Distinguishers.eng.text  61.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.txt  61.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.tsv  61.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.eng.srt  61.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.vtt  60.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Eurocrypt 2023 Rump Session (part 2).eng.text  60.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.vtt  60.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwi.eng.srt  60.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Private Puncturable PRFs From Standard Lattice Assumptions.eng.srt  60.6 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Theoretical Foundations 1.eng.srt  60.6 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.vtt  60.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.txt  60.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.vtt  60.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Luby-Rackoff Backwards with More Users and More Security.eng.srt  60.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.tsv  60.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.tsv  60.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Fast Homomorphic Evaluation of Deep Discretized Neural Networks.eng.srt  60.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.lrc  60.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Block Cipher Cryptanalysis II.eng.srt  60.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.txt  60.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.vtt  60.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-10 Ask Me Anything (AMA) with Tanja Lange.eng.srt  60.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.vtt  60.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CHES 2016 Panel Discussion.eng.text  60.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Joppe Bos.eng.srt  60.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve.eng.srt  60.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Fast Large Scale Honest Majority MPC for Malicious Adversaries.eng.srt  60.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.lrc  60.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.tsv  60.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On the Local Leakage Resilience of Linear Secret Sharing Schemes.eng.srt  60.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.vtt  60.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.tsv  60.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.tsv  60.0 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.tsv  59.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Blockchains and Distributed Ledgers - (3 Talks) Payment-Channel Networks and Arithmetization-Oriented Primitives and Detecting Money Laundering Activities.eng.text  59.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Removing the Strong RSA Assumption from Arguments over the Integers.eng.srt  59.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Ask Me Anything with Joan Daemen, Yuval Yarom, and Cathie Yun.eng.srt  59.7 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.txt  59.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.txt  59.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.lrc  59.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On the Complexity of Compressing Obfuscation.eng.srt  59.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Non Linear Layers.eng.srt  59.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Improved Private Set Intersection against Malicious Adversaries.eng.srt  59.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.txt  59.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Test of Time Award.eng.srt  59.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the Success Probability of Solving Unique SVP via BKZ.eng.srt  59.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Differential Trail Search and Bounds 2.eng.srt  59.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.vtt  59.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fast FPGA Implementations of Diffie Hellman on the Kummer Surface of a Genus 2 Curve.eng.srt  59.1 KB
 
                
                    - Workshops/SKAW 2024/SKAW 2024 captions/SKAW 2024 welcome - keynote talk by Adrian Stanger.eng.srt  59.1 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.lrc  59.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.tsv  59.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.vtt  59.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Limits on the Power of Garbling Techniques for Public Key Encryption.eng.srt  59.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/A kilobit hidden SNFS discrete logarithm computation.eng.srt  59.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.eng.srt  59.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.eng.srt  58.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.vtt  58.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.lrc  58.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.eng.srt  58.9 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.tsv  58.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.lrc  58.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Faster Secure Two Party Computation in the Single Execution Setting.eng.srt  58.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Quantum Authentication and Encryption with Key Recycling.eng.srt  58.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.eng.srt  58.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.srt  58.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Attribute-based Encryption and Friends (cont.).eng.srt  58.6 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/BLS signatures, hashing to curves, and more dispatches from the IETF.eng.srt  58.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Generically Speeding-Up Repeated Squaring is Equivalent to Factoring Sharp Thresholds for All.eng.srt  58.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Invited Talk with Yuliang Zheng.eng.srt  58.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.txt  58.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.tsv  58.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.tsv  58.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.vtt  58.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/CAPA The Spirit of Beaver Against Physical Attacks.eng.srt  58.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Algebraic and Integral Attacks 2.eng.srt  58.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.vtt  58.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/On dual lattice attacks against small secret LWE and parameter choices in HElib and SEAL.eng.srt  58.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Cutting Through the Complexity of Reverse Engineering Embedded Devices.eng.srt  57.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Hugo Krawczyk.eng.srt  57.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.txt  57.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Differential Privacy.eng.srt  57.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.lrc  57.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.srt  57.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Breaking the Sub Exponential Barrier in Obfustopia.eng.srt  57.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.srt  57.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.eng.srt  57.7 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.vtt  57.6 KB
 
                
                    - Workshops/Unsorted/Practical Decryption exFiltration Breaking PDF Encryption.eng.srt  57.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.vtt  57.5 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Blind Signatures.eng.srt  57.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Contrained PRFs for NC1 in Traditional Groups.eng.srt  57.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.txt  57.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Secure Two-Party Computation - talks 1 3 & 2 3.eng.srt  57.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Block Cipher Cryptanalysis I.eng.srt  57.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/From Laconic Zero Knowledge to Public Key Cryptography.eng.srt  57.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.tsv  57.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.eng.srt  57.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.srt  57.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Towards Bidirectional Ratcheted Key Exchange.eng.srt  57.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lattice Based Zero Knowledge Arguments for Integer Relations.eng.srt  57.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.vtt  57.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/On the hardness of the NTRU problem.eng.srt  57.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.lrc  57.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Round Complexity of Quantum Zero-Knowledge.eng.srt  57.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Formal Verification of Masked Hardware Implementations in the Presence of Glitches.eng.srt  57.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.lrc  57.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Linear Repairing Codes and Side Channel Attacks.eng.srt  56.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.srt  56.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Constrain't hiding constrained PRFs for NC1 from LWE.eng.srt  56.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On Distributional Collision Resistant Hashing.eng.srt  56.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.srt  56.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Fast Distributed RSA Key Generation for Semi Honest and Malicious Adversaries.eng.srt  56.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2023/Eurocrypt 2023 captions/Fully Homomorphic Encryption (cont.).eng.srt  56.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-Party Computation 2.eng.srt  56.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/TinyKeys A New Approach to Efficient Multi Party Computation.eng.srt  56.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Simple Schemes in the Bounded Storage Model.eng.srt  56.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Jon Millican.eng.srt  56.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Cryptanalysis via Algebraic Spans.eng.srt  56.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Time- and Space-Efficient Arguments from Groups of Unknown Order.eng.srt  56.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback.eng.srt  56.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.srt  56.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Invited Talk - Failures of secret key cryptography.eng.text  56.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Statistical Witness Indistinguishability (and more) in Two Messages.eng.srt  56.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.srt  56.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On the Round Complexity of OT Extension.eng.srt  56.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Classical proofs of quantum knowledge.eng.srt  56.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Private Circuits A Modular Approach.eng.srt  55.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Interactive Zero Knowledge Proofs for Composite Statements.eng.srt  55.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.srt  55.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/New Techniques for Obfuscating Conjunctions.eng.srt  55.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.tsv  55.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.tsv  55.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.eng.srt  55.7 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.tsv  55.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.tsv  55.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Amortized Complexity of Zero-Knowledge Proofs Revisited - Achieving Linear Soundness Slack.eng.srt  55.6 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.vtt  55.6 KB
 
                
                    - Workshops/PPML 2024/PPML 2024 captions/PPML 2024 contributed talks I.eng.srt  55.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Consensus Through Herding.eng.srt  55.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Mitch Stoltz.eng.srt  55.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.srt  55.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.eng.srt  55.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.tsv  55.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Verifiable Delay Functions.eng.srt  55.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.eng.srt  55.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr.eng.srt  55.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Cryptanalyses of Candidate Branching Program Obfuscators.eng.srt  55.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/s-198 Mathematics and Cryptography A Marriage of Convenience.eng.text  55.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/On Tightly Secure Non Interactive Key Exchange.eng.srt  55.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Random Sampling Revisited Lattice Enumeration with Discrete Pruning.eng.srt  55.1 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Symmetric Cryptanalysis 2.eng.srt  55.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Welcome - Functional Encryption and Identity Based Encryption.eng.text  55.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Shared presentation at Crypto 2019.eng.srt  54.9 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 4 (part II).srt  54.9 KB
 
                
                    - Workshops/WAC 2022 5/WAC 2022 5 captions/WAC5 2022 Session 4 (part II).eng.srt  54.9 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.srt  54.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.srt  54.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Encrypt or Decrypt To Make a Single Key Beyond Birthday Secure Nonce Based MAC.eng.srt  54.6 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Machine Learning and Security - The Good, the Bad, and the Hopeful.eng.text  54.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Low-Complexity Cryptography.eng.srt  54.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Amortized Complexity of Information Theoretically Secure MPC Revisted.eng.srt  54.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.tsv  54.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.srt  54.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.eng.srt  54.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.txt  54.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Fuzzy Password-Authenticated Key Exchange.eng.srt  54.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.vtt  54.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.eng.srt  54.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre.eng.srt  54.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Limits on Low-Degree Pseudorandom Generators (Or - Sum-of-Squares Meets Program Obfuscation).eng.srt  54.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Sub Linear Lattice Based Zero Knowledge Arguments for Arithmetic Circuits.eng.srt  54.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Encapsulated Search Index - Public-Key, Sub-linear, Distributed, and Delegatable.eng.srt  54.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Cryptanalytic Extraction of Neural Network Models.eng.srt  54.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Lower Bounds for Differentially Private RAMs.eng.srt  54.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Gentry-Wichs Is Tight A Falsifiable Non-Adaptively Sound SNARG.eng.srt  54.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David McGrew.eng.srt  54.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.tsv  54.1 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 rump session part I.eng.srt  54.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Paul Grubbs.eng.srt  54.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Two Round Multiparty Secure Computation Minimizing Public Key Operations.eng.srt  54.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Anonymous, Robust Post-Quantum Public Key Encryption.eng.srt  54.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Generalized Proofs of Knowledge with Fully Dynamic Setup.eng.srt  54.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fine-Grained Cryptography A New Frontier.eng.text  53.9 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Rump session part III.eng.srt  53.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Multi Input Functional Encryption for Inner Products Function Hiding Realizations and Constructions.eng.srt  53.9 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.tsv  53.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Codes for Partial Functions with Manipulation Detection.eng.srt  53.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.srt  53.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Dissection BKW.eng.srt  53.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Embedding the UC Model into the IITM Model.eng.srt  53.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Proofs and Arguments.eng.text  53.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Test of Time Award ceremony.eng.srt  53.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/IACR Distinguished Lecture - Caught in Between Theory and Practice.eng.text  53.7 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/PARASITE PAssword Recovery Attack against Srp Implementations in ThE wild.eng.srt  53.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.eng.srt  53.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Private Join and Compute from PIR with Default.eng.srt  53.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct and Concretely Efficient Proof Systems.eng.text  53.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Round-Optimal Black-Box Protocol Compilers.eng.srt  53.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Differential Trail Search and Bounds 1.eng.srt  53.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Opening Remarks and Number-theoretic Cryptography.eng.text  53.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.txt  53.5 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 3 (part II).srt  53.5 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 3 (part II).eng.srt  53.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/session-98 Quantum I.eng.srt  53.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Uniform Bounds in the Random Permutation, Ideal Cipher, and Generic Group Models.eng.srt  53.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for.eng.srt  53.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/NIZK from LPN and Trapdoor Hash via Approximate-Correlation Intractability.eng.srt  53.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.tsv  53.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.lrc  53.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Duality in Lattice Based Cryptography.eng.text  53.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Rich Saltz.eng.srt  53.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Permutation Based EDM An Inverse Free BBB Secure PRF.eng.srt  53.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Beyond Software Watermarking Traitor-Tracing for Pseudorandom Functions.eng.srt  53.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Security Bound of (E D)WCDM.eng.srt  53.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Snarky Ceremonies.eng.srt  53.0 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.txt  53.0 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/An overview of security topics within RISC-V, by Helena Handschuh.eng.srt  52.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.eng.srt  52.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Quantum Cryptography & Quantum Cryptanalysis.eng.srt  52.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Attacking GlobalPlatform SCP02 compliant Smart Cards Using a Padding Oracle Attack.eng.srt  52.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/PQC II (HW).eng.srt  52.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.eng.srt  52.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On Treewidth, Separators and Yao’s Garbling.eng.srt  52.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.lrc  52.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.txt  52.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.txt  52.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program.html  52.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Mike Hamburg.eng.srt  52.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Test of Time Award Ceremony - Cryptanalysis 1.eng.text  52.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On the Multi-User Security of Short Schnorr Signatures with Preprocessing.eng.srt  52.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.tsv  52.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/BETA Biometric-Enabled Threshold Authentication.eng.srt  52.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.srt  52.5 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.lrc  52.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Order-Fairness for Byzantine Consensus.eng.srt  52.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.vtt  52.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/CacheQuote - Efficiently Recovering Long term Secrets of SGX EPID via Cache Attacks.eng.srt  52.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.eng.srt  52.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.vtt  52.3 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 3 (part I).srt  52.3 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 3 (part I).eng.srt  52.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.lrc  52.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.vtt  52.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.lrc  52.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Algorithm Substitution Attacks State Reset Detection and Asymmetric Modifications.eng.srt  52.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Generation of an RSA Modulus.eng.srt  52.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Invited Talk.eng.text  52.0 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL intro and talk I.eng.srt  52.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Implementation of Linear Layers.eng.srt  52.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Giving an Adversary Guarantees (Or How to Model Designated Verifier Signatures in a Composable.eng.srt  52.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.tsv  51.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Incompressible Encodings.eng.srt  51.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.vtt  51.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On the security of ECDSA with additive key derivation and presignatures.eng.srt  51.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.vtt  51.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/From Collisions to Chosen-Prefix Collisions Application to Full SHA-1.eng.srt  51.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.vtt  51.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/SIFA - Exploiting Ineffective Fault Inductions on Symmetric Cryptography.eng.srt  51.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Trojan-Resilience without Cryptography.eng.srt  51.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.tsv  51.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.vtt  51.7 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Succinctness 1 part II.eng.srt  51.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Reality of Cryptographic Deployments on the Internet.eng.text  51.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Illegitimi Non Carborundum (IACR Distinguished Lecture by Ron Rivest).eng.text  51.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/On Quantum Advantage in Information Theoretic Single-Server PIR.eng.srt  51.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.tsv  51.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/A Note on the Post-Quantum Security of (Ring) Signatures.eng.srt  51.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages.eng.srt  51.4 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/on 4 Talk #1 Incorrectly Generated RSA Keys, by Daniel Shumow.eng.srt  51.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.eng.srt  51.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Algorithms for Supersingular Isogeny Diffie Hellman.eng.srt  51.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Decentralized Anonymous Micropayments.eng.srt  51.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Daniel Franke.eng.srt  51.2 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Award ceremony.eng.srt  51.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Secure and Efficient Software Masking on Superscalar Pipelined Processors.eng.srt  51.1 KB
 
                
                    - Workshops/Unsorted/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.srt  51.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Quantifying the Security Cost of Migrating Protocols to Practice.eng.srt  51.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.eng.srt  51.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.vtt  51.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Quantum Key-length Extension.eng.srt  50.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Stealthy Opaque Predicates in Hardware Obfuscating Constant Expressions at Negligible Overhea.eng.srt  50.9 KB
 
                
                    - Workshops/ACS 2019/ACS 2019 captions/Lessons about Standardization.eng.srt  50.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On the Impossibility of Purely Algebraic Signatures.eng.srt  50.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The first collision for full SHA 1.eng.srt  50.8 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.vtt  50.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Black-Box Non-Interactive Non-Malleable Commitments.eng.srt  50.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.eng.srt  50.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/The More The Merrier Reducing the Cost of Large Scale MPC.eng.srt  50.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Indistinguishability Obfuscation from Simple-to-State Hard Problems New Assumptions, New Techn.eng.srt  50.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Invited talk by Vanessa Teague.eng.srt  50.8 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.srt  50.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.eng.srt  50.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Secret Sharing.eng.srt  50.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Non-Interactive Anonymous Router.eng.srt  50.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/rump session 1.eng.srt  50.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Guaranteed Output in O(sqrt(n)) Rounds for Round-Robin Sampling Protocols.eng.srt  50.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Spin Me Right Round Rotational Symmetry for FPGA Specific AES.eng.srt  50.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/On the Exact Round Complexity of Self Composable Two Party Computation.eng.srt  50.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Shared presentation on Leakage-Resilient Secret Sharing at Crypto 2019.eng.srt  50.6 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.srt  50.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Boomeyong Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES.eng.srt  50.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Fully Homomorphic Encryption from the Ground Up.eng.text  50.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-18 CHES Test-of-Time Award Session.eng.srt  50.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.tsv  50.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Reverse Firewalls for Actively Secure MPCs.eng.srt  50.5 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.txt  50.4 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/CHERI and CHERI-RISC-V, by Simon Moore, University of Cambridge.eng.srt  50.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2023/CHES 2023 captions/Best Paper.eng.srt  50.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three Halves Make a Whole Beating the Half-Gates Lower Bound for Garbled Circuits.eng.srt  50.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Scalable Pseudorandom Quantum States.eng.srt  50.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/A Note on Perfect Correctness by Derandomization.eng.srt  50.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.txt  50.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Hashing Garbled Circuits for Free.eng.srt  50.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.vtt  50.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Provable Security of Tweakable Block Ciphers Based on Substitution Permutation Networks.eng.srt  50.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Simplifying Design and Analysis of Complex Predicate Encryption Schemes.eng.srt  50.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Séta Supersingular Encryption from Torsion Attacks.eng.srt  50.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.eng.srt  50.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Dummy Shuffling against Algebraic Attacks in White-box Implementations.eng.srt  50.2 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.txt  50.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.eng.srt  50.1 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.vtt  50.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-Channel and Fault Attacks.eng.text  50.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.txt  50.0 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.lrc  50.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Low Randomness Masking and Shuffling An Evaluation Using Mutual Information.eng.srt  50.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Silver Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.eng.srt  50.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Practical and Tightly Secure Digital Signatures and Authenticated Key Exchange.eng.srt  50.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Adaptively Secure Computation for RAM Programs.eng.srt  49.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/On the Round Complexity of Secure Quantum Computation.eng.srt  49.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/New Constructions 2.eng.srt  49.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 rump session part III.eng.srt  49.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/The Area-Latency Symbiosis Towards Improved Serial Encryption Circuits.eng.srt  49.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Saber on ARM - CCA secure module lattice based key encapsulation on ARM.eng.srt  49.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Implicit White Box Implementations White Boxing ARX Ciphers.eng.srt  49.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/One-Shot Fiat-Shamir-based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Si.eng.srt  49.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.eng.srt  49.6 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.lrc  49.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.lrc  49.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Trapdoor Functions from the Computational Diffie Hellman Assumption.eng.srt  49.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Chain Reductions for Multi-Signatures and the HBMS Scheme.eng.srt  49.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Encryption Schemes and Secure Channels.eng.text  49.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort.eng.srt  49.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Faster Enumeration-based Lattice Reduction Root Hermite Factor k(1 (2k)) in Time k(k 8 - o(k.eng.srt  49.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.lrc  49.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Masking the GLP Lattice-Based Signature Scheme at Any Order.eng.srt  49.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.eng.srt  49.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Price of Low Communication in Secure Multi Party Computation.eng.srt  49.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Improved cryptanalysis of UOV and Rainbow.eng.srt  49.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/SEAL-Embedded A Homomorphic Encryption Library for the Internet of Things.eng.srt  49.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.eng.srt  49.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/On the Power of Expansion More Efficient Constructions in the Random Probing Model.eng.srt  49.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Diving Deep into the Weak Keys of Round Reduced Ascon.eng.srt  48.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Mac'n'Cheese Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunction.eng.srt  48.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Halo Infinite Proof-Carrying Data from Additive Polynomial Commitments.eng.srt  48.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Computation.eng.text  48.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Round Optimal Secure Multiparty Computation with Honest Majority.eng.srt  48.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Probing Security through Input-Output Separation and Revisited Quasilinear Masking.eng.srt  48.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/New Attacks on LowMC instances with a Single Plain'text Ciphertext pair.eng.srt  48.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/CoCoA Concurrent Continuous Group Key Agreement.eng.srt  48.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Persistent Fault Analysis on Block Ciphers.eng.srt  48.7 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Cryptography, Local Decoding, and Distributed Storage.eng.text  48.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2019/Real World Crypto 2019 captions/Day 2 - Session 2 - Afternoon - Part 2.eng.srt  48.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Multiplicative Masking for AES in Hardware.eng.srt  48.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/1, 2, 3, Fork Counter Mode Variants based on a Generalized Forkcipher.eng.srt  48.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Leonid Reyzin.eng.srt  48.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 rump session part II.eng.srt  48.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Pseudorandom Quantum States.eng.srt  48.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.eng.srt  48.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.txt  48.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Quantum Lightning Never Strikes the Same State Twice.eng.srt  48.5 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 3 (part I).srt  48.5 KB
 
                
                    - Workshops/WAC 2022 5/WAC 2022 5 captions/WAC5 2022 Session 3 (part I).eng.srt  48.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Revisiting Non-Malleable Secret Sharing.eng.srt  48.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptography in Vietnam in the French and American Wars.eng.text  48.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-theorem Designated-Verifier NIZK for QMA.eng.srt  48.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.tsv  48.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy.eng.srt  48.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2024/CHES 2024 captions/Whitebox II.eng.srt  48.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Secure Software Leasing.eng.srt  48.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Dynamic Decentralized Functional Encryption.eng.srt  48.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.txt  48.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs.eng.srt  48.2 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL talk II.eng.srt  48.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Amplifying the Security of Functional Encryption, Unconditionally.eng.srt  48.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Levchin Award Ceremony.eng.srt  48.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Non-Malleable Codes for Bounded Parallel-Time Tampering.eng.srt  48.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Masking in Fine-Grained Leakage Models Construction, Implementation and Verification.eng.srt  48.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.srt  48.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.lrc  48.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short Stickelberger Class Relations and application to Ideal SVP.eng.srt  48.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Efficient Perfectly Secure Computation with Optimal Resilience.eng.srt  47.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Techniques for Traitor Tracing Size N{1 3} and More from Pairings.eng.srt  47.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.vtt  47.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/TARDIS A Foundation of Time-Lock Puzzles in UC.eng.srt  47.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Secure Non-Interactive Reduction and Spectral Analysis of Correlations.eng.srt  47.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.vtt  47.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Engineering Code Obfuscation.eng.text  47.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Boomerang and Rectangle Attacks 1.eng.srt  47.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.lrc  47.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secret Sharing and Information Privacy.eng.text  47.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/EM Analysis in the IoT Context - Lessons Learned from an Attack on Thread.eng.srt  47.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness.eng.srt  47.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/0 RTT Key Exchange with Full Forward Secrecy.eng.srt  47.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/From Minicrypt to Obfustopia via Private Key Functional Encryption.eng.srt  47.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Secret Sharing (continued).eng.srt  47.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Quantum Security Proofs Using Semi-classical Oracles.eng.srt  47.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The ship has sailed - the NIST Post-Quantum Cryptography - competition.eng.text  47.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.txt  47.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability.eng.srt  47.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Bifurcated Cryptography - Folding Competing Cryptosystems into a Single Scheme On Accountabili.eng.srt  47.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Simplifying Game Based Definitions.eng.srt  47.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.eng.srt  47.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Computationally Volume-Hiding Structured Encryption.eng.srt  47.5 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.srt  47.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric Key Cryptanalysis - Automated Tools - talks 2 & 3.eng.srt  47.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.tsv  47.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/ExpFault - An Automated Framework for Exploitable Fault Characterization in Block Ciphers.eng.srt  47.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Multiparty Computation 1.eng.text  47.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.srt  47.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/A New Structural Differential Property of 5 Round AES.eng.srt  47.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Candidate Obfuscation via Oblivious LWE Sampling.eng.srt  47.2 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.vtt  47.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Upslices, Downslices, and Secret-Sharing with Complexity of $1.5n$.eng.srt  47.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Another Look at Provable Security.eng.text  47.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/MPC-Friendly Symmetric Cryptography from Alternating Moduli Candidates, Protocols, and Applica.eng.srt  47.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Searchable Encryption & Updatable Encryption - talk 1 4.eng.srt  47.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.eng.srt  47.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Tight Proofs of Space and Replication.eng.srt  47.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/IACR Membership Meeting Part I.eng.text  47.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Indistinguishability Obfuscation for Turing Machines - Constant Overhead and Amortization.eng.srt  47.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.srt  47.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/On the Concurrent Composition of Quantum Zero-Knowledge.eng.srt  47.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/On the Difficulty of FSM based Hardware Obfuscation.eng.srt  47.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/SeaSign Compact Isogeny Signatures from Class Group Actions.eng.srt  47.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.srt  47.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Award paper session Mind your path.eng.srt  47.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Indistinguishability Obfuscation from LPN over F p, DLIN, and PRGs in NC0.eng.srt  47.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/TLS - (2 Talks) New Cache ATtacks on TLS Implementations and Deco Liberating Web Data Using Decentralized Oracles for TLS.eng.text  46.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Single-Server Private Information Retrieval with Sublinear Amortized Time.eng.srt  46.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On the Concrete Security of TLS 1.3 PSK Mode.eng.srt  46.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/A Compressed Sigma-Protocol Theory for Lattices.eng.srt  46.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Secure Software Leasing Without Assumptions.eng.srt  46.9 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.tsv  46.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/DualRing Generic Construction of Ring Signatures with Efficient Instantiations.eng.srt  46.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/On the Existence of Three Round Zero-Knowledge Proofs.eng.srt  46.8 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.vtt  46.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup.eng.srt  46.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On expected polynomial runtime in cryptography.eng.srt  46.8 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/RISC-V cryptography extensions current status and future plans, Ben Marshall.eng.srt  46.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A Fast and Simple Partially Oblivious PRF, with Applications.eng.srt  46.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Indifferentiable Authenticated Encryption.eng.srt  46.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.tsv  46.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.txt  46.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Models.eng.srt  46.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Information theoretic Indistinguishability via the Chi squared Method.eng.srt  46.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Black Box Parallel Garbled RAM.eng.srt  46.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/An Analysis of NIST SP 800-90A.eng.srt  46.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Cryptanalysis.eng.text  46.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.txt  46.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Time-Memory tradeoffs for large-weight syndrome decoding in ternary codes.eng.srt  46.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.srt  46.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.lrc  46.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.json  46.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Michael Naehrig.eng.srt  46.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.srt  46.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Verifiable Delay Functions.eng.srt  46.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.srt  46.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Counterexamples to New Circular Security Assumptions Underlying iO.eng.srt  46.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.srt  46.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/On the power of multiple anonymous messages Frequency Estimation and Selection in the Shuffle.eng.srt  46.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Rainbow on Cortex-M4.eng.srt  46.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Composition with Knowledge Assumptions.eng.srt  46.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/RASSLE Return Address Stack based Side-channel LEakage.eng.srt  46.4 KB
 
                
                    - Crypto/Crypto 2023 Affiliated Events/CFAIL 2023/CFAIL talk III.eng.srt  46.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Scabbard a suite of efficient learning with rounding key-encapsulation mechanisms.eng.srt  46.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Updatable and Universal Comon Reference Strings with Applications to zk SNARKs.eng.srt  46.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/On Removing Graded Encodings from Functional Encryption.eng.srt  46.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/VOLE-PSI Fast OPRF and Circuit-PSI from Vector-OLE.eng.srt  46.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Quantum Circuits for the CSIDH Optimizing Quantum Evaluation of Isogenies.eng.srt  46.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Constant-round Blind Classical Verification of Quantum Sampling.eng.srt  46.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Stacked Garbling Garbled Circuit Proportional to Longest Execution Path.eng.srt  46.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.vtt  46.3 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 2).eng.text  46.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Optimal Channel Security Against Fine Graine State Compromise The Safety of Messaging.eng.srt  46.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.txt  46.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.lrc  46.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Obfustopia Built on Secret-Key Functional Encryption.eng.srt  46.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Automated Cryptanalysis II.eng.srt  46.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Breaking the Circuit Size Barrier for Secure Computation Under DDH.eng.srt  46.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/A New Public Key Cryptosystem via Mersenne Numbers.eng.srt  46.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.lrc  46.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Advanced Lattice Sieving on GPUs, with Tensor Cores.eng.srt  46.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/LogStack Stacked Garbling with O(b log b) Computation.eng.srt  46.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflagin.eng.srt  46.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Proofs for Inner Pairing Products and Applications.eng.srt  45.9 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Certified Randomness from Quantum Supremacy.eng.text  45.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.srt  45.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Proof-Carrying Data without Succinct Arguments.eng.srt  45.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Zero Knowledge.eng.text  45.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/My other car is your car compromising the Tesla Model X keyless entry system.eng.srt  45.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.srt  45.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier.eng.srt  45.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Subquadratic SNARGs in the Random Oracle Model.eng.srt  45.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A White-Box Masking Scheme Resisting Computational and Algebraic Attacks.eng.srt  45.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptographic Primitives.eng.text  45.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Watermarking PRFs from Lattices Stronger Security via Extractable PRFs.eng.srt  45.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Mitaka A Simpler, Parallelizable, Maskable Variant of Falcon.eng.srt  45.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Post-Quantum Security of the Even-Mansour Cipher.eng.srt  45.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/One-Way Functions Imply Secure Computation in a Quantum World.eng.srt  45.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secure Two Party Computation part I.eng.srt  45.6 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/Session 1 Talk #2 Iterated Inhomogeneous Polynomials, by Jiaxin Guan and Mark Zhandry.eng.srt  45.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/The Distinction Between Fixed and Random Generators in Group-Based Assumptions.eng.srt  45.6 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 4.srt  45.5 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 4.eng.srt  45.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Redeeming Reset Indifferentiability and Applications to Post-Quantum Security.eng.srt  45.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.eng.srt  45.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Four Round Concurrent Non Malleable Commitments from One Way Functions.eng.srt  45.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Fault Injection as an Oscilloscope Fault Correlation Analysis.eng.srt  45.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.eng.srt  45.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.srt  45.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.lrc  45.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Must the Communication Graph of MPC Protocols be an Expander.eng.srt  45.4 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.tsv  45.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/The Cost to Break SIKE A Comparative Hardware-Based Analysis with AES and SHA-3.eng.srt  45.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Subtractive Sets over Cyclotomic Rings Limits of Schnorr-like Arguments over Lattices.eng.srt  45.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Fast Correlation Attack Revisted.eng.srt  45.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Syndrome Decoding Estimator.eng.srt  45.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Concrete quantum cryptanalysis of binary elliptic curves.eng.srt  45.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Comparing the difficulty of factorization and discrete logarithm a 240-digit experiment.eng.srt  45.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Non-Malleability against Polynomial Tampering.eng.srt  45.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/MHz2k MPC from HE over $ mathbb{Z} {2k}$ with New Packing, Simpler Reshare, and Better ZKP.eng.srt  45.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Tight adaptive reprogramming in the QROM.eng.srt  45.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Efficient Lattice-Based Inner-Product Functional Encryption.eng.srt  45.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/White Box Traitor Tracing.eng.srt  45.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.txt  45.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.srt  45.1 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/Current status of RISC-V security mechanisms, Nick Kossifidis, FORTH.eng.srt  45.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Interactive Proofs for Social Graphs.eng.srt  45.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Partitions in the S-Box of Streebog and Kuznyechik.eng.srt  45.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.eng.srt  45.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Cryptanalysis and Concrete Security - Closing Remarks.eng.text  45.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/MoSS Modular Security Specifications Framework.eng.srt  45.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Adaptively Secure MPC with Sublinear Communication Complexity.eng.srt  45.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.txt  45.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.tsv  44.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Memory-Hard Functions from Cryptographic Primitives.eng.srt  44.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.txt  44.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Masking Kyber First- and Higher-Order Implementations.eng.srt  44.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Verifiable Delay Functions and Randomness Extraction.eng.text  44.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Double-block Hash-then-Sum A Paradigm for Constructing BBB Secure PRF.eng.srt  44.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Guaranteed Output Delivery Comes Free in Honest Majority MPC.eng.srt  44.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.eng.srt  44.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing.eng.srt  44.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Ouroboros - A Provably Secure Proof of Stake Protocol.eng.srt  44.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Generic Negation of Pair Encodings.eng.srt  44.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Oblivious Key-Value Stores and Amplification for Private Set Intersection.eng.srt  44.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lattice-Based and Code-Based Cryptography.eng.text  44.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Financially Backed Covert Security.eng.srt  44.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattice.eng.srt  44.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Strong and Tight Security Guarantees against Integral Distinguishers.eng.srt  44.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.lrc  44.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/On ELFs, Deterministic Encryption, and Correlated-Input Security.eng.srt  44.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/The Multi User Security of Authenticated Encryption - AES GCM in TLS 1 3.eng.srt  44.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Cryptanalysis of an oblivious PRF from supersingular isogenies.eng.srt  44.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Rounding in the Rings.eng.srt  44.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.tsv  44.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Probing Security Verification, Composition, Expansion and New Constructions.eng.srt  44.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.eng.srt  44.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.txt  44.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model Better Saf.eng.srt  44.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Concurrently composable security with shielded super polynomial simulators.eng.srt  44.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.eng.srt  44.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.vtt  44.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Non-Malleable Vector Commitments via Local Equivocability.eng.srt  44.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Differential Fault Attacks on Deterministic Lattice Signatures.eng.srt  44.4 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.tsv  44.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.txt  44.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.lrc  44.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Quantum Linearization Attacks.eng.srt  44.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Verified Drop in Replacements for TLS&HTTPS.eng.text  44.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.txt  44.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.txt  44.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Moti Yung.eng.srt  44.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.lrc  44.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.txt  44.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness.eng.srt  44.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Time-Memory Analysis of Parallel Collision Search Algorithms.eng.srt  44.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Decentralized Multi-Authority ABE for DNFs from LWE.eng.srt  44.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.eng.srt  44.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Updatable Signatures and Message Authentication Codes.eng.srt  44.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.lrc  44.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Secure Distance Bounding.eng.text  44.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.txt  44.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Hardware Masking, Revisited.eng.srt  44.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Multiparty Protocols, Secure Computation and Related Primitives.eng.text  44.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Tighter Security for Schnorr Identification and Signatures A High-Moment Forking Lemma for ${.eng.srt  44.0 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/Can we solve timing side-channels in the CPU, Ronan Lashermes, INRIA.eng.srt  44.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On Succinct Non-Interactive Arguments in Relativized Worlds.eng.srt  44.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.lrc  44.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Lattice Reduction with Approximate Enumeration Oracles Practical Algorithms and Concrete Perfo.eng.srt  44.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.eng.srt  44.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Lightning talks.eng.srt  44.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Provably Secure Symmetric Constructions 1.eng.srt  44.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/IACR Award Ceremony.eng.srt  43.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Shared presentation on Fiat-Shamir security at Crypto 2019.eng.srt  43.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/On the Bottleneck Complexity of MPC with Correlated Randomness.eng.srt  43.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Rate-1 Quantum Fully Homomorphic Encryption.eng.srt  43.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Conditional Disclosure of Secrets - Amplification, Closure, Amortization, Lower bounds, and Separatio.eng.srt  43.8 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part III).srt  43.8 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks II (part III).eng.srt  43.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/SSE and SSD Page-Efficient Searchable Symmetric Encryption.eng.srt  43.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Two-Party Adaptor Signatures From Identification Schemes.eng.srt  43.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Does Fiat-Shamir Require a Cryptographic Hash Function.eng.srt  43.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/New Constructions of Reusable Designated-Verifier NIZKs.eng.srt  43.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.lrc  43.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/PrORAM Fast O(log n) Authenticated Shares ZK ORAM.eng.srt  43.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Batching CSIDH Group Actions using AVX-512.eng.srt  43.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.lrc  43.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/From Obfuscation to the Security of Fiat Shamir for Proofs.eng.srt  43.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/On the Possibility of Basing Cryptography on $ EXP - neq - BPP$.eng.srt  43.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.lrc  43.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Multi Input Inner Product Functional Encryption from Pairings.eng.srt  43.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Leakage Certification Revisited Bounding Model Errors in Side-Channel Security Evaluations.eng.srt  43.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Gemini elastic SNARKs for diverse environments.eng.srt  43.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o.eng.srt  43.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Anonymity 1 - talk 1 4.eng.srt  43.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.vtt  43.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.txt  43.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.eng.srt  43.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Uncovering Algebraic Structures in the MPC Landscape.eng.srt  43.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.txt  43.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.lrc  43.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.srt  43.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Garbled Circuits With Sublinear Evaluator.eng.srt  43.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study.eng.srt  43.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.txt  43.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Conditional Cube Attack on Reduced Round Keccak Sponge Function.eng.srt  43.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.vtt  43.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/A Tutorial on High Performance Computing Applied to Cryp.eng.text  43.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 4-Round Keccak-224 256.eng.srt  43.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Toward Fine Grained Blackbox Separations Between Semantic and Circular Security Notions.eng.srt  43.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Smashing the Implementation Records of AES S box.eng.srt  43.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Incremental Program Obfuscation.eng.srt  43.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.eng.srt  43.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.lrc  43.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.tsv  43.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.vtt  43.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yet Another Compiler for Active Security or Efficient MPC Over Arbitrary Rings.eng.srt  43.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.vtt  43.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.eng.srt  43.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Delay Encryption.eng.srt  43.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Theory.eng.srt  43.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.lrc  43.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.vtt  43.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Exact Lattice Sampling from Non-Gaussian Distributions.eng.srt  43.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/KHAPE Asymmetric PAKE from Key-Hiding Key Exchange.eng.srt  42.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Secure Non-interactive Simulation Feasibility - & Rate.eng.srt  42.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Improving Revocation for Group Signature with Redactable Signature.eng.srt  42.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Authentication in the Bounded Storage Model.eng.srt  42.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/New Bleichenbacher Records - Fault Attacks on qDSA Signatures.eng.srt  42.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Concurrent Composition of Differential Privacy.eng.srt  42.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.txt  42.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings.eng.srt  42.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Secure Multiparty Computation with Sublinear Preprocessing.eng.srt  42.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati.eng.srt  42.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.lrc  42.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and E.eng.srt  42.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.txt  42.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors.eng.srt  42.8 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/Session 3 Talk #2 - Row, Row, Row Your Boat How to Not Find Weak Keys in Pilsung.eng.srt  42.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.vtt  42.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Techniques for Zero-Knowledge Leveraging Inefficient Provers to Reduce Assumptions, Intera.eng.srt  42.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.json  42.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.srt  42.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.json  42.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Isogeny-based key compression without pairings.eng.srt  42.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Ciminion Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.eng.srt  42.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Information-Combining Differential Fault Attacks on DEFAULT.eng.srt  42.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Combiners for Backdoored Random Oracles.eng.srt  42.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.srt  42.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.txt  42.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields.eng.srt  42.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo.eng.srt  42.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.vtt  42.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Dismantling the AUT64 Automotive Cipher.eng.srt  42.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.txt  42.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.vtt  42.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Symmetric Key Exchange with Full Forward Security and Robust Synchronization.eng.srt  42.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Password Hashing and Preprocessing.eng.srt  42.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En.eng.srt  42.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/MuSig2 Simple Two-Round Schnorr Multi-Signatures.eng.srt  42.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.eng.srt  42.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.txt  42.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Founding Secure Computation on Blockchains.eng.srt  42.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Key Rotation for Authenticated Encryption.eng.srt  42.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fast reduction of algebraic lattices over cyclotomic fields.eng.srt  42.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/SNARGs for P from Sub-exponential DDH and QR.eng.srt  42.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Efficient Pseudorandom Correlation Generators Silent OT Extension and More.eng.srt  42.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Compact Dilithium Implementations on Cortex-M3 and Cortex-M4.eng.srt  42.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Computational integrity with a public random string from quasi linear PCPs.eng.srt  42.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.eng.srt  42.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/The Rise of Paillier Homomorphic Secret Sharing and Public-Key Silent OT.eng.srt  42.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Computational Entropies via Kullback-Leibler Divergence.eng.srt  42.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/An Algebraic Framework for Universal and Updatable SNARKs.eng.srt  42.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Extending Glitch Free Multiparty Protocols to Resist Fault Injection Attacks.eng.srt  42.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Hidden Cosets and Applications to Unclonable Cryptography.eng.srt  42.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-24 Ask Me Anything (AMA) with Fatemeh Ganji.eng.srt  42.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.lrc  42.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.lrc  42.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On Actively-Secure Elementary MPC Reductions.eng.srt  42.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.vtt  42.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Rasta A Cipher with Low ANDdepth and Few ANDs per Bit.eng.srt  42.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/FSE 2013 Rump Session.eng.text  42.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.txt  42.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.eng.srt  42.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE.eng.srt  42.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.txt  42.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.lrc  42.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Asymmetric PAKE with low computation and communication.eng.srt  42.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.lrc  42.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.tsv  42.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Computing generator in cyclotomic integer rings.eng.srt  42.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Structured Encryption and Dynamic Leakage Suppression.eng.srt  42.0 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Symmetric Cryptanalysis 1.eng.srt  42.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Fast Secure Two Party ECDSA Signing.eng.srt  42.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Beyond Security and Efficiency On-Demand Ratcheting with Security Awareness.eng.srt  42.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Data-Independent Memory Hard Functions New Attacks and Stronger Constructions.eng.srt  41.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Secure Multiparty Computation with Free Branching.eng.srt  41.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.lrc  41.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Tight State-Restoration Soundness in the Algebraic Group Model.eng.srt  41.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.vtt  41.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.eng.srt  41.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Tightness of the Suffix Keyed Sponge Bound.eng.srt  41.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Curse of Small Domains New Attacks on Format Preserving Encryption.eng.srt  41.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.tsv  41.8 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/On Optimal Algorithms and Assumption Factories.eng.text  41.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Updates on Standardization.eng.srt  41.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Memory-Tightness of Authenticated Encryption.eng.srt  41.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/On the Boomerang Uniformity of Cryptographic Sboxes.eng.srt  41.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Small CRT Exponent RSA Revisited.eng.srt  41.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.eng.text  41.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.eng.srt  41.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Influence of the Linear Layer on the Algebraic Degree in SP-Networks.eng.srt  41.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Round-Optimal and Communication-Efficient Multiparty Computation.eng.srt  41.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.txt  41.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography.eng.srt  41.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.txt  41.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/On Recovering Affine Encodings in White Box Implementations.eng.srt  41.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.eng.srt  41.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.txt  41.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Approx-SVP in Ideal Lattices with Pre-processing.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.srt  41.5 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Encrypted Davies Meyer and Its Dual - Towards Optimal Security Using Mirror Theory.eng.srt  41.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.json  41.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/MOE Multiplication Operated Encryption with Trojan Resilience.eng.srt  41.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.txt  41.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.tsv  41.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Fluid MPC Secure Multiparty Computation with Dynamic Participants.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.txt  41.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Linear Cryptanalysis of FF3-1 and FEA.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Cryptanalysis Results on Spook Bringing Full-round Shadow-512 to the Light.eng.srt  41.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sublinear GMW-Style Compiler for MPC with Preprocessing.eng.srt  41.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.txt  41.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.txt  41.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Maximums of the Additive Differential Probability of Exclusive-Or.eng.srt  41.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.lrc  41.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Separating Adaptive Streaming from Oblivious Streaming using the Bounded Storage Model.eng.srt  41.4 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/A Fine Grained Approach to Complexity.eng.text  41.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Witness Authenticating NIZKs and Applications.eng.srt  41.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Power Yoga Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.eng.srt  41.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Efficient Pseudorandom Correlation Generators from Ring-LPN.eng.srt  41.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Message Franking via Committing Authenticated Encryption.eng.srt  41.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.txt  41.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.lrc  41.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Garbling, Stacked and Staggered Faster k-out-of-n Garbled Function Evaluation.eng.srt  41.3 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs, Barbara Gigerl,.eng.srt  41.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Order-C Secure Multiparty Computation for Highly Repetitive Circuits.eng.srt  41.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Breaking Symmetric Cryptosystems using Quantum Period Finding.eng.srt  41.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Divided We Stand, United We Fall Security Analysis of Some SCASIFA Countermeasures Against SC.eng.srt  41.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.json  41.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Unclonable Encryption, Revisited.eng.srt  41.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.vtt  41.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.eng.srt  41.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/A Deeper Look at Machine Learning-Based Cryptanalysis.eng.srt  41.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Lattice-Based Zero-Knowledge Proofs New Techniques for Shorter and Faster Constructions and Ap.eng.srt  41.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Acyclicity Programming for Sigma-Protocols.eng.srt  41.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Two papers on Indistinguishability Obfuscation (soft merge).eng.srt  41.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Non-interactive Non-malleability from Quantum Supremacy.eng.srt  41.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Non-malleable Commitments Against Quantum Attacks.eng.srt  41.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Lightweight, Maliciously Secure Verifiable Function Secret Sharing.eng.srt  41.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Annihilation Attacks for Multilinear Maps - Cryptanalysis of Indistinguishability Obfuscation over GG.eng.srt  41.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unconditionally Secure Computation Against Low-Complexity Leakage.eng.srt  41.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Indistinguishability Obfuscation Without Multilinear Maps New Paradigms via Low Degree Weak Ps.eng.srt  41.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.lrc  41.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.lrc  41.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lunar a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten.eng.srt  41.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.srt  41.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/On the Round Complexity of Black-Box Secure MPC.eng.srt  41.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Anonymous Tokens with Private Metadata Bit.eng.srt  41.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Clustering Related-Tweak Characteristics Application to MANTIS-6.eng.srt  41.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.lrc  40.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme.eng.srt  40.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Quantum Security of NMAC and Related Constructions.eng.srt  40.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.lrc  40.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.json  40.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Traceable PRFs Full Collusion Resistance and Active Security.eng.srt  40.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version Unclonable Polymers and Their Cryptographic Applications.eng.srt  40.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Non-Malleable Codes Against Bounded Polynomial Time Tampering.eng.srt  40.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mathematics and Cryptography A Marriage of Convenience.eng.text  40.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.lrc  40.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Watermarking Public-Key Cryptographic Primitives.eng.srt  40.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Clustering Effect in Simon and Simeck.eng.srt  40.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Product Proofs for Lattice Commitments.eng.srt  40.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.lrc  40.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/SMILE Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential.eng.srt  40.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Masked Triples Amortizing Multiplication Triples across Conditionals.eng.srt  40.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.lrc  40.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Thai Duong.eng.srt  40.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Compressing Proofs of k-Out-Of-n Partial Knowledge.eng.srt  40.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Nearly Optimal Robust Secret Sharing against Rushing Adversaries.eng.srt  40.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.lrc  40.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Rational Modular Encoding in the DCR Setting Non-Interactive Range Proofs and Paillier-Based N.eng.srt  40.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.txt  40.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.srt  40.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.eng.srt  40.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Flexible and Efficient Verifiable Computation on Encrypted Data.eng.srt  40.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Multi-Party Threshold Private Set Intersection with Sublinear Communication.eng.srt  40.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficiently Computing Data Independent Memory Hard Functions.eng.srt  40.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/It Wasn't Me.eng.srt  40.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Invited Talk - How to delegate computations - the power of no-signaling proofs.eng.text  40.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Reversible Proofs of Sequential Work.eng.srt  40.5 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/WAC5 2022 Session 4 (part I).srt  40.5 KB
 
                
                    - Workshops/WAC 2022 5/WAC 2022 5 captions/WAC5 2022 Session 4 (part I).eng.srt  40.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The State of Cryptographic Multilinear Maps.eng.text  40.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Jean Camp.eng.srt  40.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Convexity of division property transitions theory, algorithms and compact models.eng.srt  40.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/FPGAhammer - Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES.eng.srt  40.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Highly Efficient OT-Based Multiplication Protocols.eng.srt  40.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Public-Key Encryption and Generic Models.eng.text  40.4 KB
 
                
                    - IACR logo.png  40.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Asymptotically Quasi-Optimal Cryptography.eng.srt  40.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.txt  40.4 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.txt  40.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.txt  40.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.txt  40.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Atom A Stream Cipher with Double Key Filter.eng.srt  40.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Lower bounds on lattice sieving and information set decoding.eng.srt  40.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Secu.eng.srt  40.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Provably Quantum-Secure Tweakable Block Ciphers.eng.srt  40.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Combining Optimization Objectives New Modeling Attacks on Strong PUFs.eng.srt  40.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/The Communication Complexity of Threshold Private Set Intersection.eng.srt  40.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/QCB Efficient Quantum-secure Authenticated Encryption.eng.srt  40.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model).eng.srt  40.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting Impossibili.eng.srt  40.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of Private Circuits with Quasilinear Randomness.eng.srt  40.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Analysis of Multivariate Encryption Schemes Application to Dob.eng.srt  40.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Ring-based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.eng.srt  40.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.tsv  40.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/BEST YOUNG RESEARCHERS AWARD Quantum Cryptanalysis in the RAM Model Claw-Finding Attacks on SIKE.eng.srt  40.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/XPX - Generalized Tweakable Even Mansour with Improved Security Guarantees.eng.srt  40.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.txt  40.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Polynomial-time targeted attacks on coin-tossing for any number of corruptions.eng.srt  40.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/New security notions and feasibility results for authentication of quantum data.eng.srt  40.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Boosting Authenticated Encryption Robustness With Minimal Modifications.eng.srt  40.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.lrc  40.0 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.lrc  40.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness.eng.srt  40.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Breaking the FF3 Format Preserving Encryption Standard Over Small Domains.eng.srt  40.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/A New Approach to Black-Box Concurrent Secure Computation.eng.srt  40.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Inconsistency of Simulation and Practice in Delay-based Strong PUFs.eng.srt  40.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.lrc  40.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice Enumeration for Tower NFS a 521-bit Discrete Logarithm Computation.eng.srt  40.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Generic Low Latency Masking in Hardware.eng.srt  40.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.tsv  40.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Shorter Lattice-Based Group Signatures via Almost Free'' Encryption and Other Optimizations.eng.srt  39.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Online-Extractability in the Quantum Random-Oracle Model.eng.srt  39.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Proving Resistance Against Infinitely Long Subspace Trails How to Choose the Linear Layer.eng.srt  39.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules.eng.srt  39.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/McEliece needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD.eng.srt  39.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Trapdoor Hash Functions and Their Applications.eng.srt  39.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.tsv  39.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/CTIDH faster constant-time CSIDH.eng.srt  39.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Universally Composable Subversion-Resilient Cryptography.eng.srt  39.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Adaptive Security via Deletion in Attribute-Based Encryption Solutions from Search Assumptions.eng.srt  39.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Oblivious RAM with Worst-Case Logarithmic Overhead.eng.srt  39.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Round-Optimal Byzantine Agreement.eng.srt  39.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/ECLIPSE Enhanced Compiling method for Pedersen-committed zkSNARK Engines.eng.srt  39.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Oblivious Transfer is in MiniQCrypt.eng.srt  39.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re.eng.srt  39.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.eng.srt  39.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.lrc  39.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.lrc  39.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Indifferentiability for Public Key Cryptosystems.eng.srt  39.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/ES-TRNG A High throughput, Low area True Random Number Generator based on Edge Sampling 1.eng.srt  39.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Security and Trust in Open Source Security Tokens.eng.srt  39.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Making Private Function Evaluation Safer, Faster, and Simpler.eng.srt  39.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.lrc  39.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Lattice-based Signatures with Tight Adaptive Corruptions and More.eng.srt  39.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 program chair report - best video winners.eng.srt  39.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua.eng.srt  39.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Power of Secure Two Party Computation.eng.srt  39.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/New First-Order Secure AES Performance Records.eng.srt  39.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Measure-and-Reprogram Technique 2.0 Multi-Round Fiat-Shamir and More.eng.srt  39.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Obfuscation, Functional Encryption, and Attribute-Based Encryption.eng.text  39.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.eng.srt  39.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.vtt  39.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/SAEB - A Lightweight Blockcipher Based AEAD Mode of Operation.eng.srt  39.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.txt  39.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Towards faster polynomial-time lattice reduction.eng.srt  39.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Handling Adaptive Compromise for Practical Encryption Schemes.eng.srt  39.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Blockchains Enable Non-Interactive MPC.eng.srt  39.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimizat.eng.srt  39.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Side-Channel Analysis of the Xilinx Zynq UltraScale Encryption Engine.eng.srt  39.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Rectangle Attacks on SKINNY and CRAFT.eng.srt  39.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.vtt  39.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.txt  39.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Foundations (continued).eng.srt  39.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.txt  39.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.eng.srt  39.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Homomorphic Secret Sharing from Lattices Without FHE.eng.srt  39.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.txt  39.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.eng.srt  39.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Private Multiplication over Finite Fields.eng.srt  39.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Watermarking PRFs against Quantum Adversaries.eng.srt  39.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.eng.srt  39.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Yehuda Lindell.eng.srt  39.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.vtt  39.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Gladius LWR based efficient hybrid public key encryption with distributed decryption.eng.srt  39.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.tsv  39.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.txt  39.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.txt  39.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Compact Ring Signatures from Learning With Errors.eng.srt  39.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Count Me In Extendablity for Threshold Ring Signatures.eng.srt  39.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Performance FV Somewhat Homomorphic Encryption on GPUs An Implementation using CUDA.eng.srt  39.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the CCA Compatibility of Public-Key Infrastructure.eng.srt  39.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Filippo Valsorda and George Tankersley.eng.srt  39.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.txt  39.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Redundant Code-based Masking Revisited.eng.srt  39.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Towards Micro-Architectural Leakage Simulators Reverse Engineering Micro-Architectural Leakage.eng.srt  39.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quadratic Secret Sharing and Conditional Disclosure of Secrets.eng.srt  39.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Onion Routing with Replies.eng.srt  39.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Public-Key Cryptography in the Fine-Grained Setting.eng.srt  39.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Private Circuits with Quasilinear Randomness.eng.srt  39.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.lrc  39.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Revisiting the functional bootstrap in TFHE.eng.srt  39.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.tsv  39.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Closing Remarks - Feedback Session.eng.text  39.0 KB
 
                
                    - Workshops/Beyond Crypto A TCS Perspective (At Crypto 2018)/Beyond Crypto A TCS Perspective (At Crypto 2018) captions/Theory for Society - Crypto on Steroids.eng.text  39.0 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/The Need for Being Explicit when Communicating , by Nina Bindel and Sarah McCarthy.eng.srt  38.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Speed Reading in the Dark Accelerating Functional Encryption for Quadratic Functions with Repr.eng.srt  38.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.lrc  38.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Towards Accountability in CRS Generation.eng.srt  38.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Secure Computation from One-Way Noisy Communication, or Anti-Correlation via Anti-Concentratio.eng.srt  38.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.srt  38.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Boolean Search over Encrypted Data with Reduced Leakage.eng.srt  38.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.eng.srt  38.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/On the Security of Homomorphic Encryption on Approximate Numbers.eng.srt  38.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Families of SNARK-friendly 2-chains of elliptic curves.eng.srt  38.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Seedless Fruit Is the Sweetest Random Number Generation, Revisited.eng.srt  38.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.txt  38.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Fake Near Collisions Attacks.eng.srt  38.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Rapidly Verifiable XMSS Signatures.eng.srt  38.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.eng.srt  38.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.lrc  38.8 KB
 
                
                    - Workshops/PPML 2021/PPML 2021 captions/Welcome and Invited Talk - New Techniques for Efficient Secure Computation - by Yuval Ishai.eng.text  38.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Banquet Short and Fast Signatures from AES.eng.srt  38.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Big Key Symmetric Encryption - Resisting Key Exfiltration.eng.srt  38.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Encryption Switching Protocols.eng.srt  38.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.txt  38.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.eng.srt  38.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.txt  38.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.txt  38.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.lrc  38.6 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 1 (part I).srt  38.6 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 1 (part I).eng.srt  38.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Standard Lattice Based Key Encapsulation on Embedded Devices.eng.srt  38.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.vtt  38.6 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.vtt  38.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimizat.eng.srt  38.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Quantum Homomorphic Encryption for Polynomial sized Circuits.eng.srt  38.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.tsv  38.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Beyond quadratic speedups in quantum attacks on symmetric schemes.eng.srt  38.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Joint Presentation on Lattices at Crypto 2019.eng.srt  38.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Revisiting Lattice Attacks on overstretched NTRU parameters.eng.srt  38.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.lrc  38.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.srt  38.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.eng.srt  38.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Incremental Proofs of Sequential Work.eng.srt  38.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.lrc  38.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Towards Tight Adaptive Security of Non-Interactive Key Exchange.eng.srt  38.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/CTET A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom.eng.srt  38.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Tightly-Secure Authenticated Key Exchange, Revisited.eng.srt  38.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/The General Sieve Kernel and New Records in Lattice Reduction.eng.srt  38.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.tsv  38.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Traceable Secret Sharing and Applications.eng.srt  38.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Rhythmic Keccak - SCA Security and Low Latency in HW.eng.srt  38.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.txt  38.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of A Novel Completeness Test for Leakage Models and its Application to Side Channel.eng.srt  38.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/New Approaches for Quantum Copy-Protection.eng.srt  38.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.txt  38.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.lrc  38.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 rump session part V.eng.srt  38.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.txt  38.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Asymmetric Message Franking Content Moderation for Metadata-Private End-to-End Encryption.eng.srt  38.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Leakage Resilient Value Comparison With Application to Message Authentication.eng.srt  38.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Robust Property-Preserving Hash Functions for Hamming Distance and More.eng.srt  38.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/DAPA Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers.eng.srt  38.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Modifying an Enciphering Scheme after Deployment.eng.srt  38.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice sieving via quantum random walks.eng.srt  38.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Thinking Outside the Superbox.eng.srt  38.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.tsv  38.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.txt  38.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Round-Optimal Multi-Party Computation with Identifiable Abort.eng.srt  38.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.tsv  38.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.tsv  38.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.tsv  38.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.txt  38.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/LifeLine for FPGA Protection Obfuscated Cryptography for Real-World Security.eng.srt  38.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.lrc  38.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Backdoors in Pseudorandom Number Generators - Possibility and Impossibility Results.eng.srt  38.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Symmetric Designs.eng.text  38.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptively Secure Garbled Circuits from One Way Functions.eng.srt  38.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Strong Asymmetric PAKE Based on Trapdoor CKEM.eng.srt  38.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.txt  38.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/An Algebraic Approach to Maliciously Secure Private Set Intersection.eng.srt  38.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Tight Time-Memory Trade-Offs for Symmetric Encryption.eng.srt  38.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.txt  38.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Data Flow Oriented Hardware Design of RNS based Polynomial Multiplication for SHE Acceleration.eng.srt  38.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Online Template Attacks Revisited.eng.srt  38.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.lrc  38.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.lrc  38.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.txt  38.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Amortizing Rate-1 OT and Applications to PIR and PSI.eng.srt  38.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/The Multi User Security of Double Encryption.eng.srt  38.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2024/PKC 2024 captions/Panel Quantum Algorithms for Lattice Problems.eng.srt  38.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.lrc  38.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/You Only Speak Once Secure MPC with Stateless Ephemeral Roles.eng.srt  38.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Post-quantum Security of Plain OAEP Transform.eng.srt  38.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A Practical Cryptanalysis of the Algebraic Eraser.eng.srt  37.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Another View of the Division Property.eng.srt  37.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.eng.srt  37.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Adiantum length-preserving encryption for entry-level processors.eng.srt  37.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Bounded Indistinguishability and the Complexity of Recovering Secrets.eng.srt  37.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.txt  37.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/FACE - Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data.eng.srt  37.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.txt  37.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Multi-Party Reusable Non-Interactive Secure Computation from LWE.eng.srt  37.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.eng.srt  37.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.lrc  37.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.txt  37.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.lrc  37.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for.eng.srt  37.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Improving Attacks on Round-Reduced Speck32 64 Using Deep Learning.eng.srt  37.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.lrc  37.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Be Adaptive, Avoid Overcommitting.eng.srt  37.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.txt  37.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.lrc  37.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptanalysis of GGH15 Multilinear Maps.eng.srt  37.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Non-Interactive Batch Arguments for NP from Standard Assumptions.eng.srt  37.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.lrc  37.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Crypto 2022 rump session part IV.eng.srt  37.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the Integer Polynomial Learning with Errors Problem.eng.srt  37.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.lrc  37.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On Communication Models and Best-Achievable Security in Two-Round MPC.eng.srt  37.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.eng.srt  37.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.srt  37.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations.eng.srt  37.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Counter in Tweak - Authenticated Encryption Modes for Tweakable Block Ciphers.eng.srt  37.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Group Signatures with User-Controlled and Sequential Linkability.eng.srt  37.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.lrc  37.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.lrc  37.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V.eng.srt  37.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.lrc  37.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/The Convergence of Slide-type Reductions.eng.srt  37.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Classical vs Quantum Random Oracles.eng.srt  37.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm.eng.srt  37.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.txt  37.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.eng.srt  37.4 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.txt  37.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Hedging Public Key Encryption in the Real World.eng.srt  37.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.srt  37.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Identity Based Encryption from the Diffie Hellman Assumption.eng.srt  37.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.srt  37.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.txt  37.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/LPN Decoded.eng.srt  37.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.tsv  37.4 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 2 (part I).srt  37.3 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 2 (part I).eng.srt  37.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/MPC with Friends and Foes.eng.srt  37.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Felix Gunther.eng.srt  37.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.txt  37.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Bootstrapping fully homomorphic encryption over the integers in less - than one second.eng.srt  37.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Exploring Constructions of Compact NIZKs from Various Assumptions.eng.srt  37.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.srt  37.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.eng.srt  37.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Rate 1, Linear Time and Additively Homomorphic UC Commitments.eng.srt  37.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.lrc  37.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/The design of scalar AES Instruction Set Extensions for RISC-V.eng.srt  37.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.txt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.txt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.txt  37.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Twisted u4 normal form for elliptic curves.eng.srt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.lrc  37.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.txt  37.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.lrc  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.srt  37.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Hiding in Plain Sight Memory-tight Proofs via Randomness Programming.eng.srt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.txt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Reverse Firewalls for Adaptively Secure MPC without Setup.eng.srt  37.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Optimal Security Reductions for Unique Signatures - Bypassing Impossibilities with A Counterexample.eng.srt  37.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Signatures (continued).eng.srt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/NTRU Fatigue How Stretched is Overstretched.eng.srt  37.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.vtt  37.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.vtt  37.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Second-Order SCA Security with almost no Fresh Randomness.eng.srt  37.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.srt  37.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/RWC 2021 Lightning talks.eng.srt  37.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.json  37.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.srt  37.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.eng.srt  37.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Cristina Onete.eng.srt  37.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.txt  37.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.txt  37.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Short Pairing-Free Blind Signatures with Exponential Security.eng.srt  37.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Quantum non malleability and authentication.eng.srt  37.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Laurent Simon.eng.srt  37.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/CNF-FSS and its Applications.eng.srt  37.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Incompressible Cryptography.eng.srt  37.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.srt  37.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.eng.srt  37.0 KB
 
                
                    - IACR Distinguished Lectures/IACR Distinguished Lectures captions/Tutorial on Homomorphic Encryption (part 1).eng.text  37.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.txt  37.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.eng.srt  37.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/IACR Business Meeting.eng.text  36.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Reusable Non-Interactive Secure Computation.eng.srt  36.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.lrc  36.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.eng.srt  36.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Leakage Detection with the x2 Test.eng.srt  36.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.srt  36.8 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.lrc  36.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.tsv  36.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Threshold Garbled Circuits and Ad Hoc Secure Computation.eng.srt  36.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.lrc  36.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.tsv  36.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.lrc  36.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Polynomial IOPs for Linear Algebra Relations.eng.srt  36.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Revisiting (R)CCA Security and Replay Protection.eng.srt  36.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/A Modular Treatment of Blind Signatures from Identification Schemes.eng.srt  36.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle.eng.srt  36.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Lower Bounds on Obfuscation from All or Nothing Encryption.eng.srt  36.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.lrc  36.7 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Side Channels 1 part I.eng.srt  36.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.txt  36.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Aggregate Cash Systems A Cryptographic Investigation of Mimblewimble.eng.srt  36.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Homomorphic Time-Lock Puzzles and Applications.eng.srt  36.7 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/The Role of Integrity in Attestation and Isolation.eng.srt  36.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.eng.srt  36.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.lrc  36.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Side-Channel Protections for Picnic Signatures.eng.srt  36.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.txt  36.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.lrc  36.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Security in the Presence of Key Reuse Context-Separable Interfaces and Their Applications.eng.srt  36.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Gaussian Sampling over the Integers - Efficient, Generic, Constant Time.eng.srt  36.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/2023 Levchin Prize.eng.srt  36.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.lrc  36.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.lrc  36.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Multi-Designated Receiver Signed Public Key Encryption.eng.srt  36.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Constructing Locally Leakage-resilient Linear Secret-sharing Schemes.eng.srt  36.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.txt  36.5 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.txt  36.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.lrc  36.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Verifiable Random Functions with Optimal Tightness.eng.srt  36.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/How to Build a Trapdoor Function from an Encryption Scheme.eng.srt  36.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.txt  36.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.eng.srt  36.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.lrc  36.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.eng.srt  36.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Semantic Security and Indistinguishability in the Quantum World.eng.srt  36.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Broadcast and Trace with $$N{ varepsilon }$$ Ciphertext Size from Standard Assumptions.eng.srt  36.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Universal Obfuscation and Witness Encryption - Boosting Correctness and Combining Security.eng.srt  36.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Group Signature and More from Isogenies and Lattices Generic, Simple, and Efficient.eng.srt  36.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.eng.srt  36.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Simultaneous Amplification The Case of Non-interactive Zero-Knowledge.eng.srt  36.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.txt  36.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.txt  36.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.lrc  36.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/The Magic of ELFs.eng.srt  36.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.txt  36.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Post Quantum Cryptography.eng.text  36.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.tsv  36.3 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.tsv  36.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Learning Parity with Physical Noise Imperfections, Reductions and FPGA Prototype.eng.srt  36.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.eng.srt  36.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Private Anonymous Data Access.eng.srt  36.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/The Mother of All Leakages How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre.eng.srt  36.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.tsv  36.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.lrc  36.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Laconic Oblivious Transfer and its Applications.eng.srt  36.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.txt  36.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Optimizing BIKE for the Intel Haswell and ARM Cortex-M4.eng.srt  36.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.srt  36.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Time Memory Tradeoff Attacks on the MTP Proof of Work Scheme.eng.srt  36.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/bootstrap.js  36.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.txt  36.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.lrc  36.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/BEST YOUNG RESEARCHERS AWARD Fully Secure Attribute-Based Encryption for t-CNF from LWE.eng.srt  36.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/FIVER - Robust Verification of Countermeasures against Fault Injections.eng.srt  36.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Award Papers.eng.srt  36.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/The Privacy Blanket of the Shuffle Model.eng.srt  36.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.srt  36.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.tsv  36.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.srt  36.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.tsv  36.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.txt  36.1 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.lrc  36.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings.eng.srt  36.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.lrc  36.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Alibi A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.eng.srt  36.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.lrc  36.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.txt  36.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/On IND-qCCA security in the ROM and its applications CPA security is sufficient for TLS 1.3.eng.srt  36.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Aggregatable Distributed Key Generation.eng.srt  36.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Bounds for the Security of Ascon against Differential and Linear Cryptanalysis.eng.srt  36.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/One-way functions and malleability oracles Hidden shift attacks on isogeny-based protocols.eng.srt  36.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Reusable Two-Round MPC from LPN.eng.srt  36.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.lrc  35.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.eng.srt  35.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/A Logarithmic Lower Bound for Oblivious RAM (for all parameters).eng.srt  35.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Universally Composable Relaxed Password Authenticated Key Exchange.eng.srt  35.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.srt  35.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.vtt  35.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Luke Garratt.eng.srt  35.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Proofs of Replicated Storage Without Timing Assumptions.eng.srt  35.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.lrc  35.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.eng.srt  35.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Mind the Middle Layer The HADES Design Strategy Revisited.eng.srt  35.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.txt  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.txt  35.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Generic Transformations of Predicate Encodings - Constructions and Applications.eng.srt  35.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Ranking Loss Maximizing the Success Rate in Deep Learning Side-Channel Analysis.eng.srt  35.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.txt  35.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.lrc  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.tsv  35.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.lrc  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.eng.srt  35.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Improved Computational Extractors and their Applications.eng.srt  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions.eng.srt  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.srt  35.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.tsv  35.7 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Secure Two-Party Computation part II.eng.srt  35.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.srt  35.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.eng.srt  35.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Multi-Client Functional Encryption for Separable Functions.eng.srt  35.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Shared presentation on Zero Knowledge at Crypto 2019.eng.srt  35.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.txt  35.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Revisiting the Security of DbHtS MACs Beyond-Birthday-Bound in the Multi-User Setting.eng.srt  35.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Security Cryptography Implementations in Embedded Systems, Part 2.eng.text  35.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.txt  35.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.txt  35.7 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part II).srt  35.7 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks I (part II).eng.srt  35.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.txt  35.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.txt  35.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/KDM Security for the Fujisaki-Okamoto Transformations in the QROM.eng.srt  35.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.txt  35.6 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt  35.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.txt  35.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.lrc  35.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/BKW Meets Fourier New Algorithms for LPN with Sparse Parities.eng.srt  35.6 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Succinctness 1 part I.eng.srt  35.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.lrc  35.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.srt  35.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.txt  35.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.lrc  35.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Ratcheted Encryption and Key Exchange - The Security of Messaging.eng.srt  35.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/FPGA based Accelerator for Post Quantum Signature Scheme SPHINCS 256.eng.srt  35.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Non-malleable Codes for Decision Trees.eng.srt  35.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Improved torsion-point attacks on SIDH variants.eng.srt  35.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.txt  35.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.txt  35.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.txt  35.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.tsv  35.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.srt  35.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.lrc  35.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.lrc  35.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.tsv  35.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.txt  35.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Breaking CAS-Lock and Its Variants by Exploiting Structural Traces.eng.srt  35.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.vtt  35.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.lrc  35.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Highly Efficient Key Exchange Protocols with Optimal Tightness.eng.srt  35.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.lrc  35.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.txt  35.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.srt  35.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.txt  35.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.lrc  35.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.txt  35.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.srt  35.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography A Practical Gu.eng.srt  35.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.lrc  35.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.tsv  35.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.lrc  35.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model.eng.srt  35.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledg.eng.srt  35.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.txt  35.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Multivariate Public Key Cryptosystem from Sidon Spaces.eng.srt  35.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Kurosawa Desmedt Meets Tight Security.eng.srt  35.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A PCP Theorem for Interactive Proofs and Applications.eng.srt  35.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Fill your Boots Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.eng.srt  35.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.txt  35.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.txt  35.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.txt  35.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.txt  35.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Rate-1 Key-Dependent Message Security - via Reusable Homomorphic - Extractor against Correlated-S.eng.srt  35.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/On the Plausibility of Fully Homomorphic Encryption for RAMs.eng.srt  35.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/New Collision Attacks on Round Reduced Keccak.eng.srt  35.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Network Oblivious Transfer.eng.srt  35.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4.eng.srt  35.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.lrc  35.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.lrc  35.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Black-Box Transformations from Passive to Covert Security with Public Verifiability.eng.srt  35.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.lrc  35.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/On the Isogeny Problem with Torsion Point Information.eng.srt  35.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.lrc  35.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.lrc  35.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.txt  35.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.lrc  35.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Quantum Encryption with Certified Deletion, Revisited Public Key, Attribute-Based, and Classic.eng.srt  35.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.srt  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/On the ideal shortest vector problem over random rational primes.eng.srt  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.lrc  34.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.lrc  34.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.txt  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.txt  34.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LadderLeak.eng.text  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.lrc  34.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.tsv  34.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Linicrypt - A Model for Practical Cryptography.eng.srt  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Locality-Preserving Oblivious RAM.eng.srt  34.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.vtt  34.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Obfuscation Combiners.eng.srt  34.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.srt  34.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.srt  34.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/The Nested Subset Differential Attack A Practical Direct Attack Against LUOV which Forges a Si.eng.srt  34.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.txt  34.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved guess-and-determine and distinguishing attacks on SNOW-V.eng.srt  34.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.txt  34.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.tsv  34.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Secure Software Leasing from Standard Assumptions.eng.srt  34.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Non-malleable Secret Sharing in the Computational Setting Adaptive Tampering, Noisy-Leakage Re.eng.srt  34.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.srt  34.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/SUNDAE Small Universal Deterministic Authenticated Encryption for the Internet of Things.eng.srt  34.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.srt  34.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/On Length Independent Security Bounds for the PMAC Family.eng.srt  34.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.lrc  34.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.txt  34.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/AES-LBBB AES Mode for Lightweight and BBB-Secure Authenticated Encryption.eng.srt  34.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T.eng.srt  34.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.srt  34.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.lrc  34.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.txt  34.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Fault Attacks on CCA-secure Lattice KEMs.eng.srt  34.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.eng.srt  34.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.lrc  34.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.lrc  34.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/An Instruction Set Extension to Support Software-Based Masking.eng.srt  34.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.lrc  34.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.vtt  34.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.eng.srt  34.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.lrc  34.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.srt  34.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.lrc  34.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.txt  34.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.vtt  34.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Mixture Differential Cryptanalysis a New Approach to Distinguishers and Attacks on round-reduc.eng.srt  34.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.lrc  34.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.lrc  34.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.lrc  34.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Efficient Schemes for Committing Authenticated Encryption.eng.srt  34.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.txt  34.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.txt  34.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Low-Complexity Weak Pseudorandom Functions in AC0[MOD2].eng.srt  34.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Steel Composable Hardware-based Stateful and Randomised Functional Encryption.eng.srt  34.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.eng.srt  34.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.srt  34.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.lrc  34.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/IND CCA secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.eng.srt  34.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Cryptographic Shallots A Formal Treatment of Repliable Onion Encryption.eng.srt  34.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.lrc  34.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.txt  34.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Two-Round Trip Schnorr Multi-Signatures via Delinearized Witnesses.eng.srt  34.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge.eng.srt  34.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.vtt  34.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.txt  34.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Young Researcher Award.eng.text  34.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.txt  34.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.srt  34.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.lrc  34.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.txt  34.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.vtt  34.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.txt  34.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.txt  34.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptography.eng.text  34.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - (2 Talks) Secure Multiparty Computation and Finding offline devices.eng.text  34.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.tsv  34.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.tsv  34.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.txt  34.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-23 Rump Session.eng.srt  34.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.tsv  34.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.vtt  34.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.srt  34.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.srt  34.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.tsv  34.0 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 2 (part II).srt  34.0 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 2 (part II).eng.srt  34.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.tsv  34.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.txt  34.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.lrc  34.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Improved Bootstrapping for Approximate Homomorphic Encryption.eng.srt  34.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.eng.srt  34.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.lrc  34.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Faster Dual Lattice Attacks for Solving LWE - with applications to CRYSTALS.eng.srt  34.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.lrc  33.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.srt  33.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/On Round Optimal Statistical Zero Knowledge Arguments.eng.srt  33.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/How to Record Quantum Queries, and Applications to Quantum Indifferentiability.eng.srt  33.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.txt  33.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.txt  33.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.lrc  33.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/A New Approach to Round Optimal Secure Multiparty Computation.eng.srt  33.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.lrc  33.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.txt  33.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Pay Attention to Raw Traces A Deep Learning Architecture for End-to-End Profiling Attacks.eng.srt  33.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Round-optimal Black-box Commit-and-prove with Succinct Communication.eng.srt  33.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.txt  33.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.lrc  33.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.lrc  33.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on.eng.srt  33.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.lrc  33.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno.eng.srt  33.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Securing Cryptography Implementations in Embedded Systems, part I.eng.text  33.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.lrc  33.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary.eng.srt  33.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.srt  33.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Security of COFB against Chosen Ciphertext Attacks.eng.srt  33.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.txt  33.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/How to Prove Knowledge of Small Secrets.eng.srt  33.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.tsv  33.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Topology Hiding Computation on All Graphs.eng.srt  33.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.txt  33.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.srt  33.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/MDS Matrices with Lightweight Circuits.eng.srt  33.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.lrc  33.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.txt  33.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.lrc  33.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography, Security, and Public Safety A Policy Perspective.eng.text  33.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.txt  33.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.srt  33.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.eng.srt  33.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.vtt  33.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.lrc  33.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.srt  33.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.lrc  33.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.vtt  33.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.tsv  33.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Towards Key-recovery-attack Friendly Distinguishers Application to GIFT-128.eng.srt  33.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.lrc  33.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of Optimal Tightness for Chain-Based Unique Signatures.eng.srt  33.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.vtt  33.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.eng.srt  33.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.txt  33.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.vtt  33.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Workshop on Attacks in Crypto Session IV Attacks on Standards.eng.text  33.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.txt  33.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Keep it Unsupervised Horizontal Attacks Meet Deep Learning.eng.srt  33.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/BEST PAPER AWARD Cryptanalysis of OCB2 Attacks on Authenticity and Confidentiality.eng.srt  33.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.eng.srt  33.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/General Diffusion Analysis How to Find Optimal Permutations for Generalized Type-II Feistel Sc.eng.srt  33.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.srt  33.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Group Encryption Full Dynamicity, Message Filtering and Code-Based Instantiation.eng.srt  33.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Towards Tight Random Probing Security.eng.srt  33.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Separate Separations of CPA and Circular Security for Any Cycle Length.eng.srt  33.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.lrc  33.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.eng.srt  33.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Multi-Source Non-Malleable Extractors and Applications.eng.srt  33.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.eng.srt  33.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.txt  33.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.lrc  33.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Simulation-Based Bi-Selective Opening Security for Public Key Encryption.eng.srt  33.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Match Me if You Can Matchmaking Encryption and Its Applications.eng.srt  33.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.vtt  33.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Memory Tight Reductions.eng.srt  33.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.eng.srt  33.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Anonymous Attestation with Subverted TPMs.eng.srt  33.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.lrc  33.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/ConTra Corona Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralize.eng.srt  33.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.txt  33.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.lrc  33.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Private Set Operations from Oblivious Switching.eng.srt  33.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.vtt  33.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.lrc  33.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Synchronous, with a Chance of Partition Tolerance.eng.srt  33.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.txt  33.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.tsv  33.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Cryptanalysis of LEDAcrypt.eng.srt  33.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of - A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.eng.srt  33.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Structure vs Hardness through the Obfuscation Lens.eng.srt  33.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.eng.srt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.lrc  33.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.lrc  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.txt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.srt  33.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.txt  33.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.vtt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.txt  33.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Universally Composable Secure Computation with Corrupted Tokens.eng.srt  33.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.srt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.txt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.eng.srt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.srt  33.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.eng.srt  33.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/ATLAS Efficient and Scalable MPC in the Honest Majority Setting.eng.srt  33.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.txt  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.lrc  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.txt  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.tsv  33.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Leakage-Resilient IBE ABE with Optimal Leakage Rates from Lattices.eng.srt  33.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.tsv  33.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.txt  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.lrc  33.0 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part III).srt  33.0 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks I (part III).eng.srt  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.srt  33.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.txt  33.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Symmetric Primitives with Structured Secrets.eng.srt  33.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.txt  33.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt 2016 Rump Session.eng.text  33.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.txt  32.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Nonces Are Noticed AEAD Revisited.eng.srt  32.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.txt  32.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Algebraic Collision Attacks on Keccak.eng.srt  32.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.eng.srt  32.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.txt  32.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Network Hiding Communication and Applications to Multi Party Protocols.eng.srt  32.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Attacks only Get Better How to Break FF3 on Large Domains.eng.srt  32.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.eng.srt  32.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Collusion Resistant Watermarkable PRFs from Standard Assumptions.eng.srt  32.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.json  32.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.tsv  32.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.srt  32.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Distributed (Correlation) Samplers How to Remove a Trusted Dealer in One Round.eng.srt  32.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Stacking Sigmas A Framework to Compose Sigma-Protocols for Disjunctions.eng.srt  32.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.eng.srt  32.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.srt  32.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.lrc  32.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.srt  32.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.lrc  32.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/libInterMAC Beyond Confidentiality and Integrity in Practice.eng.srt  32.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.vtt  32.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.txt  32.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments.eng.srt  32.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Higher-Order Lookup Table Masking in Essentially Constant Memory.eng.srt  32.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/IACR Business meeting, Eurocrypt 2016.eng.text  32.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.srt  32.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.eng.srt  32.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.lrc  32.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.srt  32.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Functional Encryption for Attribute-Weighted Sums from k-Lin.eng.srt  32.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.lrc  32.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.tsv  32.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.lrc  32.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/DL-LA Deep Learning Leakage Assessment A modern roadmap for SCA evaluations.eng.srt  32.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.lrc  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.srt  32.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Hierarchical Integrated Signature and Encryption.eng.srt  32.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other.eng.srt  32.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Direct Product Hardness Amplification.eng.srt  32.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.eng.srt  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.srt  32.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.tsv  32.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.lrc  32.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.txt  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.lrc  32.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lattice Based Cryptography.eng.text  32.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.txt  32.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.txt  32.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.txt  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Optimal Tightness for Chain-Based Unique Signatures.eng.srt  32.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.lrc  32.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.vtt  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.tsv  32.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/The $t$-wise Independence of Substitution-Permutation Networks.eng.srt  32.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.txt  32.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.srt  32.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A New Variant of PMAC - Beyond the Birthday Bound.eng.text  32.5 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.vtt  32.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.lrc  32.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.lrc  32.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.tsv  32.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/A 2{n 2}-Time Algorithm for - sqrt{n}-SVP and - sqrt{n}-Hermite SVP, and an Improved Time-Approx.eng.srt  32.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.srt  32.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.txt  32.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.txt  32.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Provable Security of SP Networks with Partial Non-Linear Layers.eng.srt  32.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Non-Interactive CCA2-Secure Threshold Cryptosystems Achieving Adaptive Security in the Standar.eng.srt  32.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.lrc  32.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.txt  32.5 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part II).srt  32.4 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks II (part II).eng.srt  32.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Simple Proofs of Space-Time and Rational Proofs of Storage.eng.srt  32.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.lrc  32.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.txt  32.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Abuse Resistant Law Enforcement Access Systems.eng.srt  32.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2022/Real World Crypto 2022 captions/Levchin Award Ceremony.eng.srt  32.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.lrc  32.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.tsv  32.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.vtt  32.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.srt  32.4 KB
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.json  32.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.tsv  32.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.lrc  32.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.lrc  32.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.vtt  32.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.srt  32.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.lrc  32.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.txt  32.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.srt  32.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.vtt  32.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.txt  32.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.tsv  32.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials.eng.srt  32.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.srt  32.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.lrc  32.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.lrc  32.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.vtt  32.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.lrc  32.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.lrc  32.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.vtt  32.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.txt  32.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.tsv  32.1 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/MathCrypt 2022 Session 1 (part II).srt  32.1 KB
 
                
                    - Workshops/MathCrypt 2022 4/MathCrypt 2022 captions/MathCrypt 2022 Session 1 (part II).eng.srt  32.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.txt  32.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Verifier-on-a-Leash New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear.eng.srt  32.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.txt  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.lrc  32.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.vtt  32.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.lrc  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.srt  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.srt  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.txt  32.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.tsv  32.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.srt  32.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.srt  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Tight Security for Key-Alternating Ciphers with Correlated Sub-Keys.eng.srt  32.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.srt  31.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.lrc  31.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods.eng.srt  31.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.eng.srt  31.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Multimodal Private Signatures.eng.srt  31.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.lrc  31.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.vtt  31.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.srt  31.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Public-Key Watermarking Schemes for Pseudorandom Functions.eng.srt  31.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN.eng.srt  31.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.txt  31.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.vtt  31.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Anonymity of NIST PQC Round 3 KEMs.eng.srt  31.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.txt  31.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.txt  31.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Continuously Non-Malleable Secret Sharing Joint Tampering, Plain Model and Capacity.eng.srt  31.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.lrc  31.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.srt  31.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.vtt  31.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Targeted Lossy Functions and Applications.eng.srt  31.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.txt  31.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.srt  31.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.eng.srt  31.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.txt  31.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.txt  31.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/DEFAULT Cipher Level Resistance Against Differential Fault Attack.eng.srt  31.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/A Geometric Approach to Homomorphic Secret Sharing.eng.srt  31.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.srt  31.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.vtt  31.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.lrc  31.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.lrc  31.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/On the security of OSIDH.eng.srt  31.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.txt  31.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.vtt  31.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.txt  31.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.tsv  31.7 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part IV).srt  31.7 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks I (part IV).eng.srt  31.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.srt  31.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.txt  31.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/The SKINNY Family of Lightweight Tweakable Block Ciphers.eng.srt  31.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.lrc  31.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.lrc  31.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/A Rational Protocol Treatment of 51% Attacks.eng.srt  31.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.vtt  31.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.txt  31.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.lrc  31.6 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part I).srt  31.6 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks II (part I).eng.srt  31.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.tsv  31.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.srt  31.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.tsv  31.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.srt  31.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.eng.srt  31.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Universal Proxy Re-Encryption.eng.srt  31.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Non Malleable Codes for Space Bounded Tampering.eng.srt  31.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Classical Binding for Quantum Commitments.eng.srt  31.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Optimal Security Proofs for Signatures from Identification Schemes.eng.srt  31.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.vtt  31.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.lrc  31.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Misuse Attacks on Post-quantum Cryptosystems.eng.srt  31.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.txt  31.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.vtt  31.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.tsv  31.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.txt  31.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.srt  31.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.lrc  31.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.lrc  31.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.lrc  31.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Fast verification of masking schemes in characteristic two.eng.srt  31.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.tsv  31.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Joint presentation.eng.srt  31.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.tsv  31.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Adaptive Security of Multi-Party Protocols, Revisited.eng.srt  31.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.lrc  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.srt  31.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Receiver-Anonymity in Reradomizable RCCA-Secure Cryptosystems Resolved.eng.srt  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.lrc  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.srt  31.3 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.tsv  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.lrc  31.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.txt  31.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.txt  31.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Algebraic Adversaries in the Universal Composability Framework.eng.srt  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.srt  31.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.txt  31.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.txt  31.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting).eng.srt  31.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.vtt  31.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.vtt  31.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/ZMAC - A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.eng.srt  31.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.srt  31.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Promise $ Sigma$-protocol How to Construct Efficient Threshold ECDSA from Encryptions Based on.eng.srt  31.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.tsv  31.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.lrc  31.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.srt  31.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On Statistically Secure Obfuscation with Approximate Correctness.eng.srt  31.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.vtt  31.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/BIAS - KNOB attack against Bluetooth.eng.text  31.2 KB
 
                
                    - Workshops/WAC 2020 3/WAC 2020 3 captions/BIAS - KNOB attack against Bluetooth.eng.text  31.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-53 Test-of-Time Award - Program Chair Address.eng.srt  31.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.srt  31.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.srt  31.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.tsv  31.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.txt  31.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.lrc  31.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.txt  31.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.tsv  31.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.tsv  31.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.eng.srt  31.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.vtt  31.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.tsv  31.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.srt  31.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.tsv  31.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.eng.srt  31.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Strong.eng.srt  31.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Slide Attacks on Almost Self-Similar Ciphers.eng.text  31.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Storing and Retrieving Secrets on a blockchain.eng.srt  31.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.txt  31.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.txt  31.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.txt  31.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.lrc  31.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.txt  31.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.vtt  31.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A Greater GIFT Strengthening GIFT against Statistical Cryptanalysis.eng.srt  31.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.txt  31.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/LWE with Side Information Attacks and Concrete Security Estimation.eng.srt  30.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.srt  30.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.lrc  30.9 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Side Channels 1 part II.eng.srt  30.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.tsv  30.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.srt  30.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.txt  30.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.txt  30.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.lrc  30.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.vtt  30.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness M.eng.srt  30.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.lrc  30.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.lrc  30.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.srt  30.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.txt  30.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/A Quantum-Proof Non-malleable Extractor.eng.srt  30.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Multi-Input Quadratic Functional Encryption from Pairings.eng.srt  30.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.lrc  30.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.srt  30.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/A Formal Treatment of Multi key Channels.eng.srt  30.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.srt  30.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.tsv  30.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/LM-DAE Low-Memory Deterministic Authenticated Encryption for 128-bit Security.eng.srt  30.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.vtt  30.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited More Efficien.eng.srt  30.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Award paper session Hybrid code lifting.eng.srt  30.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.txt  30.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.tsv  30.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.txt  30.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.lrc  30.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.srt  30.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.txt  30.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.lrc  30.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.vtt  30.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.lrc  30.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.srt  30.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.tsv  30.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Automatic Verification of Differential Characteristics Application to Reduced Gimli.eng.srt  30.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.srt  30.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.vtt  30.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/The Direction of Updatable Encryption Does Matter.eng.srt  30.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.tsv  30.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.vtt  30.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Always Have a Backup Plan Fully Secure Synchronous MPC with Asynchronous Fallback.eng.srt  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.txt  30.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.srt  30.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Yoroi Updatable Whitebox Cryptography.eng.srt  30.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.lrc  30.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Vector and Functional Commitments from Lattices.eng.srt  30.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.lrc  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.tsv  30.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.tsv  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.srt  30.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.tsv  30.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.txt  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.srt  30.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/ROTed Random Oblivious Transfer for embedded devices.eng.srt  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.srt  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.srt  30.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.lrc  30.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.lrc  30.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Succinct LWE Sampling, Random Polynomials, and Obfuscation.eng.srt  30.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.tsv  30.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.tsv  30.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.vtt  30.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.txt  30.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.srt  30.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.txt  30.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.txt  30.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.srt  30.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.eng.srt  30.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.txt  30.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.txt  30.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.tsv  30.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.tsv  30.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.txt  30.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.txt  30.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.lrc  30.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.eng.srt  30.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.lrc  30.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.vtt  30.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.lrc  30.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.tsv  30.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Key Assignment Scheme with Authenticated Encryption.eng.srt  30.5 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.srt  30.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.tsv  30.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.vtt  30.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.txt  30.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.vtt  30.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.tsv  30.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.tsv  30.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automatic Search of Cubes for Attacking Stream Ciphers.eng.srt  30.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.txt  30.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.srt  30.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/PRF ODH - Relations, Instantiations, and Impossibility Results.eng.srt  30.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.vtt  30.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/No Time to HashOn Super-Efficient Entropy Accumulation.eng.srt  30.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.lrc  30.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.tsv  30.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.tsv  30.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.tsv  30.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.srt  30.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.txt  30.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.vtt  30.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.lrc  30.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Low-Latency Keccak at any Arbitrary Order.eng.srt  30.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.tsv  30.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.lrc  30.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Towards Low Energy Stream Ciphers.eng.srt  30.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.tsv  30.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.vtt  30.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.tsv  30.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Bit Security as Computational Cost for Winning Games with High Probability.eng.srt  30.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.lrc  30.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/TLS ecosystem woes - David Benjamin (Google).eng.text  30.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/jasny-bootstrap.js  30.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.lrc  30.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.tsv  30.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.lrc  30.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.srt  30.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia.eng.srt  30.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.srt  30.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.txt  30.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.txt  30.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.vtt  30.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.lrc  30.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.tsv  30.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Weak Tweak-Keys for the CRAFT Block Cipher.eng.srt  30.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.lrc  30.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Classic McEliece on the ARM Cortex-M4.eng.srt  30.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.txt  30.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.lrc  30.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.txt  30.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.vtt  30.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Public Key Encryption with Flexible Pattern Matching.eng.srt  30.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.lrc  30.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.srt  30.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.lrc  30.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.tsv  30.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.srt  30.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Bitcoin as a Transaction Ledger - A Composable Treatment.eng.srt  30.1 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.tsv  30.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.lrc  30.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.lrc  30.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Bounded Collusion ABE for TMs from IBE.eng.srt  30.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.srt  30.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.txt  30.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.lrc  30.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.tsv  30.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.srt  30.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.txt  30.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.vtt  30.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.srt  30.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Weaknesses in the Moscow Internet voting system.eng.text  30.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.txt  30.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Asymptotically-Good Arithmetic Secret Sharing over Z p{ ell}Z with Strong Multiplication and I.eng.srt  30.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.lrc  30.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.eng.srt  30.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.txt  29.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.lrc  29.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.tsv  29.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.txt  29.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Amortization with Fewer Equations for Proving Knowledge of Small Secrets.eng.srt  29.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.srt  29.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.txt  29.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.tsv  29.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.tsv  29.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Compact Structure Preserving Signatures with Almost Tight Security.eng.srt  29.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.tsv  29.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.lrc  29.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Analysis and Comparison of Table-based Arithmetic to Boolean Masking.eng.srt  29.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.tsv  29.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.tsv  29.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.txt  29.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.txt  29.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.txt  29.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.srt  29.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.txt  29.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.lrc  29.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.srt  29.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.vtt  29.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.srt  29.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.srt  29.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.lrc  29.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.txt  29.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.vtt  29.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.txt  29.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.txt  29.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.lrc  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.srt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.srt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.srt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.srt  29.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.eng.srt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Batch-OT with Optimal Rate.eng.srt  29.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.txt  29.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.srt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.txt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.srt  29.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Key Exchange - talk 3 4.eng.srt  29.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.vtt  29.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.txt  29.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.tsv  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.txt  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.lrc  29.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.tsv  29.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Computational Hardness of Optimal Fair Computation Beyond Minicrypt.eng.srt  29.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.vtt  29.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.srt  29.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Explicit Rate-1 Non-malleable Codes for Local Tampering.eng.srt  29.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.srt  29.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Indifferentiability of 8 Round Feistel Networks.eng.srt  29.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.lrc  29.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.srt  29.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.lrc  29.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.srt  29.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.txt  29.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.vtt  29.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.srt  29.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.lrc  29.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.txt  29.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/The design of Xoodoo and Xoofff.eng.srt  29.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Deniable Fully Homomorphic Encryption from Learning With Errors.eng.srt  29.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.txt  29.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.txt  29.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.txt  29.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Modular Design of Role-Symmetric Authenticated Key Exchange Protocols.eng.srt  29.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.srt  29.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalize.eng.srt  29.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.lrc  29.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.srt  29.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.lrc  29.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Building and deploying encrypted search systems - Seny Kamara.eng.text  29.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.srt  29.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.srt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.vtt  29.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.lrc  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.srt  29.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.srt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.vtt  29.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.lrc  29.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.srt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.lrc  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.srt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.srt  29.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Quantum Indistinguishability of Random Sponges.eng.srt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.txt  29.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.lrc  29.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.txt  29.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.lrc  29.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.lrc  29.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptanalysis of the FLIP Family of Stream Ciphers.eng.srt  29.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Round Optimal Secure Multi Party Computation.eng.srt  29.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Side Channel Attacks on Post Quantum Signature Schemes based on Multivariate Quadratic Equation.eng.srt  29.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.lrc  29.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.tsv  29.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.tsv  29.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.txt  29.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.txt  29.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.lrc  29.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.tsv  29.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.lrc  29.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.tsv  29.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.txt  29.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.tsv  29.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.lrc  29.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the.eng.srt  29.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.vtt  29.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.txt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.tsv  29.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Zero-Knowledge Proofs - Succinctness - talk 2 4.eng.srt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.lrc  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.srt  29.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric-Key - Design - talk 2 3.eng.srt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.srt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.vtt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.lrc  29.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.tsv  29.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.srt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.tsv  29.2 KB
 
                
                    - Workshops/CFAIL 2024/CFAIL 2024 captions/CFAIL 2024 talks part I.eng.srt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.vtt  29.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.txt  29.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.txt  29.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Building an Efficient Lattice Gadget Toolkit Subgaussian Sampling and More.eng.srt  29.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.txt  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.txt  29.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.vtt  29.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.lrc  29.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.srt  29.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.lrc  29.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.lrc  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.vtt  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.txt  29.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.tsv  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.tsv  29.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.txt  29.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.lrc  29.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fast and Secure Updatable Encryption.eng.srt  29.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Two Message Oblivious Evaluation of Cryptographic Functionalities.eng.srt  29.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/More Accurate Differential Properties of LED64 and Midori64.eng.srt  29.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.tsv  29.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.txt  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.vtt  29.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.txt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.srt  29.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.lrc  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.txt  29.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Cube Attacks on Non Blackbox Polynomials Based on Division Property.eng.srt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.srt  29.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.vtt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.txt  29.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles.eng.srt  29.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.txt  29.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.srt  29.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.vtt  29.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.srt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.txt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.tsv  29.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.txt  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.txt  29.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.tsv  29.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.lrc  29.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.tsv  29.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.txt  28.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.srt  28.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Revealing the Weakness of Addition Chain Based Masked SBox Implementations.eng.srt  28.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.srt  28.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.eng.srt  28.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.srt  28.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.txt  28.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.srt  28.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.vtt  28.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.txt  28.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric-Key - Design - talk 1 3.eng.srt  28.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.tsv  28.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.srt  28.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.tsv  28.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.eng.srt  28.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.vtt  28.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.srt  28.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.lrc  28.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.lrc  28.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.srt  28.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.lrc  28.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.txt  28.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Spartan Efficient and general-purpose zkSNARKs without trusted setup.eng.srt  28.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.lrc  28.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.lrc  28.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.srt  28.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.vtt  28.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.lrc  28.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.eng.srt  28.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.lrc  28.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.vtt  28.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.srt  28.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.tsv  28.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.srt  28.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.tsv  28.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.tsv  28.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Lifting Standard Model Reductions to Common Setup Assumptions.eng.srt  28.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.vtt  28.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.tsv  28.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.lrc  28.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.srt  28.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.srt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.vtt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.lrc  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.txt  28.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.lrc  28.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.vtt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.srt  28.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.vtt  28.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.tsv  28.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.lrc  28.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.srt  28.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Multi-party PSM, Revisited Improved Communication and Unbalanced Communication.eng.srt  28.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.srt  28.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.srt  28.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Fully Homomorphic Encryption with Verification.eng.text  28.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.tsv  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio.eng.srt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.vtt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.lrc  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.tsv  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.srt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.srt  28.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.vtt  28.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives.eng.srt  28.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.lrc  28.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.srt  28.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.lrc  28.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.srt  28.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.vtt  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.srt  28.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.vtt  28.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.lrc  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.lrc  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.lrc  28.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/On Communication-Efficient Asynchronous MPC with Adaptive Security.eng.srt  28.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.txt  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.eng.srt  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.tsv  28.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Mimblewimble and Scriptless Scripts - Andrew Poelstra (Blockstream).eng.text  28.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.txt  28.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.lrc  28.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Rene Peralta.eng.srt  28.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.tsv  28.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.tsv  28.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.tsv  28.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.lrc  28.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.eng.srt  28.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.vtt  28.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.srt  28.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Laconic Private Set Intersection and Applications.eng.srt  28.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.vtt  28.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.lrc  28.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.vtt  28.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Correlation of Quadratic Boolean Functions Cryptanalysis of All Versions of Full $$ mathsf {MO.eng.srt  28.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.tsv  28.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.txt  28.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.vtt  28.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.txt  28.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys.eng.srt  28.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.vtt  28.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.tsv  28.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.srt  28.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.lrc  28.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.lrc  28.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.srt  28.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.srt  28.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.vtt  28.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Cryptanalysis of Low-Data Instances of Full LowMCv2.eng.srt  28.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.srt  28.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.tsv  28.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.tsv  28.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4.eng.srt  28.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.txt  28.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.tsv  28.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.txt  28.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Exploring Differential-Based Distinguishers and Forgeries for ASCON.eng.srt  28.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.txt  28.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.srt  28.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.txt  28.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.vtt  28.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.lrc  28.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for.eng.srt  28.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.tsv  28.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.tsv  28.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.srt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.srt  28.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.txt  28.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.vtt  28.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Fixing Cracks in the Concrete Random Oracles with Auxiliary Input, Revisited.eng.text  28.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.vtt  28.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Unclonable Polymers and Their Cryptographic Applications.eng.srt  28.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.tsv  28.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.srt  28.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.eng.srt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.vtt  28.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.txt  28.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.txt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.txt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.tsv  28.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.srt  28.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.srt  28.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.txt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Transciphering Framework for Approximate Homomorphic Encryption.eng.srt  28.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Radical Isogenies on Montgomery Curves.eng.srt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.srt  28.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.lrc  28.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.vtt  28.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.vtt  28.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.txt  28.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.vtt  28.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.lrc  28.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.srt  28.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.txt  28.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.vtt  28.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.eng.text  28.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.srt  28.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.srt  28.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.txt  28.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.srt  28.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.txt  28.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The MALICIOUS Framework Embedding Backdoors into Tweakable Block Ciphers.eng.srt  28.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.txt  28.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.eng.srt  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.srt  28.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.txt  28.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.srt  28.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.tsv  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.srt  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.lrc  28.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.lrc  28.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.txt  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.srt  28.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.lrc  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.srt  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.tsv  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.srt  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.eng.text  28.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta.eng.srt  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.tsv  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.txt  28.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.tsv  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.txt  28.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.lrc  28.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.tsv  28.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.vtt  28.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.tsv  28.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.tsv  28.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.srt  28.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.vtt  28.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Two Round Information-Theoretic MPC with Malicious Security.eng.srt  28.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/A General Proof Framework for Recent AES Distinguishers.eng.srt  28.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.srt  28.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.tsv  28.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.lrc  28.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.srt  28.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.txt  28.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.srt  28.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.lrc  28.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.vtt  28.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.vtt  27.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.srt  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.txt  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.lrc  27.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.srt  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Practical Key-Recovery Attack on 805-Round Trivium.eng.srt  27.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.lrc  27.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Towards Sound Fresh Re Keying with Hard Physical Learning Problems.eng.srt  27.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.lrc  27.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Distributed Merkle's Puzzles.eng.srt  27.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.txt  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.srt  27.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.vtt  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.srt  27.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.lrc  27.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.lrc  27.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Security Analysis of CPace.eng.srt  27.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.lrc  27.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.vtt  27.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.txt  27.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.srt  27.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.txt  27.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Limits of Polynomial Packings for $ mathbb{Z} {pk}$ and $ mathbb{F} {pk}$.eng.srt  27.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Resistance of SNOW-V against Fast Correlation Attacks.eng.srt  27.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.lrc  27.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.txt  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.vtt  27.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.lrc  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.txt  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.lrc  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.vtt  27.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.txt  27.8 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.vtt  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.vtt  27.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.txt  27.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.txt  27.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.txt  27.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.txt  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.txt  27.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.txt  27.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.lrc  27.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.lrc  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.vtt  27.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.srt  27.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.txt  27.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.txt  27.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.lrc  27.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/MPC for Specific Functionalities - talk 3 3.eng.srt  27.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.vtt  27.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.tsv  27.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.eng.srt  27.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Olivier Levillain.eng.srt  27.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.vtt  27.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/CRAFT Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.eng.srt  27.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.tsv  27.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.txt  27.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.txt  27.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.txt  27.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.vtt  27.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Encryption switching protocols revisited - switching modulo p.eng.srt  27.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.lrc  27.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.lrc  27.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.txt  27.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.srt  27.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.vtt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.srt  27.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/PKC Test of Time Awards.eng.srt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.tsv  27.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.txt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.txt  27.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.txt  27.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.srt  27.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Automatic Search of Meet in the Middle and Impossible Differential Attacks.eng.srt  27.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Adaptive Extractors and their Application to Leakage Resilient Secret Sharing.eng.srt  27.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.txt  27.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.txt  27.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Relationships between quantum IND-CPA notions.eng.srt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.srt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.srt  27.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.vtt  27.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.lrc  27.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.txt  27.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.txt  27.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.tsv  27.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Towards Low-Latency Implementation of Linear Layers.eng.srt  27.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.srt  27.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.lrc  27.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.txt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.srt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.txt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.txt  27.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Categorization of Faulty Nonce Misuse Resistant Message Authentication.eng.srt  27.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.lrc  27.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.txt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.srt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.txt  27.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.srt  27.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.lrc  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.tsv  27.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.lrc  27.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.srt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.lrc  27.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.txt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.vtt  27.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.srt  27.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.lrc  27.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.srt  27.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.tsv  27.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.lrc  27.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.lrc  27.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Weak Keys in Reduced AEGIS and Tiaoxin.eng.srt  27.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.tsv  27.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.tsv  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.srt  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.vtt  27.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.srt  27.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.txt  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.vtt  27.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.lrc  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.lrc  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.txt  27.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Is Certificate Transparency usable - Emily Stark (Google).eng.text  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.lrc  27.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/A compact and high-performance hardware architecture for CRYSTALS-Dilithium.eng.srt  27.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.lrc  27.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.lrc  27.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.lrc  27.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.txt  27.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.lrc  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.vtt  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.txt  27.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.tsv  27.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.txt  27.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.vtt  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.txt  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.lrc  27.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.lrc  27.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.srt  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.vtt  27.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.txt  27.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.vtt  27.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Information Leakages in Code-based Masking A Unified Quantification Approach.eng.srt  27.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.lrc  27.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.vtt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.lrc  27.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.lrc  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.vtt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.vtt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.srt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.lrc  27.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.lrc  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions.eng.text  27.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.lrc  27.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.txt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.tsv  27.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.txt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.vtt  27.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.tsv  27.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.txt  27.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.txt  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.lrc  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Cryptanalysis.eng.text  27.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.srt  27.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.vtt  27.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.srt  27.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.tsv  27.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.srt  27.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Designated-Verifier Pseudorandom Generators, and Their Applications.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.lrc  27.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.txt  27.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2021/Real World Crypto 2021 captions/Privately Connecting Mobility to Infectious Diseases via Applied Cryptography.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.txt  27.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.lrc  27.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.txt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.vtt  27.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.lrc  27.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.vtt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.srt  27.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Threshold Cryptography & Distributed Broadcast - talk 3 4.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Preimage Attacks on Round-Reduced Keccak-224 256 via an Allocating Approach.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.txt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lightweight Multiplication in GF2n with Applications to MDS Matrices.eng.srt  27.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.txt  27.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.lrc  27.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2024/FSE 2024 captions/Differential, impossible differential and neural distinguishers - talk 4 4.eng.srt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.txt  27.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.lrc  27.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.lrc  27.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.srt  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.lrc  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.tsv  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.lrc  27.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.vtt  27.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.srt  27.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.txt  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.tsv  27.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.lrc  27.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.vtt  27.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.txt  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.srt  27.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.vtt  27.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.vtt  27.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.lrc  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.tsv  27.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.txt  27.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.lrc  27.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.tsv  27.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.txt  27.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.lrc  27.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.lrc  27.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.tsv  27.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.vtt  27.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.txt  27.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.tsv  27.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.lrc  27.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.tsv  27.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.lrc  27.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.tsv  27.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge.eng.srt  27.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.txt  27.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.tsv  27.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.srt  27.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.srt  27.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.lrc  26.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.txt  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.tsv  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.lrc  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.txt  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.vtt  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.lrc  26.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.txt  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.vtt  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.txt  26.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.vtt  26.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.tsv  26.9 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks I (part V).srt  26.9 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks I (part V).eng.srt  26.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA.eng.srt  26.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.txt  26.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP.eng.srt  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.vtt  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.vtt  26.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.vtt  26.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.txt  26.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.lrc  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.txt  26.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.lrc  26.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.vtt  26.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.txt  26.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.srt  26.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.srt  26.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.txt  26.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.lrc  26.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.lrc  26.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.lrc  26.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.txt  26.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.tsv  26.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.lrc  26.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.tsv  26.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.txt  26.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.tsv  26.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.lrc  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.srt  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.vtt  26.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.tsv  26.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.srt  26.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.tsv  26.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.vtt  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.txt  26.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.srt  26.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.vtt  26.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.srt  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.tsv  26.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.srt  26.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.txt  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.txt  26.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.txt  26.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.lrc  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin.eng.text  26.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Identity based Encryption from Codes with Rank Metric.eng.srt  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.txt  26.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.tsv  26.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.tsv  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.eng.srt  26.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.tsv  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.lrc  26.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.txt  26.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.srt  26.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.lrc  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.srt  26.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.txt  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.lrc  26.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.lrc  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.tsv  26.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.srt  26.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.srt  26.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.txt  26.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.lrc  26.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.lrc  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.tsv  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.txt  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.txt  26.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.lrc  26.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.vtt  26.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.vtt  26.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.tsv  26.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.srt  26.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.tsv  26.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.lrc  26.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.vtt  26.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.lrc  26.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.lrc  26.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.lrc  26.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.vtt  26.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.srt  26.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.vtt  26.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.txt  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.lrc  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.srt  26.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.vtt  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.txt  26.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.srt  26.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.srt  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.tsv  26.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/ABE for DFA from k-Lin.eng.srt  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.srt  26.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.tsv  26.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.srt  26.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.vtt  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Beyond Birthday Bound Secure MAC in Faulty Nonce Model.eng.srt  26.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.lrc  26.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.srt  26.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.tsv  26.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.lrc  26.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.tsv  26.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.lrc  26.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.srt  26.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.tsv  26.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Post quantum signatures - Melissa Chase (Microsoft Research).eng.text  26.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.srt  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.lrc  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.tsv  26.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.vtt  26.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.tsv  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Durandal A Rank Metric Based Signature Scheme.eng.srt  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.lrc  26.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.txt  26.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.srt  26.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.vtt  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.lrc  26.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/TPM-FAIL TPM meetings Timing and Lattice Attacks.eng.text  26.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.txt  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.txt  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.tsv  26.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.txt  26.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.tsv  26.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.txt  26.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.lrc  26.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.txt  26.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.srt  26.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.txt  26.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.vtt  26.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.srt  26.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.vtt  26.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.srt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.vtt  26.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.srt  26.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions.eng.text  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.tsv  26.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.txt  26.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.srt  26.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.txt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.txt  26.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.vtt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.vtt  26.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.vtt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.vtt  26.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.vtt  26.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.lrc  26.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.vtt  26.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Functional Graph Revisited - Updates on Second Preimage Attacks on Hash Combiners.eng.srt  26.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.vtt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.vtt  26.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.txt  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.lrc  26.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.txt  26.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Balanced Non-Adjacent Forms.eng.srt  26.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.srt  26.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Fine-grained Secure Attribute-based Encryption.eng.srt  26.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Perfect Trees Designing Energy-Optimal Symmetric Encryption Primitives.eng.srt  26.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.tsv  26.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/New Yoyo Tricks with AES-based Permutations.eng.srt  26.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.txt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.srt  26.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.srt  26.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.txt  26.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Rocca An Efficient AES-based Encryption Scheme for Beyond 5G.eng.srt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.srt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.srt  26.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.txt  26.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.vtt  26.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.srt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.lrc  26.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.lrc  26.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.srt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.lrc  26.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.lrc  26.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.vtt  26.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.vtt  26.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.vtt  26.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.txt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.vtt  26.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.vtt  26.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.srt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.srt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.srt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.vtt  26.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.tsv  26.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.vtt  26.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.vtt  26.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.lrc  26.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.lrc  26.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.txt  26.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.srt  26.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.txt  26.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.srt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.txt  26.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.srt  26.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Key Prediction Security of Keyed Sponges.eng.srt  26.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Towards a Simpler Lattice Gadget Toolkit.eng.srt  26.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.vtt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.vtt  26.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/General IACR Business Meeting.eng.text  26.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Pushing the Limits of Valiant's Universal Circuits Simpler, Tighter and More Compact.eng.srt  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.txt  26.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.vtt  26.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.tsv  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.srt  26.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.vtt  26.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.txt  26.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Large Message Homomorphic Secret Sharing from DCR and Applications.eng.text  26.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.txt  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Faster Fully Homomorphic Encryption - Bootstrapping in less than 0.1 Seconds.eng.text  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of Towards Micro-Architectural Leakage Simulators Reverse Engineering.eng.srt  26.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.vtt  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.srt  26.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.lrc  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.tsv  26.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.srt  26.0 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.srt  26.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.txt  26.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.lrc  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.txt  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.srt  26.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.txt  26.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.txt  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.vtt  26.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.txt  26.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/How to Build Pseudorandom Functions from Public Random Permutations.eng.srt  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.txt  26.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Secure Wire Shuffling in the Probing Model.eng.srt  26.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.lrc  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.vtt  26.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.txt  26.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.lrc  26.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Differential-Linear Cryptanalysis from an Algebraic Perspective.eng.srt  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.lrc  26.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.lrc  26.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.lrc  26.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.lrc  26.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.lrc  25.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.lrc  25.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.srt  25.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.txt  25.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.srt  25.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.tsv  25.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.srt  25.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.vtt  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.vtt  25.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.tsv  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.vtt  25.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.srt  25.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.srt  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.srt  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.tsv  25.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.lrc  25.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.txt  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.lrc  25.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation with Optimal Query Complexity.eng.text  25.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/White-box Cryptomania, Pascal Paillier.eng.text  25.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.vtt  25.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.lrc  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.tsv  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.txt  25.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.srt  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.tsv  25.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.srt  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Verifiable Functional Encryption.eng.text  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.srt  25.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.tsv  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.lrc  25.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Conditional Disclosure of Secrets via Non Linear Reconstruction.eng.srt  25.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.srt  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.srt  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.tsv  25.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.srt  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.tsv  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Tardigrade An Atomic Broadcast Protocol for Arbitrary Network Conditions.eng.srt  25.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/ZCash - past, present and future - Ian Miers (JHU and Cornell Tech).eng.text  25.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptanalysis of a Theorem - Decomposing the Only Known Solution to the Big APN Problem.eng.srt  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.lrc  25.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.srt  25.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.lrc  25.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.vtt  25.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.lrc  25.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.vtt  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.txt  25.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.tsv  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Compactness of Hashing Modes and Efficiency beyond Merkle Tree.eng.srt  25.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.tsv  25.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.txt  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.srt  25.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.lrc  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.tsv  25.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.txt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.srt  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.srt  25.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.txt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.tsv  25.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.tsv  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.lrc  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.vtt  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.txt  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.tsv  25.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.vtt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/New Constructions of Statistical NIZKs Dual-Mode DV-NIZKs and More.eng.text  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.srt  25.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.lrc  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.vtt  25.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.vtt  25.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.srt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.tsv  25.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.srt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.vtt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.txt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.srt  25.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/EWCDM - An Efficient, Beyond Birthday Secure, Nonce Misuse Resistant MAC.eng.srt  25.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.txt  25.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.vtt  25.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.srt  25.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.tsv  25.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.srt  25.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.lrc  25.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.srt  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.lrc  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/rump session 2.eng.srt  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.srt  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.vtt  25.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.lrc  25.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.lrc  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Simple Proofs of Sequential Work.eng.text  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.vtt  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.srt  25.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.lrc  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A simple and compact algorithm for SIDH with arbitrary degree isogenies.eng.text  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.vtt  25.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.lrc  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.vtt  25.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.tsv  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.txt  25.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Pre-Computation Scheme of Window $ tau$NAF for Koblitz Curves Revisited.eng.srt  25.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.txt  25.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.vtt  25.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.txt  25.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.vtt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.tsv  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.srt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.srt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.srt  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.srt  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.txt  25.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.txt  25.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.eng.srt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.vtt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.txt  25.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.txt  25.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.txt  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.tsv  25.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.srt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.tsv  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.srt  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.lrc  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.vtt  25.5 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Women & Allies in Cryptography.eng.srt  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.eng.text  25.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.lrc  25.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.srt  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.tsv  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Simpler Variant of Universally Composable Security for Standard Multiparty Computation.eng.text  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.lrc  25.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.txt  25.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.srt  25.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.srt  25.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.srt  25.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.txt  25.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.txt  25.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.tsv  25.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/SHealS and HealS isogeny-based PKEs from a key validation method for SIDH.eng.text  25.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The TinyTable protocol or - Gate scrambling Revisited.eng.srt  25.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.txt  25.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.srt  25.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.lrc  25.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.txt  25.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.txt  25.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Exact PRF Security of Truncation Tight Bounds for Keyed Sponges and Truncated CBC.eng.text  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.srt  25.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.srt  25.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.vtt  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.vtt  25.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.vtt  25.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.tsv  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.vtt  25.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.vtt  25.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.vtt  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.txt  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.lrc  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.tsv  25.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leftover Hash Lemma, Revisited (Crypto 2011).eng.text  25.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.lrc  25.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.srt  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.tsv  25.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.txt  25.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.lrc  25.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.lrc  25.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.srt  25.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.txt  25.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.lrc  25.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.tsv  25.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.vtt  25.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.txt  25.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.srt  25.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.txt  25.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.tsv  25.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.vtt  25.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Spectre and Meltdown - Data leaks during speculative execution - J. Horn (Google Project Zero).eng.text  25.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.lrc  25.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.lrc  25.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.srt  25.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.tsv  25.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.lrc  25.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Finding collisions for SHA 1 - Pierre Karpman.eng.text  25.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.lrc  25.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.txt  25.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.tsv  25.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.vtt  25.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.srt  25.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.tsv  25.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.vtt  25.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.tsv  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.txt  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.vtt  25.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.srt  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.srt  25.2 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Unifying Presampling via Concentration Bounds.eng.srt  25.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The first thorough side channel hardware trojan.eng.text  25.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.txt  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.tsv  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.srt  25.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.tsv  25.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.tsv  25.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.lrc  25.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Statistical Zeroizing Attack Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin.eng.srt  25.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.lrc  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.vtt  25.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.lrc  25.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.srt  25.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.lrc  25.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.tsv  25.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An attack on the FF3 format preserving encryption - F. Betul Durak.eng.text  25.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.lrc  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.tsv  25.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.lrc  25.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Simpira v2 A Family of Efficient Permutations Using the AES Round Function.eng.text  25.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.txt  25.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.txt  25.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Privacy Free Garbled Circuits for Formulas - Size Zero and Information Theoretic.eng.srt  25.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.srt  25.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.txt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.vtt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.txt  25.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.srt  25.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.srt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.txt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.vtt  25.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.srt  25.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.lrc  25.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.txt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.tsv  25.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.tsv  25.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.srt  25.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.lrc  25.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.lrc  25.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.tsv  25.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.srt  25.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.txt  25.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.lrc  25.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.srt  25.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.vtt  25.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.lrc  25.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.tsv  25.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.txt  25.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.srt  25.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.tsv  25.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.tsv  25.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.txt  25.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.txt  25.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.srt  25.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.txt  25.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.txt  25.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Practical Decryption exFiltration Breaking PDF Encryption.eng.text  25.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.vtt  25.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.tsv  25.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.srt  25.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.vtt  25.0 KB
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.json  25.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.vtt  25.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.txt  25.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.lrc  24.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.txt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.vtt  24.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.lrc  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.vtt  24.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.txt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.lrc  24.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.lrc  24.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.vtt  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.srt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.txt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus.eng.text  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.eng.text  24.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.tsv  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.srt  24.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.txt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.lrc  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.srt  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.srt  24.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.lrc  24.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The Noise protocol framework - Trevor Perrin.eng.text  24.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.txt  24.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.lrc  24.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.lrc  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.vtt  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.lrc  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.tsv  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.vtt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.srt  24.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.tsv  24.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.txt  24.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.srt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.txt  24.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.srt  24.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.vtt  24.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.txt  24.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.tsv  24.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.srt  24.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.srt  24.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.vtt  24.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth.eng.text  24.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.txt  24.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.srt  24.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite.eng.srt  24.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.lrc  24.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.vtt  24.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.srt  24.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.lrc  24.8 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.text  24.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.txt  24.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment.eng.srt  24.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.txt  24.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.tsv  24.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.lrc  24.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.srt  24.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.srt  24.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.vtt  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.srt  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.txt  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.lrc  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.vtt  24.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.tsv  24.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.lrc  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.srt  24.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.vtt  24.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.vtt  24.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.vtt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.txt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Unbounded Multi-Party Computation from Learning with Errors.eng.srt  24.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.txt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.tsv  24.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.lrc  24.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.srt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.tsv  24.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.tsv  24.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.lrc  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.tsv  24.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.tsv  24.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.lrc  24.7 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Broadcast-Optimal Two Round MPC with an Honest Majority.eng.srt  24.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.txt  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From Identification to Signatures, Tightly A Framework and Generic Transforms.eng.text  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.lrc  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.txt  24.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.srt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.tsv  24.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.txt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.txt  24.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.vtt  24.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.tsv  24.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.vtt  24.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.vtt  24.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.srt  24.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.lrc  24.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.tsv  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.lrc  24.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.eng.srt  24.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.vtt  24.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.srt  24.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.vtt  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.txt  24.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.lrc  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.lrc  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.txt  24.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.lrc  24.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.txt  24.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.lrc  24.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.srt  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.tsv  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.tsv  24.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.txt  24.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.lrc  24.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.lrc  24.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.vtt  24.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.vtt  24.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.lrc  24.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.vtt  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.lrc  24.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.txt  24.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.tsv  24.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.txt  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.lrc  24.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.srt  24.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.vtt  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.vtt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.srt  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key-Alternating Ciphers and Key-Length Extension Exact Bounds and Multi-user Security.eng.srt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.vtt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.txt  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.tsv  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.txt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.vtt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.srt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.srt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.tsv  24.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.srt  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A formula for disaster a unified approach to elliptic curve special-point-based attacks.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.tsv  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.vtt  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.srt  24.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Aurelie Phesso.eng.srt  24.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Christian Cachin.eng.text  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.lrc  24.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.txt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.vtt  24.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.txt  24.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.lrc  24.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.txt  24.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.tsv  24.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.srt  24.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.vtt  24.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient NIZKs for Algebraic Sets.eng.text  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.srt  24.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.vtt  24.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.tsv  24.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.txt  24.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.vtt  24.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.tsv  24.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Exploiting Weak Diffusion of Gimli Improved Distinguishers and Preimage Attacks.eng.srt  24.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.txt  24.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.lrc  24.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.txt  24.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.lrc  24.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.tsv  24.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.lrc  24.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.srt  24.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.lrc  24.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.txt  24.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Two Round Multiparty Computation via Multi-key FHE.eng.text  24.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.eng.srt  24.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.tsv  24.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.tsv  24.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.lrc  24.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.lrc  24.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.vtt  24.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.vtt  24.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.srt  24.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.vtt  24.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.vtt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Cycle slicer An algorithm for building permutations on special domains.eng.text  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.lrc  24.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Lightning talks - Short talks by the participants.eng.text  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.tsv  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.lrc  24.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.srt  24.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.vtt  24.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.txt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.txt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.tsv  24.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.txt  24.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.srt  24.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.vtt  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.srt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.vtt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.lrc  24.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.srt  24.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.vtt  24.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.txt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.srt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.srt  24.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.vtt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.srt  24.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.lrc  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.tsv  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.tsv  24.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.lrc  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/How to use Metaheuristics for Design of Symmetric Key primitives.eng.text  24.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.eng.srt  24.3 KB
 
                
                    - Crypto/Crypto 2022 Affiliated Events/PPML 2022 Contributed Talks II (part IV).srt  24.3 KB
 
                
                    - Workshops/PPML 2022/PPML 2022 captions/PPML 2022 Contributed Talks II (part IV).eng.srt  24.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.tsv  24.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.txt  24.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.lrc  24.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.srt  24.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Geo manager - Nick Sullivan (Cloudflare).eng.text  24.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.lrc  24.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.lrc  24.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.tsv  24.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.txt  24.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.srt  24.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.srt  24.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.vtt  24.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.tsv  24.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.txt  24.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.txt  24.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.lrc  24.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.vtt  24.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.srt  24.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.srt  24.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.tsv  24.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.vtt  24.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.lrc  24.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.lrc  24.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.txt  24.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.lrc  24.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Secure Two-Party Computation - talk 3 3.eng.srt  24.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.srt  24.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.vtt  24.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.lrc  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.txt  24.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Meet-in-the-Middle Attacks Revisited Key-recovery, Collision, and Preimage Attacks.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.vtt  24.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.lrc  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.lrc  24.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.tsv  24.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.vtt  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.tsv  24.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.srt  24.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Adventures in Crypto Dark Matter Attacks and Fixes for Weak Pseudorandom Functions.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.lrc  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.tsv  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.lrc  24.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.txt  24.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.tsv  24.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.vtt  24.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.tsv  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.vtt  24.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/SpOT-Light Lightweight Private Set Intersection from Sparse OT Extension.eng.srt  24.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.tsv  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.vtt  24.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.tsv  24.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.txt  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.txt  24.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.vtt  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.vtt  24.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.lrc  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.lrc  24.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.lrc  24.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.tsv  24.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.tsv  24.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.txt  24.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.txt  24.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.srt  24.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.txt  24.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.tsv  24.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.lrc  24.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.srt  24.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.txt  24.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.txt  24.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.lrc  24.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Computationally Binding Quantum Commitments.eng.text  24.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.txt  24.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.vtt  24.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.txt  24.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.tsv  24.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.txt  24.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.tsv  24.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.txt  23.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.srt  23.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.eng.text  23.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.tsv  23.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.txt  23.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.vtt  23.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.srt  23.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Cryptanalysis of AES-PRF and Its Dual.eng.srt  23.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.tsv  23.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.vtt  23.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces.eng.text  23.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.vtt  23.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.tsv  23.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.txt  23.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Distinguisher Dependent Simulation in Two Rounds and Its Applications.eng.text  23.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Tight Tradeoffs in Searchable Symmetric Encryption.eng.srt  23.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.eng.srt  23.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.tsv  23.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.tsv  23.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.srt  23.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.lrc  23.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.lrc  23.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/FHE Circuit Privacy Almost For Free.eng.srt  23.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Secure, Accurate, and Practical Narrow-Band Ranging System.eng.srt  23.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.tsv  23.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.vtt  23.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.lrc  23.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.srt  23.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.srt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.vtt  23.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.lrc  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.srt  23.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.vtt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.txt  23.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.tsv  23.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.tsv  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.vtt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.txt  23.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.lrc  23.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.lrc  23.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.txt  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.vtt  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.lrc  23.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.txt  23.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.tsv  23.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.lrc  23.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.vtt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Identity-Based Encryption for Fair Anonymity Applications Defining, Implementing, and Applying.eng.srt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.srt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.vtt  23.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.lrc  23.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.vtt  23.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.srt  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.lrc  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Secure Multi-party Quantum Computation with a Dishonest Majority.eng.text  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.lrc  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.vtt  23.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.vtt  23.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.tsv  23.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.lrc  23.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Side-Channels & Public-key Cryptanalysis - talk 4 4.eng.srt  23.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.srt  23.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.vtt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.tsv  23.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Secure Computation based on Leaky Correlations - High Resilience Setting.eng.srt  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.lrc  23.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.tsv  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.tsv  23.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to.eng.text  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.vtt  23.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.srt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.srt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.tsv  23.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.vtt  23.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.srt  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric-Key - Design - talk 3 3.eng.srt  23.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.lrc  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Multi-party Virtual State Channels.eng.text  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.vtt  23.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.tsv  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.txt  23.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.lrc  23.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.srt  23.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.txt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.vtt  23.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.srt  23.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Secrets at Scale - Manish Mehta (Netflix).eng.text  23.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.vtt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.srt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.vtt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.srt  23.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.txt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.txt  23.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.txt  23.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.vtt  23.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.tsv  23.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.srt  23.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.txt  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.srt  23.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.tsv  23.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.txt  23.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.tsv  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Designated Verifier Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.eng.srt  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.tsv  23.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.txt  23.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.txt  23.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.txt  23.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.tsv  23.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.vtt  23.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.lrc  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.tsv  23.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Verifiable Registration-Based Encryption.eng.text  23.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.txt  23.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.srt  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.vtt  23.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.srt  23.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.vtt  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.lrc  23.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.lrc  23.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.vtt  23.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for.eng.text  23.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.vtt  23.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.lrc  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.tsv  23.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.srt  23.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.txt  23.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.srt  23.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.vtt  23.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.txt  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.vtt  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.vtt  23.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.vtt  23.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.srt  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.lrc  23.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.tsv  23.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.srt  23.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.lrc  23.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.tsv  23.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Franchised Quantum Money.eng.srt  23.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.tsv  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.srt  23.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.lrc  23.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.lrc  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.txt  23.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.txt  23.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.vtt  23.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.tsv  23.5 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.txt  23.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.srt  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.txt  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.eng.text  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.tsv  23.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.srt  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.vtt  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.vtt  23.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.lrc  23.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.vtt  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.lrc  23.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.txt  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.vtt  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Massive Superpoly Recovery with Nested Monomial Predictions.eng.srt  23.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.lrc  23.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.vtt  23.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.txt  23.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.vtt  23.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.srt  23.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Master-Key KDM-Secure ABE via Predicate Encoding.eng.srt  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.srt  23.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.vtt  23.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.tsv  23.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.srt  23.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.lrc  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.tsv  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.tsv  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Candidate iO From Homomorphic Encryption Schemes.eng.text  23.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.srt  23.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.txt  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.tsv  23.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.tsv  23.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.vtt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.srt  23.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.vtt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.srt  23.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.txt  23.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.lrc  23.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.txt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.tsv  23.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.lrc  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.txt  23.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.srt  23.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.tsv  23.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.vtt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.srt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.vtt  23.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.vtt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.srt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.lrc  23.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.vtt  23.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.txt  23.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.srt  23.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.lrc  23.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.lrc  23.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.tsv  23.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.eng.srt  23.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.txt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.tsv  23.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.lrc  23.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.srt  23.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Eva Sarafianou.eng.srt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.lrc  23.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.txt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.tsv  23.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.lrc  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.txt  23.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Time-Optimal Interactive Proofs for Circuit Evaluation.eng.text  23.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.vtt  23.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.tsv  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.tsv  23.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Verificatum - Douglas Wikstrom (KTH).eng.text  23.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.srt  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.lrc  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.vtt  23.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.vtt  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.tsv  23.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.lrc  23.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.srt  23.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.tsv  23.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.txt  23.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.vtt  23.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.srt  23.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.tsv  23.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.lrc  23.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.tsv  23.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.lrc  23.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.srt  23.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PKC Test of Time Award Ceremony.eng.text  23.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.srt  23.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Classical Cryptanalysis of SIKE in Practice.eng.text  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.txt  23.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.srt  23.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.tsv  23.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.tsv  23.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/How to Meet Ternary LWE Keys.eng.srt  23.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.txt  23.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.vtt  23.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.txt  23.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The IPS Compiler - Optimizations, Variants and Concrete Efficiency (Crypto 2011).eng.text  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Sleepy Model of Consensus.eng.text  23.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.tsv  23.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.lrc  23.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Zero knowledge, subversion resistance, and concrete attacks - Steven Goldfeder.eng.text  23.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.tsv  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Robust Sponge-Based PRNGs and KDFs.eng.text  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Symbolic Encryption with Pseudorandom Keys.eng.text  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.tsv  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.vtt  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.srt  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.srt  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.txt  23.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.srt  23.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.txt  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.lrc  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.lrc  23.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.vtt  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.tsv  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.vtt  23.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Time-Memory Trade-Offs for Near-Collisions.eng.text  23.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.tsv  23.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.vtt  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.lrc  23.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.srt  23.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.txt  23.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.tsv  23.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Subversion-Resilient Public Key Encryption with Practical Watchdogs.eng.srt  23.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Scaling backend authentication at Facebook - Kevin Lewi (Fb), Callen Rain (Fb).eng.text  23.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.lrc  23.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.srt  23.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.lrc  23.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.vtt  23.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.lrc  23.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.txt  23.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.vtt  23.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.srt  23.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.srt  23.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.tsv  23.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.tsv  23.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.vtt  23.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.srt  23.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Generic-Group Delay Functions Require Hidden-Order Groups.eng.text  23.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.srt  23.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.lrc  23.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.lrc  23.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.srt  23.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.tsv  23.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.srt  23.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.lrc  23.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.txt  23.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.txt  23.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.vtt  23.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.srt  23.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.lrc  23.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.vtt  22.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.tsv  22.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.tsv  22.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.srt  22.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.tsv  22.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.vtt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.txt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.tsv  22.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.vtt  22.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.tsv  22.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.srt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.vtt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.tsv  22.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.txt  22.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cover and Decomposition Index Calculus on Elliptic Curve.eng.text  22.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.lrc  22.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.tsv  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A Geometric Approach to Linear Cryptanalysis.eng.text  22.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.tsv  22.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.vtt  22.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.vtt  22.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.lrc  22.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.tsv  22.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.srt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.srt  22.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.srt  22.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.srt  22.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.txt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAPR Arguments from Bilinear Maps.eng.text  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/The Discrete-Logarithm Problem with Preprocessing.eng.text  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/The One-More Discrete Logarithm Assumption in the Generic Group Model.eng.text  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.txt  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Double-Block-Length Hash Function for Minimum Memory Size.eng.srt  22.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.vtt  22.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.lrc  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.vtt  22.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/IACR Fellows 2022 Ceremony.eng.srt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Public Key Compression and Modulus Switching for Fully H.eng.text  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.srt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.tsv  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.tsv  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.txt  22.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.srt  22.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.txt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.srt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.vtt  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.vtt  22.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.lrc  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.vtt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.tsv  22.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.srt  22.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.lrc  22.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.srt  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.txt  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.tsv  22.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.lrc  22.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.txt  22.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.tsv  22.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.vtt  22.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.txt  22.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equival.eng.srt  22.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Multiparty Cardinality Testing for Threshold Private Set Intersection.eng.srt  22.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.vtt  22.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.srt  22.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.lrc  22.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/HACL - in Mozilla Firefox - Benjamin Beurdouche (INRIA).eng.text  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.txt  22.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.srt  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.lrc  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.srt  22.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.vtt  22.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.lrc  22.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/NIST Update.eng.srt  22.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.tsv  22.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.vtt  22.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.tsv  22.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.txt  22.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.lrc  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Fair and Robust MPC using a Global Transaction Ledger.eng.text  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.vtt  22.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Identity and Multi Key Leveled FHE from Learning with Errors.eng.text  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.eng.text  22.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.txt  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Post Quantum Security of Fiat Shamir.eng.text  22.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.srt  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning.eng.text  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.srt  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.tsv  22.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.vtt  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.vtt  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.srt  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.srt  22.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.vtt  22.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.vtt  22.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.srt  22.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.lrc  22.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.vtt  22.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Security Analysis of NIST CTR-DRBG.eng.srt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Analysing the HPKE Standard.eng.srt  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.txt  22.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.tsv  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.lrc  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Cliptography Clipping the Power of Kleptographic Attacks.eng.text  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.srt  22.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.vtt  22.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.txt  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.txt  22.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.srt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Best Paper Award.eng.text  22.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.txt  22.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.text  22.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.tsv  22.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.srt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.lrc  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.tsv  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.vtt  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.tsv  22.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.srt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.srt  22.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.tsv  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.lrc  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.srt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.tsv  22.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.vtt  22.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Circuit Compilers with O(1 - log (n)) Leakage Rate.eng.text  22.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.tsv  22.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.vtt  22.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.tsv  22.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.lrc  22.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.lrc  22.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.srt  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.vtt  22.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.tsv  22.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.tsv  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.txt  22.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Antikernel A Decentralized Secure Hardware Software Operating System.eng.text  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.lrc  22.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.vtt  22.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.vtt  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.srt  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.vtt  22.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.lrc  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.vtt  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Rational isogenies from irrational endomorphisms.eng.text  22.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/On the Relationships between Different Methods for Degree Evaluation.eng.srt  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.txt  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.tsv  22.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.tsv  22.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.vtt  22.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.srt  22.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.tsv  22.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.vtt  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.vtt  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.lrc  22.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.vtt  22.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.tsv  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.tsv  22.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.srt  22.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.txt  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.srt  22.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.vtt  22.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.srt  22.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.vtt  22.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Achieving high availability in the internal Google key management system KMS - Anand Kanagala.eng.text  22.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Side channel attacks on implementations of Curve25519 - Yuval Yarom and Daniel Genkin.eng.text  22.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.srt  22.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.lrc  22.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/New Constructions of Hinting PRGs, OWFs with Encryption, and more.eng.text  22.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.vtt  22.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.lrc  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.txt  22.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.lrc  22.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.tsv  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.srt  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.txt  22.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.txt  22.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/On Succinct Arguments and Witness Encryption from Groups.eng.text  22.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.lrc  22.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.tsv  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Impossibility of Tight Cryptographic Reductions.eng.text  22.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.tsv  22.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.txt  22.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.tsv  22.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.txt  22.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.srt  22.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.tsv  22.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.srt  22.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.tsv  22.4 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Rotational Differential Linear Distinguishers of.eng.srt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Iterated Random Function Problem.eng.text  22.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information.eng.text  22.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.vtt  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Signatures from Sequential-OR Proofs.eng.text  22.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.vtt  22.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/Cryptanalysis of Draco.eng.srt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.tsv  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Decoding Random Binary Linear Codes in 2 n 20 - How 1 - 1.eng.text  22.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.vtt  22.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.srt  22.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation with Minimal Interaction, Revisited.eng.text  22.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.vtt  22.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.tsv  22.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.srt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.txt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.vtt  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/SPARKs Succinct Parallelizable Arguments of Knowledge.eng.text  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.vtt  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based (Lossy) Trapdoor Functions and Applications.eng.text  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.lrc  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.srt  22.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.txt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.tsv  22.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.srt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.srt  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.lrc  22.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.tsv  22.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.srt  22.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.vtt  22.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Indistinguishable Proofs of Work or Knowledge.eng.text  22.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.srt  22.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.txt  22.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.lrc  22.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.srt  22.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.lrc  22.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.txt  22.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.txt  22.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.vtt  22.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.vtt  22.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.tsv  22.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.vtt  22.2 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Efficient Collision Attack Frameworks for RIPEMD-160.eng.srt  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.lrc  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.srt  22.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.tsv  22.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.txt  22.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.srt  22.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Overlaying Conditional Circuit Clauses for Secure Computation.eng.text  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.tsv  22.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Boomerang Connectivity Table Revisited. Application to SKINNY and AES.eng.srt  22.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.lrc  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.txt  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.lrc  22.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.tsv  22.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.srt  22.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.txt  22.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.vtt  22.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.vtt  22.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.lrc  22.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.eng.text  22.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.vtt  22.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.txt  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.txt  22.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.txt  22.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.srt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.lrc  22.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.txt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.tsv  22.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.tsv  22.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.tsv  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.lrc  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Randomness Encoders and Their Applications.eng.text  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.txt  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.tsv  22.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Generic Authenticated Key Exchange in the Quantum Random Oracle Model.eng.text  22.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.vtt  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.eng.text  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.tsv  22.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.txt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Post-Quantum Multi-Party Computation.eng.text  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.vtt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.vtt  22.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.tsv  22.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.txt  22.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.txt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.txt  22.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.txt  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.tsv  22.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.tsv  22.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.txt  22.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.vtt  22.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.srt  22.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.vtt  22.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.lrc  22.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.tsv  22.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.vtt  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/rump session 3.eng.srt  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.srt  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.vtt  22.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.srt  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.vtt  22.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.tsv  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.txt  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Combinatorics in Information theoretic cryptography.eng.text  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Unconditional UC Secure Computation with Stronger Malicious PUFs.eng.text  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.vtt  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.srt  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.lrc  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.txt  22.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.lrc  22.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.tsv  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Analyzing Multi Key Security Degradation.eng.text  22.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.lrc  22.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.vtt  22.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.txt  22.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.tsv  22.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.lrc  22.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.vtt  22.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.lrc  21.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.tsv  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Symmetrically and Asymmetrically Hard Cryptography.eng.text  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.tsv  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.lrc  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.srt  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Separate Your Domains NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.eng.text  21.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.txt  21.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.srt  21.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.vtt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.lrc  21.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.srt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Yoyo Tricks with AES.eng.text  21.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.vtt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.txt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.lrc  21.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.lrc  21.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.tsv  21.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.vtt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.srt  21.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.vtt  21.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.vtt  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.lrc  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.srt  21.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.srt  21.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.lrc  21.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.eng.srt  21.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.vtt  21.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.srt  21.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Provable Security Analysis of FIDO2.eng.text  21.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Faster Pairing Computations on Curves with High-Degree Twists.eng.text  21.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.tsv  21.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.lrc  21.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.srt  21.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.srt  21.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.vtt  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.srt  21.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero Knowledge Accumulators and Set Algebra.eng.text  21.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.tsv  21.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.tsv  21.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.lrc  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.tsv  21.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.txt  21.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.srt  21.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.tsv  21.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.lrc  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.txt  21.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.txt  21.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.txt  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.vtt  21.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.srt  21.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.lrc  21.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.tsv  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.srt  21.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.srt  21.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.tsv  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.lrc  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.lrc  21.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.txt  21.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.vtt  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Message Authentication, Revisited.eng.text  21.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.tsv  21.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.lrc  21.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Two-Round Oblivious Linear Evaluation from Learning with Errors.eng.srt  21.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.txt  21.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.srt  21.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.lrc  21.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.lrc  21.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.srt  21.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Instantaneous Decentralized Poker.eng.text  21.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.vtt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Everybody's a Target Scalability in Public-Key Encryption.eng.text  21.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.vtt  21.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.txt  21.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.vtt  21.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.srt  21.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.txt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.txt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.vtt  21.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.tsv  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.tsv  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.vtt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.tsv  21.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.txt  21.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.lrc  21.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.vtt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.tsv  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.txt  21.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.lrc  21.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.srt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.eng.text  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.tsv  21.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.srt  21.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.vtt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.vtt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.txt  21.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.vtt  21.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.vtt  21.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Zeroizing Without Low level Zeroes New Attacks on Multilinear Maps and Thier Limitations.eng.text  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.srt  21.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.srt  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.vtt  21.6 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Exciting Conclusion of Tuesday's session on Zero Knowledge and Proof Systems.eng.srt  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.txt  21.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Pedro Moreno Sanchez.eng.text  21.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.vtt  21.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.srt  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.srt  21.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.tsv  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.lrc  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.tsv  21.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.lrc  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Detecting Dangerous Queries - A New Approach for Chosen C.eng.text  21.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.lrc  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.txt  21.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.eng.text  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.lrc  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.tsv  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.txt  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.vtt  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.eng.text  21.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.txt  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Size of Pairing-Based Non-interactive Arguments.eng.text  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.vtt  21.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.srt  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.tsv  21.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/He Gives C-Sieves on the CSIDH.eng.text  21.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.tsv  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.txt  21.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.tsv  21.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.txt  21.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.txt  21.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Untagging Tor - a tale of onions, raccoons, and security definitions - Jean Paul Degabriele.eng.text  21.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.vtt  21.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.txt  21.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reverse Cycle Walking and Its Applications.eng.text  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Provably Weak Instances of Ring-LWE Revisited.eng.text  21.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.lrc  21.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.vtt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.lrc  21.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.srt  21.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.tsv  21.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.vtt  21.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.txt  21.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.vtt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.txt  21.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.vtt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.eng.text  21.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Non Full Sbox Linearization - Applications to Collision Attacks on Round Reduced Keccak.eng.srt  21.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.srt  21.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.vtt  21.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.lrc  21.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.txt  21.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.tsv  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.tsv  21.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.vtt  21.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.txt  21.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.txt  21.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.lrc  21.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.txt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.srt  21.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.srt  21.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.vtt  21.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Leakage-Resilient Symmetric Cryptography under Empirical.eng.text  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.vtt  21.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Bi-Deniable Public-Key Encryption.eng.text  21.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Degree Evaluation of NFSR Based Cryptosystems.eng.srt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.lrc  21.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Smashing WEP in a Passive Attack.eng.text  21.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.tsv  21.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.vtt  21.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Free Start Collision Attacks on the 76 Step SHA 1.eng.text  21.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.srt  21.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.vtt  21.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.tsv  21.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.srt  21.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.lrc  21.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.lrc  21.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.txt  21.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.txt  21.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Firmware Insider Bluetooth Randomness is Mostly Random.eng.text  21.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.tsv  21.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.txt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.txt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.lrc  21.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.tsv  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.srt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.srt  21.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/New Insights on AES Like SPN Ciphers.eng.srt  21.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.vtt  21.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.txt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.srt  21.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.tsv  21.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Quantum Homomorphic Encryption for Circuits of Low T gate Complexity.eng.text  21.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.vtt  21.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.lrc  21.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.srt  21.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.lrc  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.tsv  21.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.lrc  21.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/Quan Nguyen.eng.srt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/On the Exact Security of Schnorr-Type Signatures in the.eng.text  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.vtt  21.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.lrc  21.4 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.srt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tornado Automatic Generation of Probing-Secure Masked Bitsliced Implementations.eng.text  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Ring Signatures Logarithmic-Size, No Setup - from Standard Assumptions.eng.text  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Lattice Signatures without Trapdoors.eng.text  21.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.txt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.srt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.vtt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.srt  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.vtt  21.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.tsv  21.4 KB
 
                
                    - Workshops/WAC 2019 2/WAC 2019 2 captions/RAMBleed Leaking Keys Across Address Spaces.eng.text  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.lrc  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.srt  21.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.tsv  21.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.lrc  21.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.tsv  21.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.tsv  21.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.vtt  21.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.vtt  21.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.lrc  21.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.tsv  21.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.vtt  21.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.srt  21.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.srt  21.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.tsv  21.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.txt  21.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.txt  21.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.vtt  21.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.srt  21.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.lrc  21.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.txt  21.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.txt  21.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.txt  21.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.vtt  21.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.tsv  21.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/How to Extract Useful Randomness from Unreliable Sources.eng.text  21.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.lrc  21.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.lrc  21.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.lrc  21.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.lrc  21.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.tsv  21.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.tsv  21.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.lrc  21.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.tsv  21.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.vtt  21.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Multiparty Computation - ZK-friendly hash functions for Merkle tree proofs.eng.text  21.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.lrc  21.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.tsv  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.vtt  21.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.tsv  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.srt  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.txt  21.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.lrc  21.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.tsv  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fair Computation with Rational Players.eng.text  21.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.srt  21.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.srt  21.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.vtt  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.text  21.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.lrc  21.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Fully Homomorphic Encryption without Modulus Switching f.eng.text  21.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with.eng.text  21.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.txt  21.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.srt  21.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.txt  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.tsv  21.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.tsv  21.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Boosting the Security of Blind Signature Schemes.eng.srt  21.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.tsv  21.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.vtt  21.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Strengthening Access Control Encryption.eng.text  21.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.vtt  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.vtt  21.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.srt  21.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation.eng.srt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.vtt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.vtt  21.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.srt  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.txt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.srt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.srt  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.vtt  21.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.lrc  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.vtt  21.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.lrc  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.tsv  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.tsv  21.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.srt  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.tsv  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.lrc  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.srt  21.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.vtt  21.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.srt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.vtt  21.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Secure Computation on the Web - Computing without Simultaneous Interaction (Crypto 2011).eng.text  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.tsv  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.vtt  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.vtt  21.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.lrc  21.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.lrc  21.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.vtt  21.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.tsv  21.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.lrc  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.lrc  21.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.lrc  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.tsv  21.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.txt  21.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.srt  21.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.tsv  21.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.txt  21.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.tsv  21.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.vtt  21.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.lrc  21.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Astrolabous A Universally Composable Time Lock Encryption Scheme.eng.text  21.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.tsv  21.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.vtt  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.txt  21.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.tsv  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.tsv  21.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.vtt  21.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.txt  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.srt  21.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.tsv  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.txt  21.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.tsv  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.tsv  21.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.tsv  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.tsv  21.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.srt  21.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.lrc  21.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.srt  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.srt  20.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.tsv  20.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/The Curious Case of Non-Interactive Commitments - On the.eng.text  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Formalizing Data Deletion in the Context of the Right to be Forgotten.eng.text  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.vtt  20.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.srt  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/The Exact Round Complexity of Secure Computation.eng.text  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.vtt  20.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.tsv  20.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.srt  20.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.txt  20.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.tsv  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.lrc  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.srt  20.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.tsv  20.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.vtt  20.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/opening remarks.eng.srt  20.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.tsv  20.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/UK Research Institute in Secure Hardware and Embedded Systems RISE - Maire O’Neill.eng.text  20.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Incoercible Multi Party Computation and Universally Composable Receipt Free Voting.eng.text  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.vtt  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.txt  20.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.txt  20.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.txt  20.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Flexible Authenticated and Confidential Channel Establishment (fACCE) Analyzing the Noise Prot.eng.text  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.tsv  20.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.vtt  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.vtt  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Revisiting Homomorphic Encryption Schemes for Finite Fields.eng.text  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.srt  20.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.vtt  20.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.vtt  20.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.srt  20.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.txt  20.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.vtt  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.lrc  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.srt  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.lrc  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.srt  20.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.tsv  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.vtt  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Full state keyed duplex with built in multi user support.eng.text  20.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Opening Remarks.eng.srt  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.txt  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.lrc  20.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.tsv  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.vtt  20.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.lrc  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.vtt  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.vtt  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.tsv  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.tsv  20.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.tsv  20.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Position-Based Quantum Cryptography - Impossibility and Constructions.eng.text  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.srt  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.txt  20.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.tsv  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.vtt  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.vtt  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.srt  20.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.vtt  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.lrc  20.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Crypto 2023 award session.eng.srt  20.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.lrc  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.tsv  20.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.vtt  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/A Punctured Programming Approach to Adaptive Security in Functional Encryption.eng.text  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.lrc  20.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.txt  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.txt  20.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.tsv  20.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.vtt  20.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.srt  20.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.srt  20.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.tsv  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical ZAP Arguments.eng.text  20.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.srt  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.vtt  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.txt  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.txt  20.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.vtt  20.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.srt  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.txt  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.tsv  20.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.txt  20.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.lrc  20.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.tsv  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.srt  20.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.vtt  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.txt  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.vtt  20.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.srt  20.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.vtt  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.tsv  20.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.lrc  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.vtt  20.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.srt  20.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.eng.text  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.vtt  20.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Indistinguishability Obfuscation Without Maps Attacks and Fixes for Noisy Linear FE.eng.text  20.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Decaf Eliminating Cofactors Through Quotients and Isogenies.eng.text  20.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.srt  20.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.srt  20.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.srt  20.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.lrc  20.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.srt  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.lrc  20.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.lrc  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.vtt  20.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.vtt  20.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.lrc  20.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.txt  20.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.srt  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.tsv  20.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.srt  20.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.lrc  20.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.tsv  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Access Control Encryption for General Policies from Standard Assumptions.eng.text  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.srt  20.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.srt  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.txt  20.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.txt  20.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.tsv  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.lrc  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.tsv  20.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Cryptanalysis of Reduced round SKINNY Block Cipher.eng.srt  20.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.srt  20.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.lrc  20.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.srt  20.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/A - Formal Analysis of Boomerang Probabilities.eng.srt  20.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security from Simulatable Data Encapsulation.eng.text  20.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.vtt  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.vtt  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.srt  20.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.tsv  20.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.tsv  20.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/AWS key management service KMS - Shay Gueron (Amazon and U. of Haifa).eng.text  20.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Attestation as a Service (AaaS).eng.srt  20.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.eng.text  20.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.lrc  20.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly fr.eng.text  20.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.tsv  20.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.eng.text  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.lrc  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.srt  20.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Towards Easy Leakage Certification.eng.text  20.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.lrc  20.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.vtt  20.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Large Scale Secure Computation Multi Party Computation for Parallel RAM Programs.eng.text  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Succinct Non-Interactive Secure Computation.eng.text  20.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.srt  20.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.srt  20.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes.eng.text  20.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.lrc  20.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.tsv  20.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.srt  20.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.lrc  20.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.srt  20.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.tsv  20.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Secure Network Coding over the Integers.eng.text  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.tsv  20.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Multi Party Computation, From Passive to Active Security via Secure SIMD Circuits.eng.text  20.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.lrc  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.tsv  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/OptORAMa Optimal Oblivious RAM.eng.text  20.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.tsv  20.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.txt  20.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.srt  20.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.lrc  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.vtt  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.tsv  20.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.vtt  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.srt  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.vtt  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.txt  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.vtt  20.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.vtt  20.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.tsv  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.tsv  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Concurrently Secure Computation in Constant Rounds.eng.text  20.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Master-Key KDM-Secure IBE from Pairings.eng.text  20.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/The Mix-and-Cut Shuffle - Small-Domain Encryption Secure.eng.text  20.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/SoK A Consensus Taxonomy in the Blockchain Era.eng.srt  20.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.srt  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.eng.text  20.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.vtt  20.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Revisiting the Expected Cost of Solving uSVP and Applications to LWE.eng.text  20.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.txt  20.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.vtt  20.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Yes, There is an Oblivious RAM Lower Bound.eng.text  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.vtt  20.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.srt  20.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.txt  20.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Key Wrapping for Cryptographic APIs.eng.text  20.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.lrc  20.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.vtt  20.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.vtt  20.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.srt  20.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.tsv  20.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient simulation of random states and random unitaries.eng.text  20.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.txt  20.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.srt  20.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Non interactive multiparty computation without correlated randomness.eng.text  20.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.tsv  20.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.srt  20.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.tsv  20.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.srt  20.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Comparing the usability of cryptographic APIs - Yasemin Acar (Leibniz U. Hannover).eng.text  20.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Information Retrieval with Sublinear Online Time.eng.text  20.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.tsv  20.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.tsv  20.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.vtt  20.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Substitution-Permutation Networks, Pseudorandom Function.eng.text  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.tsv  20.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange.eng.text  20.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.srt  20.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.txt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.txt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.tsv  20.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.srt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.lrc  20.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Probabilistic Termination and Composability of Cryptographic Protocols.eng.text  20.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.srt  20.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.txt  20.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.tsv  20.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.vtt  20.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Topology-Hiding Computation for Networks with Unknown Delays.eng.text  20.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.eng.srt  20.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.vtt  20.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.srt  20.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.vtt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/On the Power of Hierarchical Identity-Based Encryption.eng.text  20.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.txt  20.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.srt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.eng.text  20.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.vtt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.txt  20.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Collusion-Preserving Computation.eng.text  20.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.tsv  20.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.tsv  20.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.vtt  20.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.lrc  20.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.txt  20.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.vtt  20.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.vtt  20.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.srt  20.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.vtt  20.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.tsv  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.tsv  20.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.srt  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.srt  20.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.tsv  20.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.vtt  20.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.txt  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.lrc  20.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.lrc  20.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/From 5 pass MQ based identification to MQ based signatures.eng.text  20.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.lrc  20.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.txt  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Supersingular Isogeny Graphs and Endomorphism Rings - Reductions and Solutions.eng.text  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Recovering Short Generators of Principal Ideals in Cyclotomic Rings, by oded regev.eng.text  20.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.vtt  20.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.srt  20.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Smaller Decoding Exponents - Ball-Collision Decoding.eng.text  20.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.srt  20.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.srt  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.tsv  20.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.txt  20.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.tsv  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.tsv  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.vtt  20.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.srt  20.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.lrc  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.tsv  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Updateable Inner Product Argument with Logarithmic Verifier and Applications.eng.text  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.txt  20.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.srt  20.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.eng.srt  20.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.txt  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.txt  20.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.txt  20.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.tsv  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.lrc  20.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.vtt  20.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.srt  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact NIZKs from Standard Assumptions on Bilinear Maps.eng.text  20.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.vtt  20.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Encrypted cloud storage - lessons learned from a security review - Anders Dalskov.eng.text  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.tsv  20.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Memento - How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.eng.text  20.0 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Cryptographic Sensing.eng.text  20.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.txt  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.vtt  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.tsv  20.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.lrc  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.vtt  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.tsv  20.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.eng.text  20.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.txt  20.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.tsv  20.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.vtt  20.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Witness Maps and Applications.eng.text  20.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.lrc  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.vtt  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Property Preserving Symmetric Encryption.eng.text  20.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.srt  20.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Use Bitcoin to Design Fair Protocols.eng.text  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/All-But-Many Lossy Trapdoor Functions.eng.text  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.eng.text  20.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.vtt  20.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.srt  19.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups.eng.text  19.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.srt  19.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.vtt  19.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.txt  19.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.srt  19.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.vtt  19.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Retracing Boomerang Attack.eng.text  19.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.vtt  19.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.lrc  19.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.srt  19.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.lrc  19.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.srt  19.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.srt  19.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.vtt  19.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.lrc  19.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.lrc  19.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.lrc  19.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.txt  19.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.vtt  19.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.vtt  19.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.txt  19.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Timing Black-Box Attacks Crafting Adversarial Examples through Timing Leaks against DNNs on Em.eng.srt  19.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.lrc  19.8 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.txt  19.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.eng.text  19.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.srt  19.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.txt  19.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.tsv  19.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.lrc  19.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.srt  19.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.tsv  19.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.srt  19.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.txt  19.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.tsv  19.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.lrc  19.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.lrc  19.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.txt  19.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.srt  19.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.tsv  19.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.srt  19.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.vtt  19.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/On the Communication required for Unconditionally Secure Multiplication.eng.text  19.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.txt  19.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.txt  19.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.txt  19.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.srt  19.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.lrc  19.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.txt  19.8 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.vtt  19.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.vtt  19.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Memory Efficient Algorithms for Finding Needles in Haystacks.eng.text  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.vtt  19.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Schemes from Isogeny Assumptions.eng.text  19.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.vtt  19.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.vtt  19.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.lrc  19.7 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.vtt  19.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Quantum Period Finding is Compression Robust.eng.srt  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.srt  19.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.vtt  19.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.lrc  19.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.txt  19.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.srt  19.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.txt  19.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.tsv  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.tsv  19.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.tsv  19.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge.eng.text  19.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Ring Signatures in the Standard Model.eng.text  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.txt  19.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Predicate Encryption for Circuits from LWE.eng.text  19.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.tsv  19.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.tsv  19.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.vtt  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.vtt  19.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.txt  19.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.txt  19.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.vtt  19.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the ASASA Cryptosystem with Expanding S boxes.eng.text  19.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.tsv  19.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Data Is a Stream Security of Stream Based Channels.eng.text  19.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.lrc  19.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.lrc  19.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Indifferentiability of Key-Alternating Ciphers.eng.text  19.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.vtt  19.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.tsv  19.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Fine grained Cryptography.eng.text  19.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.vtt  19.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.tsv  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Degree 2 is Complete for the Round-Complexity of Malicious MPC.eng.srt  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.vtt  19.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.txt  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Optimization of LPN Solving Algorithms.eng.text  19.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.vtt  19.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.tsv  19.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.tsv  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.vtt  19.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.tsv  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.lrc  19.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.vtt  19.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.srt  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.lrc  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Combiners for Functional Encryption, Unconditionally.eng.text  19.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.tsv  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Public Seed Pseudorandom Permutations.eng.text  19.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.lrc  19.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.eng.text  19.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptography with One Way Communication.eng.text  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.tsv  19.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.lrc  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.srt  19.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.lrc  19.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.vtt  19.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.tsv  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.txt  19.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.lrc  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.tsv  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.tsv  19.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Key Homomorphic Authenticators.eng.text  19.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.vtt  19.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.srt  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.srt  19.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Padding Oracle Attacks on Cryptographic Hardware.eng.text  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.vtt  19.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.vtt  19.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.vtt  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.tsv  19.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.vtt  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.vtt  19.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.srt  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.tsv  19.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.lrc  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.tsv  19.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.lrc  19.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Counter-Cryptanalysis.eng.text  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.txt  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Compact Adaptively Secure ABE from k-Lin Beyond NC1 and towards NL.eng.text  19.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.srt  19.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.srt  19.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.tsv  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.tsv  19.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.tsv  19.5 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.lrc  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A General Polynomial Selection Method and New Asymptotic Complexities for.eng.text  19.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.vtt  19.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.lrc  19.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.eng.text  19.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.lrc  19.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.vtt  19.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.srt  19.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.lrc  19.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Concurrent Secure Computation via Non Black Box Simulation.eng.text  19.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.srt  19.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Leakage-Resilient Key Exchange and Two-Seed Extractors.eng.text  19.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.lrc  19.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.vtt  19.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.eng.text  19.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.srt  19.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.eng.text  19.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.tsv  19.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.lrc  19.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.srt  19.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.vtt  19.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.vtt  19.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/The Bitcoin Backbone Protocol with Chains of Variable Difficulty.eng.text  19.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.srt  19.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.srt  19.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.tsv  19.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.tsv  19.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.vtt  19.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.srt  19.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.srt  19.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.vtt  19.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.txt  19.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Proofs of Space.eng.text  19.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Tightly CCA-Secure Encryption Without Pairings.eng.text  19.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.srt  19.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Differential Computation Analysis Hiding your White Box Designs is Not Enough.eng.text  19.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.srt  19.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.tsv  19.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.vtt  19.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Secure Protocol Transformations.eng.srt  19.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.eng.text  19.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.tsv  19.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.lrc  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.txt  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.tsv  19.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Structure Preserving Smooth Projective Hashing.eng.text  19.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.txt  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.vtt  19.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.tsv  19.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.vtt  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts.eng.text  19.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.srt  19.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Security of Multiple Encryption in the Ideal Cipher Model.eng.text  19.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Impossible plain'text cryptanalysis and probable plain'text collision attacks of 64 bit block ci.eng.text  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.tsv  19.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.tsv  19.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.tsv  19.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.tsv  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Composition with Responsive Environments.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.srt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.tsv  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.vtt  19.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Sublinear-Round Byzantine Agreement Under Corrupt Majority.eng.text  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.lrc  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.tsv  19.2 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.eng.text  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Live version of - Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.eng.srt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Constant Round Asynchronous Multi Party Computation Based on One Way Functions.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.vtt  19.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.tsv  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.lrc  19.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.vtt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Authenticated Encryption with Variable Stretch.eng.text  19.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.txt  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Side-channel Masking with Pseudo-Random Generator.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Non Malleable Secret Sharing for General Access Structures.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.vtt  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.txt  19.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.vtt  19.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.srt  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.vtt  19.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.txt  19.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.vtt  19.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.txt  19.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.vtt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.vtt  19.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security of Symmetric Encryption against Mass Surveillance.eng.text  19.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.vtt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster Algorithms for Isogeny Problems using Torsion Point Images.eng.text  19.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.srt  19.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/When are Fuzzy Extractors Possible.eng.text  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.tsv  19.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.tsv  19.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.vtt  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.lrc  19.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.tsv  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.vtt  19.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Threshold Ring Signatures New Definitions and Post-quantum Security.eng.text  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.vtt  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.txt  19.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.txt  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Marlin Preprocessing zkSNARKs with Universal and Updatable SRS.eng.text  19.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.tsv  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.srt  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Zero Knowledge Arguments for Lattice-Based PRFs and applications to e-cash.eng.text  19.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.srt  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/bison Instantiating the Whitened Swap-Or-Not Construction.eng.text  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.vtt  19.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.txt  19.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptography with Tamperable and Leaky Memory (Crypto 2011).eng.text  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Fractal Post-Quantum and Transparent Recursive Proofs from Holography.eng.text  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.lrc  19.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.lrc  19.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.vtt  19.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.tsv  19.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.vtt  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/On the Depth of Oblivious Parallel RAM.eng.text  19.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.srt  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.srt  19.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.tsv  19.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.tsv  19.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.vtt  19.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.tsv  19.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.tsv  19.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.vtt  19.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.vtt  19.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.txt  19.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.srt  19.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.eng.text  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.txt  19.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.tsv  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.srt  19.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.txt  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On Instantiating the Algebraic Group Model from Falsifiable Assumptions.eng.text  19.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Nonlinear Approximations in Cryptanalysis Revisited.eng.text  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.txt  19.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.srt  19.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.lrc  19.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.tsv  19.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.srt  19.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.tsv  19.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.txt  19.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Mon$$ mathbb {Z} {2{k}}$$a Fast Maliciously Secure Two Party Computation on $$ mathbb {Z} {2.eng.text  19.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.vtt  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.lrc  19.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.vtt  19.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.vtt  19.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.txt  19.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.srt  19.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.srt  19.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.txt  19.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Arguments of Proximity.eng.text  19.0 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/The Cost of Adaptivity in Security Games on Graphs.eng.text  19.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Secure Multi-Party Computation with Identifiable Abort.eng.text  19.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.lrc  19.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Scalable Zero Knowledge via Cycles of Elliptic Curves.eng.text  19.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence.eng.text  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Statistical Tools Flavor Side-Channel Collision Attacks.eng.text  19.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Improving Key-Recovery in Linear Attacks Application to 28-round PRESENT.eng.text  18.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.tsv  18.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.tsv  18.9 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.srt  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.srt  18.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.tsv  18.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multi-instance Security and Its Application to Password-.eng.text  18.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.vtt  18.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.tsv  18.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.vtt  18.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.lrc  18.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.tsv  18.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.txt  18.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.tsv  18.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.tsv  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Two-Round Multiparty Secure Computation from Minimal Assumptions.eng.text  18.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/New Attacks on Feistel Structures with Improved Memory Complexities.eng.text  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.vtt  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient and Optimally Secure Key-Length Extension for.eng.text  18.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.tsv  18.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Stam's Conjecture and Threshold Phenomena in Collision R.eng.text  18.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.vtt  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.srt  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.lrc  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Measure-Rewind-Measure Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CC.eng.text  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.lrc  18.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Lossy CSI-FiSh Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.eng.text  18.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.vtt  18.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.lrc  18.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.txt  18.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.tsv  18.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.eng.text  18.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.vtt  18.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.srt  18.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.srt  18.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.lrc  18.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.lrc  18.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.txt  18.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.lrc  18.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.tsv  18.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.vtt  18.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.vtt  18.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.srt  18.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.lrc  18.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.vtt  18.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Secure Computation from Elastic Noisy Channels.eng.text  18.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/qDSA Small and Secure Digital Signatures with Curve based Diffie Hellman Key Pairs.eng.text  18.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.eng.srt  18.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Homomorphic Encryption from Learning with Errors - Concep.eng.text  18.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Let’s Take it Offline Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA.eng.text  18.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A New Algorithm for the Unbalanced Meet in the Middle Problem.eng.text  18.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.vtt  18.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.tsv  18.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.txt  18.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Quantum Proofs of Knowledge.eng.text  18.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.tsv  18.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Generate and use Universal Samplers.eng.text  18.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.srt  18.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.lrc  18.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.srt  18.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.tsv  18.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.txt  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.tsv  18.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.vtt  18.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.txt  18.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.vtt  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.lrc  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.srt  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Multiparty Computation with Low Communication, Computati.eng.text  18.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.srt  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.lrc  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.tsv  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.srt  18.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.vtt  18.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.tsv  18.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.vtt  18.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.vtt  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Two-Round Oblivious Transfer from CDH or LPN.eng.text  18.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks.eng.text  18.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Computer-Aided Security Proofs for the Working Cryptographer (Crypto 2011).eng.text  18.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.tsv  18.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.txt  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Weight Discrete Logarithms and Subset Sum in $2{0.65n}$ with Polynomial Memory.eng.text  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Authenticated Encryption in the Face of Protocol and Side Channel Leakage.eng.text  18.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.srt  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.vtt  18.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.lrc  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.vtt  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.srt  18.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Digital Signatures with Minimal Overhead from Indifferen.eng.text  18.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Distributional Collision Resistance Beyond One-Way Functions.eng.text  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.tsv  18.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.lrc  18.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.srt  18.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/A Key recovery Attack on 855 round Trivium.eng.srt  18.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.srt  18.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.vtt  18.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.txt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.vtt  18.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.eng.text  18.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Physical Layer Group Key Agreement for Automotive Controller Area Network.eng.text  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.srt  18.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Tightly secure signatures from five move identification protocols.eng.text  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.txt  18.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.vtt  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.txt  18.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.vtt  18.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.vtt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.tsv  18.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.lrc  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Reusable Designated-Verifier NIZKs for all NP from CDH.eng.srt  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials.eng.text  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.txt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.tsv  18.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.txt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.srt  18.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.srt  18.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.srt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.txt  18.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.srt  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.vtt  18.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.tsv  18.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.txt  18.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.vtt  18.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.vtt  18.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.srt  18.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.srt  18.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.lrc  18.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Quantum Collision Attacks on Reduced SHA-256 and SHA-512.eng.text  18.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/FAST Secure and High Performance Format-Preserving Encryption and Tokenization.eng.text  18.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.srt  18.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.vtt  18.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Semantic Security for the Wiretap Channel.eng.text  18.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.vtt  18.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.vtt  18.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.srt  18.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.lrc  18.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.vtt  18.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.txt  18.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Kahn Ni Melm - John Steinbeck's Secret Language.eng.srt  18.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.tsv  18.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.txt  18.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 2-2.eng.text  18.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.srt  18.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.lrc  18.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Narrow-Bicliques - Cryptanalysis of Full IDEA.eng.text  18.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.txt  18.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Privacy preserving search of similar patients in genomic data - Gilad Asharov (Cornell Tech).eng.text  18.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/To Hash or Not to Hash Again (In)Differentiability Resu.eng.text  18.5 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.tsv  18.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.txt  18.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Symmetric Key Cryptanalysis - Automated Tools - talk 1 3.eng.srt  18.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.txt  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.srt  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.lrc  18.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.vtt  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.txt  18.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.tsv  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.tsv  18.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense.eng.srt  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.lrc  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.tsv  18.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.lrc  18.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.txt  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.lrc  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.lrc  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Continuous Verifiable Delay Functions.eng.text  18.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Multi Key Security The Even Mansour Construction Revisted.eng.text  18.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.lrc  18.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Breaking '128-bit Secure' Supersingular Binary Curves.eng.text  18.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/vatiCAN Vetted, Authenticated CAN Bus.eng.text  18.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.lrc  18.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Quantum to Classical Randomness Extractors.eng.text  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.txt  18.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.txt  18.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.lrc  18.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.vtt  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Fully Homomorphic Encryption with Polylog Overhead.eng.text  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.vtt  18.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.vtt  18.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.srt  18.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.txt  18.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/An Efficiency-Preserving Transformation from.eng.text  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.srt  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.tsv  18.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.srt  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.tsv  18.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.vtt  18.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.tsv  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.vtt  18.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.lrc  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.tsv  18.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.txt  18.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.tsv  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Faster Algorithms for Solving LPN.eng.text  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Unconditionally Secure Computation with Reduced Interaction.eng.text  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.lrc  18.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.lrc  18.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.srt  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fault-Injection Attacks against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.eng.text  18.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.lrc  18.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.srt  18.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.vtt  18.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.vtt  18.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.txt  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/JIMU Faster LEGO based Secure Computation using Additive Homomorphic Hashes.eng.text  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.tsv  18.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.tsv  18.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.srt  18.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.vtt  18.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.srt  18.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.vtt  18.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Fully Deniable Interactive Encryption.eng.text  18.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Leakage-Resilient Zero Knowledge (Crypto 2011).eng.text  18.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.srt  18.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.tsv  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Continuous Non-Malleable Codes in the 8-Split-State Model.eng.text  18.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.vtt  18.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.vtt  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.tsv  18.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of WIDEA.eng.text  18.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE.eng.text  18.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.srt  18.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Preventing Pollution Attacks in Multi-source Network Coding.eng.text  18.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.srt  18.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.srt  18.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adaptive Versus Non Adaptive Strategies in the Quantum Setting with Applications.eng.text  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.lrc  18.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.lrc  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.lrc  18.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Construction of Differential Characteristics in ARX Desi.eng.text  18.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.srt  18.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.vtt  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.vtt  18.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.vtt  18.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/PoW Based Distributed Cryptography with no Trusted Setup.eng.text  18.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.vtt  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.txt  18.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.vtt  18.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.vtt  18.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Computation against Adaptive Auxiliary Information.eng.text  18.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.txt  18.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.vtt  18.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.vtt  18.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.lrc  18.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.txt  18.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.srt  18.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.tsv  18.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.txt  18.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Transparent SNARKs from DARK Compilers.eng.text  18.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.lrc  18.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.tsv  18.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Time-Lock Puzzles in the Random Oracle Model.eng.text  18.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.srt  18.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Simple Key Enumeration and Rank Estimation using Histograms an Integrated Approach.eng.text  18.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.srt  18.1 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Statistical ZAPs from Group-Based Assumptions.eng.text  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.vtt  18.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.lrc  18.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.tsv  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.tsv  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.vtt  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.vtt  18.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.vtt  18.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Online Authenticated Encryption and its Nonce Reuse Misuse Resistance.eng.text  18.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.srt  18.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.vtt  18.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.tsv  18.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.srt  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.srt  18.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.tsv  18.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.lrc  18.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.tsv  18.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Efficient Multiparty Protocols via Log-Depth Threshold F.eng.text  18.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/From Selective to Adaptive Security in Functional Encryption.eng.text  18.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.txt  18.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.txt  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Efficient Leakage-Resilient MACs without Idealized Assumptions.eng.text  18.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/More Efficient Universal Circuit Constructions.eng.text  18.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.srt  18.0 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.txt  18.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/An Algebraic Attack on Rank Metric Code-Based Cryptosystems.eng.text  18.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.srt  18.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.vtt  18.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.tsv  18.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.tsv  18.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.tsv  18.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.tsv  18.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.lrc  18.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Consolidating Inner product Masking.eng.text  18.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.srt  18.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.lrc  18.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Characterisation and Estimation of the Key Rank Distribution in the context of side channel.eng.text  18.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.tsv  18.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.tsv  18.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.txt  18.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.lrc  18.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.txt  18.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.srt  18.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.vtt  18.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/On the end to end security of group chats - Paul Rösler (U. Bochum).eng.text  17.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Low Error Efficient Computational Extractors in the CRS Model.eng.text  17.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.vtt  17.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.srt  17.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.tsv  17.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.txt  17.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions.eng.text  17.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.vtt  17.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Almost Optimal Constructions of UOWHFs from 1 to 1, Regular One way Functions and Beyond.eng.text  17.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.tsv  17.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.lrc  17.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Robust transforming combiners from indistinguishability obfuscation to functional encryption.eng.text  17.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.eng.text  17.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.tsv  17.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Proving Resistance against Invariant Attacks - How to Choose the Round Constants.eng.text  17.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A subfield lattice attack on overstretched NTRU assumptions - Cryptanalysis of some FHE and Graded En.eng.text  17.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.lrc  17.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.srt  17.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Collisions and Semi Free Start Collisions for Round Reduced RIPEMD 160.eng.text  17.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.srt  17.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.vtt  17.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.lrc  17.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Efficient Dissection of Composite Problems, with Applica.eng.text  17.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.txt  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.tsv  17.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.lrc  17.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.vtt  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/All Complete Functionalities are Reversible.eng.text  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.tsv  17.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bandwidth-Efficient Threshold EC-DSA.eng.text  17.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Blazing Fast OT for Three-Round UC OT Extension.eng.text  17.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.lrc  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.txt  17.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.vtt  17.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.lrc  17.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.vtt  17.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Inverting HFE Systems is Quasi-Polynomial for All Fields.eng.text  17.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.tsv  17.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.srt  17.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.srt  17.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.txt  17.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.eng.text  17.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.lrc  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.tsv  17.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/A Correlation Attack on Full SNOW-V and SNOW-Vi.eng.srt  17.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.vtt  17.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.vtt  17.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.tsv  17.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.tsv  17.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.vtt  17.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.tsv  17.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.srt  17.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient Fuzzy Extraction of PUF Induced Secrets Theory and Applications.eng.text  17.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Grover Meets Simon - Quantumly Attacking the FX construction.eng.text  17.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Physical Zero-Knowledge Proofs of Physical Properties.eng.text  17.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.srt  17.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.srt  17.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.srt  17.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.tsv  17.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Secure Computation from Leaky Correlated Randomness.eng.text  17.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.eng.text  17.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/On the Security of Supersingular Isogeny Cryptosystems.eng.text  17.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.srt  17.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.srt  17.7 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.vtt  17.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.vtt  17.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.tsv  17.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.tsv  17.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Private Aggregation from Fewer Anonymous Messages.eng.text  17.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.lrc  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.lrc  17.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.vtt  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.vtt  17.6 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.lrc  17.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.tsv  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.vtt  17.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Highly-Scalable Searchable Symmetric Encryption with Sup.eng.text  17.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.txt  17.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.srt  17.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.srt  17.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.vtt  17.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.txt  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.txt  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.eng.text  17.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.tsv  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.tsv  17.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.txt  17.6 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.tsv  17.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bloom Filters in Adversarial Environments.eng.text  17.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.vtt  17.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On a Generalization of Substitution-Permutation Networks The HADES Design Strategy.eng.text  17.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.tsv  17.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.txt  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.vtt  17.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.eng.text  17.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Faster Cofactorization with ECM Using Mixed Representations.eng.text  17.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.tsv  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.tsv  17.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/MiMC - Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.eng.text  17.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.tsv  17.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.eng.text  17.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.vtt  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.vtt  17.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.tsv  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Freestart Collision for Full SHA-1.eng.text  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Sigma protocols for MQ, PKP and SIS, and fishy signature schemes.eng.text  17.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Learning with Rounding, Revisited - New Reduction, Prope.eng.text  17.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.srt  17.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Pseudorandom Functions via On the Fly Adaptation.eng.text  17.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.vtt  17.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.txt  17.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.srt  17.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.srt  17.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.txt  17.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Indistinguishability Obfuscation from Compact Functional Encryption.eng.text  17.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.vtt  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Adaptive Simulation Security for Inner Product Functional Encryption.eng.text  17.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.tsv  17.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.lrc  17.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.vtt  17.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Continuously Non Malleable Codes in the Split State Model from Minimal Assumptions.eng.text  17.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Stacked Garbling for Disjunctive Zero-Knowledge Proofs.eng.text  17.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.tsv  17.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.srt  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.lrc  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.lrc  17.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.srt  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.vtt  17.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/The Kernel Matrix Diffie Hellman Assumption.eng.text  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Functional Encryption for Inner Product - Achieving Const.eng.text  17.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.vtt  17.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.lrc  17.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.tsv  17.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.tsv  17.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.srt  17.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.vtt  17.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.vtt  17.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.tsv  17.3 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.vtt  17.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Quantum One-Time Programs - (Extended Abstract).eng.text  17.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.vtt  17.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.srt  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient and Provable White Box Primitives.eng.text  17.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.tsv  17.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.vtt  17.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.srt  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Selective Opening Security in the Presence of Randomness Failures.eng.text  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.lrc  17.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Going Beyond Dual Execution MPC for Functions with Efficient Verification.eng.text  17.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.tsv  17.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.lrc  17.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.lrc  17.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.eng.text  17.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Constant-Rate Oblivious Transfer from Noisy Channels.eng.text  17.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.eng.text  17.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.tsv  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.tsv  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.eng.text  17.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Succinct Spooky Free Compilers Are Not Black Box Sound.eng.text  17.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.srt  17.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Optimal Merging in Quantum $k$-xor and $k$-sum Algorithms.eng.text  17.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.srt  17.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.eng.text  17.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.tsv  17.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.srt  17.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.vtt  17.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.txt  17.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Attribute-Based Encryption for Circuits from Multilinear.eng.text  17.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Full Domain Hash from (Leveled) Multilinear Maps and Ide.eng.text  17.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Adaptively Secure Garbling with Near Optimal Online Complexity.eng.text  17.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.srt  17.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.vtt  17.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.txt  17.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Flush, Gauss, and Reload A Cache Attack on the BLISS Lattice Based Signature Scheme.eng.text  17.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.vtt  17.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.srt  17.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.eng.text  17.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Tweaking Even Mansour Ciphers.eng.text  17.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.srt  17.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.vtt  17.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.vtt  17.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.vtt  17.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Kummer for Genus One over Prime Order Fields.eng.text  17.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.vtt  17.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.txt  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.vtt  17.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.vtt  17.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.txt  17.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.tsv  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.txt  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Single-Shot Security for One-Time Memories in the Isolated Qubits Model.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Lattice Based Fully Dynamic Multi Key FHE with Short Ciphertexts.eng.text  17.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Minicrypt Primitives with Algebraic Structure and Applications.eng.text  17.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Curious case of Rowhammer Flipping Secret Exponent Bits using Timing Analysis.eng.text  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.tsv  17.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Test of Time Awards.eng.srt  17.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.vtt  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Faster Bootstrapping with Polynomial Error.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Homomorphic Signatures with Efficient Verification for Polynomial Functions.eng.text  17.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.tsv  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Polynomial Spaces - A New Framework for Composite-to-Prime-Order Transformations.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.vtt  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.eng.text  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.vtt  17.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Generic Attacks against Hash-Based MACs and HAIFA.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.vtt  17.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.lrc  17.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.txt  17.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.lrc  17.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.tsv  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Optimal rate non committing encryption.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.srt  17.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.tsv  17.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.eng.text  17.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.vtt  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.tsv  17.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Secure Message Authentication Against Related-Key Attack.eng.text  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.tsv  17.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.srt  17.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.srt  17.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.vtt  17.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/On the Feasibility of Consistent Computations.eng.text  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Friet an Authenticated Encryption Scheme with Built-in Fault Detection.eng.text  17.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.tsv  17.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.vtt  17.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.tsv  17.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.srt  17.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.eng.text  17.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.lrc  17.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.vtt  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Multi-input Functional Encryption in the Private-Key Setting -.eng.text  17.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.srt  17.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.tsv  17.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.lrc  17.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Dynamic Credentials and Ciphertext Delegation for Attrib.eng.text  17.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.vtt  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.vtt  17.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.srt  17.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.txt  17.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.txt  17.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Amplifying Privacy in Privacy Amplification.eng.text  16.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.srt  16.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.lrc  16.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Sublinear Zero Knowledge Arguments for RAM Programs.eng.text  16.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Homomorphic Evaluation of the AES Circuit.eng.text  16.9 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/Unifying Leakage Models on a Renyi Day.eng.text  16.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.txt  16.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Robust Coin Flipping.eng.text  16.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.tsv  16.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Tightly Secure Lattice Short Signature and Id Based Encryption.eng.text  16.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.lrc  16.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Algorithms in HElib.eng.text  16.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/How Fast Can Higher Order Masking Be in Software.eng.text  16.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.tsv  16.9 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.tsv  16.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.srt  16.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.txt  16.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.vtt  16.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.tsv  16.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.srt  16.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.srt  16.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.vtt  16.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.srt  16.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.vtt  16.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.srt  16.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.tsv  16.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Framework for Automated Independent-Biclique Cryptanalysis.eng.text  16.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.vtt  16.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.vtt  16.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.txt  16.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.lrc  16.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Bringing Order to Chaos The Case of Collision-Resistant Chameleon-Hashes.eng.text  16.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.srt  16.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.tsv  16.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.srt  16.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.lrc  16.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.tsv  16.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/No Place to Hide Contactless Probing of Secret Data on FPGAs.eng.text  16.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.lrc  16.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.tsv  16.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.tsv  16.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.vtt  16.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Opening remarks.eng.srt  16.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Incremental Deterministic Public-Key Encryption.eng.text  16.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.txt  16.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.srt  16.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.vtt  16.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.vtt  16.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.vtt  16.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.tsv  16.7 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Robust Non Interactive Multiparty Computation Against Constant Size Collusion.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Must You Know the Code of f to Securely Compute f.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Algebriac Decomposition for Probing Security.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.srt  16.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/PSI from PaXoS Fast, Malicious Private Set Intersection.eng.text  16.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Memory-Tightness of Hashed ElGamal.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/How to Run Turing Machines on Encrypted Data.eng.text  16.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Security of Hedged Fiat-Shamir Signatures under Fault Attacks.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Low Overhead Broadcast Encryption from Multilinear Maps.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Verification of Operations on Dynamic Sets (Crypto 2011).eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac.eng.text  16.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Symmetric Encryption with Distinguishable Decryption Failures.eng.text  16.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/How to Reveal the Secrets of an Obscure White-Box Implementation - Junwei Wang.eng.text  16.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum Security Analysis of CSIDH.eng.text  16.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.lrc  16.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.tsv  16.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Unconditionally-Secure Robust Secret Sharing with Compac.eng.text  16.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.txt  16.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Universal Composability from Essentially Any Trusted Setup.eng.text  16.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.srt  16.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.tsv  16.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.vtt  16.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.tsv  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.vtt  16.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Time Zero Knowledge Proofs for Arithmetic Circuit Satisfiability.eng.text  16.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.tsv  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.vtt  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.eng.text  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.srt  16.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.lrc  16.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.tsv  16.6 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.vtt  16.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.vtt  16.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.srt  16.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Maliciously Circuit-Private FHE.eng.text  16.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Efficient Zero-Knowledge Argument for Correctness of a S.eng.text  16.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Securing Circuits against Constant-Rate Tampering.eng.text  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Automatic Search of Attacks on Round-Reduced AES and Applications (Crypto 2011).eng.text  16.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.srt  16.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New Attacks on the Concatenation and XOR Hash Combiners.eng.text  16.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.txt  16.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.tsv  16.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.lrc  16.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.srt  16.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.srt  16.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.tsv  16.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.tsv  16.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.txt  16.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.srt  16.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.txt  16.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.srt  16.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.eng.text  16.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.tsv  16.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.srt  16.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Quantum-access-secure message authentication via blind-unforgeability.eng.text  16.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.vtt  16.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Order-Preserving Encryption Revisited - Improved Security Analysis and Alternative Solutions.eng.text  16.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.tsv  16.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Statistical Concurrent Non malleable Zero knowledfe from One way Functions.eng.text  16.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Standard Security Does Not Imply Security against Select.eng.text  16.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Complementing Feistel Ciphers.eng.text  16.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Key-Alternating Ciphers in a Provable Setting - Encryptio.eng.text  16.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.srt  16.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.vtt  16.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/jasny-bootstrap.css  16.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.tsv  16.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.tsv  16.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.vtt  16.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.txt  16.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Functional Encryption - New Perspectives and Lower Bounds.eng.text  16.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.srt  16.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.tsv  16.4 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.srt  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.vtt  16.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/iacr-logo.png  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.lrc  16.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.lrc  16.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.lrc  16.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.eng.text  16.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Near Collision Attack on the Grain v1 Stream Cipher.eng.text  16.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis.eng.text  16.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.vtt  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.srt  16.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.srt  16.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.tsv  16.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.tsv  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.tsv  16.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hash Functions Based on Three Permutations - A Generic Se.eng.text  16.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.srt  16.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Instantiating Random Oracles via UCEs.eng.text  16.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.vtt  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Ora.eng.srt  16.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Reactive and proactive standardisation of TLS - Thyla van der Merwe (Royal Holloway).eng.text  16.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.tsv  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.tsv  16.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.lrc  16.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.txt  16.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/A Subversion-Resistant SNARK.eng.text  16.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.tsv  16.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.vtt  16.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.eng.text  16.4 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.tsv  16.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.vtt  16.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.tsv  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.vtt  16.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.vtt  16.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.srt  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.txt  16.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hard-Core Predicates for a Diffie-Hellman Problem over F.eng.text  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.txt  16.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Communication Complexity of Conditional Disclosure of Secrets and Attribute Based Encryption.eng.text  16.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/InterMAClib - beyond confidentiality and integrity in practice - Torben Brandt Hansen.eng.text  16.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.eng.text  16.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.tsv  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.txt  16.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.lrc  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.srt  16.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.tsv  16.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Black-Box Constructions of Composable Protocols without.eng.text  16.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.tsv  16.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.txt  16.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Crowd-Blending Privacy.eng.text  16.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Leakage-Tolerant Computation with Input-Independent Preprocessing.eng.text  16.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.vtt  16.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Security of TLS-DHE in the Standard Model.eng.text  16.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Unknown-Input Attacks in the Parallel Setting - Improving the Security of the.eng.text  16.3 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.vtt  16.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.txt  16.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.vtt  16.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.tsv  16.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.srt  16.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.lrc  16.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Sanitization of FHE Ciphertexts.eng.text  16.2 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.eng.text  16.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.lrc  16.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Evolving Ramp Secret Sharing with a Small Gap.eng.text  16.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.srt  16.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.eng.text  16.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.lrc  16.2 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.vtt  16.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/FleXOR - Flexible garbling for XOR gates that beats free-XOR.eng.text  16.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.vtt  16.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.srt  16.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Linear Cryptanalysis of DES with Asymmetries.eng.text  16.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/QcBits constant time small key code based cryptography.eng.text  16.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.srt  16.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/The Exact PRF-Security of NMAC and HMAC.eng.text  16.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.lrc  16.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.tsv  16.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.txt  16.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.txt  16.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.lrc  16.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit.eng.text  16.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/Opening remarks.eng.srt  16.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.vtt  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/An Algebraic Framework for Diffie-Hellman Assumptions.eng.text  16.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Statistical Zaps and New Oblivious Transfer Protocols.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/SNARKs for C - Verifying Program Executions Succinctly an.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.tsv  16.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.txt  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Plain versus Randomized Cascading-Based Key-Length Exten.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Structure-Preserving Signatures from Type II Pairings.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/A 270 Attack on the Full MISTY1.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.tsv  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Achieving the Limits of the Noisy-Storage Model Using En.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hierarchical Identity Based Encryption from Affine Messafe Authentication.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Lattice-Based Blind Signatures, Revisited.eng.text  16.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.tsv  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.srt  16.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.tsv  16.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.lrc  16.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/ALE - AES-Based Lightweight Authenticated Encryption.eng.text  16.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.txt  16.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.vtt  16.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Improved Short Lattice Signatures in the Standard Model.eng.text  16.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.tsv  16.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.srt  16.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.vtt  16.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Actively Secure Two-Party Evaluation of Any Quantum Oper.eng.text  16.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.txt  16.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/TNT How to Tweak a Block Cipher.eng.text  16.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.txt  16.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bilinear Entropy Expansion from the Decisional Linear Assumption.eng.text  16.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Broadcast-Optimal Two-Round MPC.eng.text  16.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Round Optimal Blind Signatures in the Standard Model.eng.text  16.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probab.eng.text  16.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Impossibility Results for Lattice-Based Functional Encryption Schemes.eng.text  16.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.tsv  16.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.srt  16.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Reactive Garbling Foundation, Instantiation, Application.eng.text  16.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.tsv  16.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.srt  16.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.tsv  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.vtt  15.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Implicit Zero Knowledge Arguments and Applications to the Malicious Setting.eng.text  15.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.txt  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.vtt  15.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.srt  15.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.vtt  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Faster Algorithms for Approximate Common Divisors - Break.eng.text  15.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.lrc  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.vtt  15.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.tsv  15.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/What Information Is Leaked under Concurrent Composition.eng.text  15.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.txt  15.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.lrc  15.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.tsv  15.9 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.tsv  15.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Encoding Functions with Constant Online Rate or How to C.eng.text  15.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.lrc  15.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.tsv  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.lrc  15.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.lrc  15.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.srt  15.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.tsv  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.tsv  15.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.vtt  15.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.vtt  15.9 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu.eng.text  15.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits on the Power of Cryptographic Cheap Talk.eng.text  15.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Constrained Pseudorandom Functions for Unconstrained Inputs.eng.text  15.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.vtt  15.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.lrc  15.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.vtt  15.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.srt  15.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.txt  15.8 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2022/TCC 2022 captions/business meeting.eng.srt  15.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.lrc  15.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.vtt  15.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Two Round PAKE from Approximate SPH and Instantiations from Lattices.eng.text  15.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.tsv  15.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.lrc  15.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.txt  15.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.txt  15.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.vtt  15.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.tsv  15.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.tsv  15.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Bootstrapping in Quasilinear Time.eng.text  15.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.txt  15.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.txt  15.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Practical Round Optimal Blind Signatures in the Standard Model.eng.text  15.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.vtt  15.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Near-Linear Unconditionally-Secure Multiparty Computatio.eng.text  15.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient Public Key Distance Bounding Protocol.eng.text  15.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.lrc  15.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Multi Input Functional Encryption with Unbounded Message Security.eng.text  15.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Tightly-Secure Signatures from Lossy Identification Schemes.eng.text  15.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.vtt  15.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.tsv  15.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.vtt  15.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.vtt  15.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.vtt  15.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES.eng.text  15.6 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019 captions/CCA Security and Trapdoor Functions via Key-Dependent-Message Security.eng.text  15.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.vtt  15.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.txt  15.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.eng.text  15.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level.eng.text  15.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/The Iterated Random Permutation Problem with Applications to Cascade Encryption.eng.text  15.6 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.lrc  15.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.srt  15.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Mitigating SAT Attack on Logic Locking.eng.text  15.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.lrc  15.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Toward RSA-OAEP Without Random Oracles.eng.text  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.tsv  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.srt  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.vtt  15.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.tsv  15.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.lrc  15.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.vtt  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits.eng.text  15.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.txt  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.lrc  15.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.eng.text  15.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Indifferentiability of Confusion-Diffusion Networks.eng.text  15.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.txt  15.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.vtt  15.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Everlasting Multi-party Computation.eng.text  15.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.txt  15.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Generic Attacks Against Beyond Birthday Bound MACs.eng.text  15.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.srt  15.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Streaming Indistinguishability of a Random Permutation and a Random Function.eng.text  15.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.tsv  15.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.srt  15.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.tsv  15.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.txt  15.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.txt  15.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Malicious for free OT Extension The Pipe is the Limit.eng.text  15.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.srt  15.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.tsv  15.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.srt  15.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.srt  15.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.txt  15.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Extracting Randomness from Extractor-Dependent Sources.eng.text  15.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.eng.text  15.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.tsv  15.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.lrc  15.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.json  15.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.tsv  15.5 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.srt  15.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round Concurrent Zero knowledge from Indistinguishability Obfuscation.eng.text  15.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.txt  15.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.vtt  15.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.lrc  15.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Adaptive Oblivious Transfer with Access Control from Lattice Assumptions.eng.text  15.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.tsv  15.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/uKummer efficient hyperelliptic signatures and key exchange on microcontrollers.eng.text  15.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.lrc  15.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.eng.text  15.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Quantum Position Verification in the Random Oracle Model.eng.text  15.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.vtt  15.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.vtt  15.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2021/Eurocrypt 2021 captions/Security Analysis of Quantum Lightning.eng.srt  15.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/The Minimum Number of Cards in Practical Card based Protocols 1-2.eng.text  15.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.lrc  15.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.vtt  15.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.tsv  15.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.vtt  15.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.lrc  15.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.lrc  15.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.lrc  15.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.tsv  15.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework.eng.text  15.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.vtt  15.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.tsv  15.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.vtt  15.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.lrc  15.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.tsv  15.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.srt  15.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Increasing Precision of Division Property.eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.tsv  15.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.vtt  15.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.vtt  15.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Security of Symmetric Encryption in the Presence of Ciph.eng.text  15.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Efficient Scalable Constant Round MPC via Garbled Circuits.eng.text  15.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.tsv  15.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption for Regular Languages.eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Differential Privacy with Imperfect Randomness.eng.text  15.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Optimal Security Proofs for Full Domain Hash, Revisited.eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.srt  15.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.vtt  15.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.vtt  15.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.srt  15.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secret Sharing, Rank Inequalities and Information Inequa.eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.vtt  15.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Verifiable Delegation of Computation over Large Datasets (Crypto 2011).eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Hardness of SIS and LWE with Small Parameters.eng.text  15.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.vtt  15.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.txt  15.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.srt  15.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Proving the TLS Handshake Secure (As It Is).eng.text  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.vtt  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.txt  15.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Non-Interactive Secure Multiparty Computation.eng.text  15.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Quantum Multicollision Finding Algorithm.eng.text  15.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Randomness Complexity of Private Circuits for Multiplication.eng.text  15.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Related-Key Attacks Against Full Hummingbird-2.eng.text  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.eng.text  15.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Hardness of LWE on General Entropic Distributions.eng.text  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.eng.text  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.vtt  15.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.vtt  15.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.tsv  15.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Algebraic Framework for Pseudorandom Functions and Applications to Related Key Security.eng.text  15.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.tsv  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.tsv  15.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/(One) failure is not an option Bootstrapping the search for failures in lattice-based encrypti.eng.text  15.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA.eng.text  15.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Set Operations in the Presence of Malicious Adversaries.eng.text  15.2 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Promise Zero Knowledge and its Applications to Round Optimal MPC.eng.text  15.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.tsv  15.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Known key Distinguisher on Full PRESENT.eng.text  15.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.eng.text  15.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Distribution of Linear Biases - Three Instructive.eng.text  15.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D.eng.srt  15.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Constraining and Watermarking PRFs from Milder Assumptions.eng.text  15.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Text Search Protocols with Simulation Based Security.eng.text  15.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.vtt  15.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Mind the Composition Birthday Bound Attacks on EWCDMD and SoKAC21.eng.text  15.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.lrc  15.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.vtt  15.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Amortizing Randomness Complexity in Private Circuits.eng.text  15.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.lrc  15.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.txt  15.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Software implementation of Koblitz curves over quadratic fields.eng.text  15.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.vtt  15.1 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/RSA-OAEP without Random Oracles, Featuring Eminem.eng.srt  15.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.tsv  15.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.vtt  15.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.vtt  15.1 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.tsv  15.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.vtt  15.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.txt  15.1 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.srt  15.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Cache Attacks Enable Bulk Key Recovery on the Cloud.eng.text  15.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.tsv  15.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.tsv  15.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.txt  15.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.srt  15.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.vtt  15.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Interactive Proofs under Continual Memory Leakage.eng.text  15.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.tsv  15.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Non-malleable Codes from Average-Case Hardness.eng.text  15.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.eng.text  15.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.tsv  15.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant Size Ciphertexts in Threshold Attribute-Based Encryption.eng.text  15.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.vtt  15.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.vtt  15.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Functional Encryption with Bounded Collusions via Multi-.eng.text  15.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How we avoided a second Dual-EC-DRBG fiasco.eng.srt  14.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.vtt  14.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.eng.text  14.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.tsv  14.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Automatic Search of Bit Based Division Property for ARX Ciphers and Word Based Division Property.eng.text  14.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.vtt  14.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.lrc  14.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.vtt  14.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.txt  14.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.vtt  14.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.vtt  14.9 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.lrc  14.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.lrc  14.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Adaptively Secure Multi-Party Computation with Dishonest.eng.text  14.8 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Remembering Nishant Kumar.eng.srt  14.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.eng.text  14.8 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.tsv  14.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Cryptanalysis of Round-Reduced LED.eng.text  14.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Minimizing the Two-Round Even-Mansour Cipher.eng.text  14.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.vtt  14.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Attacks and Security Proofs of EAX-Prime.eng.text  14.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.lrc  14.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.srt  14.8 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Random Self-reducibility of Ideal-SVP via Arakelov Random Walks.eng.text  14.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.vtt  14.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.tsv  14.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.vtt  14.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.txt  14.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.tsv  14.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Round-Efficient Black-Box Construction of Composable Multi-Party Computation.eng.text  14.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher Order Masking.eng.text  14.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.txt  14.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.txt  14.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.vtt  14.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.tsv  14.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Optimal Coding for Streaming Authentication and Interact.eng.text  14.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.vtt  14.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Post-Quantum Simulatable Extraction with Minimal Assumptions Black-Box and Constant-Round.eng.srt  14.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.srt  14.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.srt  14.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.eng.text  14.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.vtt  14.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.lrc  14.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Identity-Based Encryption Resilient to Continual Auxilia.eng.text  14.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Automated Analysis of Cryptographic Assumptions in Generic Group Models.eng.text  14.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secret Sharing Schemes for Very Dense Graphs.eng.text  14.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.srt  14.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.lrc  14.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.srt  14.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.lrc  14.6 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.txt  14.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.srt  14.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.srt  14.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.vtt  14.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Shuffle Argument Secure in the Generic Model.eng.text  14.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.txt  14.6 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.vtt  14.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.txt  14.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Improved OT Extension for Transferring Short Secrets.eng.text  14.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Run time Accessible DRAM PUFs in Commodity Devices.eng.text  14.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/CacheBleed A Timing Attack on OpenSSL Constant Time RSA.eng.text  14.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.srt  14.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/YOLO YOSO Fast and Simple Encryption and Secret Sharing in the YOSO Model.eng.srt  14.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.txt  14.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.vtt  14.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.tsv  14.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.vtt  14.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.tsv  14.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.vtt  14.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.tsv  14.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.txt  14.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.tsv  14.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Sieve-in-the-Middle - Improved MITM Attacks.eng.text  14.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.tsv  14.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Integral Cryptanalysis on Full MISTY1.eng.text  14.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/FourQ on FPGA New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Character.eng.text  14.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.tsv  14.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Higher Order Differential Meet in the Middle Preimage Attacks on SHA 1 and BLAKE.eng.text  14.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Secret-Sharing Schemes for General and Uniform Access Structures.eng.text  14.5 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Efficient Key Recovery for all HFE Signature Variants.eng.text  14.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.txt  14.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.lrc  14.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Boosting Verifiable Computation on Encrypted Data.eng.text  14.4 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.lrc  14.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.txt  14.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.lrc  14.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.tsv  14.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.tsv  14.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.lrc  14.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.tsv  14.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Short generators without quantum computers the case of multiquadratics.eng.text  14.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.vtt  14.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/On the Impossibility of Constructing Efficient Key Encap.eng.text  14.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.lrc  14.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox.eng.text  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Another Application of Cryptocurrencies.eng.srt  14.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/On Virtual Grey Box Obfuscation for General Circuits.eng.text  14.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.srt  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Efficient Circuit-Based PSI with Linear Communication.eng.text  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Anonymous Traitor Tracing - How to Embed Arbitrary Information in a Key.eng.text  14.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.tsv  14.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.lrc  14.3 KB
 
                
                    - Theoretical Cryptography Conference (TCC)/TCC 2021/TCC 2021 captions/Simple Constructions from (Almost) Regular One-Way Functions.eng.text  14.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Security for OCB3.eng.text  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.eng.text  14.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.lrc  14.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.eng.text  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Essentially Optimal Robust Secret Sharing with Maximal Corruptions.eng.text  14.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Classical Cryptographic Protocols in a Quantum World.eng.text  14.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy.eng.text  14.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/The Price of Active Security in Cryptographic Protocols.eng.text  14.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.tsv  14.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Cryptanalyses on a Merkle-Damgå - rd Based MAC - Almo.eng.text  14.2 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.eng.text  14.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.srt  14.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.eng.text  14.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.vtt  14.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.srt  14.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Practical Multilinear Maps over the Integers.eng.text  14.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering.eng.text  14.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct.eng.text  14.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.srt  14.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.srt  14.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Resource-Restricted Cryptography Revisiting MPC Bounds in the Proof-of-Work Era.eng.text  14.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.tsv  14.2 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.tsv  14.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.eng.text  14.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.tsv  14.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Secure Signatures and Chosen Ciphertext Security in a Qu.eng.text  14.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/On QA-NIZK in the BPK Model.eng.text  14.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.vtt  14.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.tsv  14.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.eng.text  14.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Optimal Non-perfect Uniform Secret Sharing Schemes.eng.text  14.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.vtt  14.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.tsv  14.1 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/New and Improved Key-Homomorphic Pseudorandom Functions.eng.text  14.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Explicit Non malleable Codes against Bit wise Tampering adn Permutations.eng.text  14.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.srt  14.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.txt  14.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.srt  14.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.vtt  14.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.vtt  14.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.tsv  14.0 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.vtt  14.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.vtt  14.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.tsv  13.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Generic Side-Channel Distinguishers - Improvements and Limitations (Crypto 2011).eng.text  13.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Modeling for Three-Subset Division Property without Unknown Subset - Improved Cube Attacks aga.eng.text  13.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.tsv  13.9 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.tsv  13.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.eng.text  13.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.tsv  13.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.txt  13.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Adaptively Secure ABE for DFA from k-Lin and More.eng.text  13.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Securing Approximate Homomorphic Encryption using Differential Privacy.eng.srt  13.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.vtt  13.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/More Constructions of Lossy and Correlation-Secure Trapdoor Functions.eng.text  13.9 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Parallel Hashing via List Recoverability.eng.text  13.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.txt  13.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.lrc  13.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.eng.text  13.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.txt  13.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.tsv  13.8 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Sumcheck Arguments and their Applications.eng.text  13.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.tsv  13.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Indistinguishability Obfuscation and UCEs - The Case of Computationally Unpredictable Sources.eng.text  13.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Pairing Based Shuffle Argument.eng.text  13.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.lrc  13.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.tsv  13.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Programmable Hash Functions from Lattices.eng.text  13.8 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/A Uniform Min-Max Theorem with Applications in Cryptography.eng.text  13.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Zero-Knowledge Arguments for Lattice-Based Accumulators.eng.text  13.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.lrc  13.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Secure Identity-Based Encryption in the Quantum Random O.eng.text  13.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.tsv  13.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.srt  13.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.vtt  13.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.lrc  13.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Masking Tables - An Underestimated Security Risk.eng.text  13.7 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.tsv  13.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.vtt  13.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.json  13.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2017/Eurocrypt 2017 captions/Ad Hoc PSM Protocols Secure Computation without Coordination.eng.text  13.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Dishonest Majority Multi-Party Computation for Binary Circuits.eng.text  13.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Triangulating Rebound Attack on AES like Hashing.eng.text  13.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.tsv  13.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Perfectly-Secure Multiplication for any t - n 3 (Crypto 2011).eng.text  13.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Cryptanalysis of the Co ACD Assumption.eng.text  13.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.tsv  13.6 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Non-malleable Codes from Two-Source Extractors.eng.text  13.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Adaptively Secure Identity-Based Encryption from Lattices with.eng.text  13.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.vtt  13.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.srt  13.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Public-Key Puncturable Encryption Modular and Compact Constructions.eng.text  13.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.txt  13.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.txt  13.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Zero Knowledge Proofs of Non Algebraic Statements with Sublinear Amortized Cost.eng.text  13.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.srt  13.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.srt  13.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Reducing the Number of Non linear Multiplications in Masking Schemes.eng.text  13.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.tsv  13.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Hardness of k-LWE and Applications in Traitor Tracing.eng.text  13.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.tsv  13.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.tsv  13.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Fully Homomorphic Encryption over the Integers with Shorter Public Keys.eng.text  13.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Reflection Cryptanalysis of PRINCE-Like Ciphers.eng.text  13.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.vtt  13.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Forking Tweakable Even-Mansour Ciphers.eng.srt  13.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Verifiable Inner Product Encryption Scheme.eng.text  13.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lower Bounds for Leakage-Resilient Secret Sharing.eng.text  13.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.txt  13.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Towards Understanding the Known-Key Security of Block Ciphers.eng.text  13.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.lrc  13.5 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Cryptanalysis of PrintCIPHER.eng.text  13.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Higher-Order Side Channel Security and Mask Refreshing.eng.text  13.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.lrc  13.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.tsv  13.4 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.srt  13.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.vtt  13.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Triply Adaptive UC NIZK.eng.srt  13.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.txt  13.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.tsv  13.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.tsv  13.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Rotational Cryptanalysis of Round-Reduced Keccak.eng.text  13.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.eng.text  13.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths.eng.text  13.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.tsv  13.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Hardness of Computing Individual Bits for One-Way Functi.eng.text  13.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.lrc  13.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.tsv  13.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Implementing Grover oracles for quantum key search on AES and LowMC.eng.text  13.3 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Fault Attacks Made Easy - Differential Fault Analysis Automation on Assembly Code.eng.text  13.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Efficient Arithmetic on Hessian Curves.eng.text  13.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.vtt  13.3 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Snarky Signatures - Minimal Signatures of Knowledge from Simulation Extractable SNARKs.eng.text  13.3 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem.eng.text  13.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.txt  13.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.lrc  13.3 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.eng.text  13.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.vtt  13.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.eng.text  13.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Observations on the SIMON Block Cipher Family.eng.text  13.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Memory Delegation (Crypto 2011).eng.text  13.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Structural Lattice Reduction - Generalized Worst-Case to Average-case Reductions and.eng.text  13.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices KEMs and Signatures of Small.eng.text  13.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-1 CHES 2021 Opening Remarks.eng.srt  13.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.tsv  13.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.tsv  13.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Tweakable Blockciphers with Asymptotically Optimal Security.eng.text  13.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.vtt  13.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Efficient Constant Round Multi Party Computation Combining BMR and SPDZ.eng.text  13.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.vtt  13.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.lrc  13.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.vtt  13.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.txt  13.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.eng.text  13.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.txt  13.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Full Plain'text Recovery Attack on Broadcast RC4.eng.text  13.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/New Techniques for SPHFs and Efficient One-Round PAKE Pr.eng.text  13.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong 8 bit Sboxes with Efficient Masking in Hardware.eng.text  13.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Blockcipher based MACs Beyond the Birthday Bound without Message Length.eng.text  13.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.srt  13.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Usefulness of Sparsifiable Inputs How to Avoid Subexponential iO.eng.text  13.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Levchin Prize - Award ceremony.eng.text  13.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Extended Tower Number Field Sieve - A New Complexity for the Medium Prime Case.eng.text  13.1 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/1 p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds (Crypto 2011).eng.text  13.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.vtt  13.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.vtt  13.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.txt  13.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.vtt  13.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tweakable Blockciphers with Beyond Birthday-Bound Security.eng.text  13.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Public Keys.eng.text  13.0 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.tsv  13.0 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.eng.text  13.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.tsv  13.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.lrc  13.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.tsv  13.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.lrc  13.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.tsv  13.0 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tightly Secure Signatures and Public-Key Encryption.eng.text  13.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Merkle Puzzles in a Quantum World.eng.text  12.9 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.vtt  12.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.vtt  12.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography.eng.text  12.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.lrc  12.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Security Analysis of PRINCE.eng.text  12.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/OPAQUE - An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.eng.text  12.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.tsv  12.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.txt  12.9 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Searchable Encryption with Optimal Locality Achieving Sublogarithmic Read Efficiency.eng.text  12.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.tsv  12.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Catching the Fastest Boomerangs Application to SKINNY.eng.text  12.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.srt  12.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.txt  12.8 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.tsv  12.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.lrc  12.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.tsv  12.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.txt  12.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.txt  12.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Pseudorandom Functions and Lattices.eng.text  12.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Size-Hiding Computation for Multiple Parties.eng.text  12.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.eng.text  12.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.lrc  12.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Improved High Order Conversion From Boolean to Arithmetic Masking.eng.text  12.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Security Analysis of Multilinear Maps over the Integers.eng.text  12.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.srt  12.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/A New Approach to Practical Active-Secure Two-Party Comp.eng.text  12.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/The Randomized Slicer for CVPP Sharper, Faster, Smaller, Batchier.eng.text  12.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.tsv  12.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.tsv  12.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Correlated Pseudorandomness from Expand-Accumulate Codes.eng.srt  12.6 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.tsv  12.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.tsv  12.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.lrc  12.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.lrc  12.6 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Constant Round MPC with Fairness and Guarantee of Output Delivery.eng.text  12.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.tsv  12.6 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.vtt  12.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/An Enciphering Scheme Based on a Card Shuffle.eng.text  12.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.vtt  12.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.vtt  12.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Homomorphic Encryption for Arithmetic of Approximate Numbers.eng.text  12.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.vtt  12.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/New negative results on differing-inputs obfuscation.eng.text  12.5 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Fast Cut-and-Choose Based Protocols for Malicious and Co.eng.text  12.5 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Confidential Signatures and Deterministic Signcryption.eng.text  12.5 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.txt  12.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.tsv  12.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.vtt  12.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.tsv  12.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.srt  12.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/An Existential Unforgeable Signature Scheme based on Multivariate Quadratic Equations.eng.text  12.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.eng.text  12.4 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Cryptography with Auxiliary Input and Trapdoor from Constant Noise LPN.eng.text  12.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Prime and Prejudice Primality Testing Under Adversarial Conditions.eng.srt  12.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Fine-tuning the ISO IEC Standard LightMAC.eng.text  12.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Memory-Tight Reductions for Practical Key Encapsulation Mechanisms.eng.text  12.4 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On Fair Exchange, Fair Coins and Fair Sampling.eng.text  12.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Horizontal Side Channel Attacks and Countermeasures on the ISW Masking Scheme.eng.text  12.4 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.lrc  12.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The Collision Security of Tandem-DM in the Ideal Cipher Model.eng.text  12.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.vtt  12.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/A faulty PRNG in a voting system - Kristian Gjosteen.eng.text  12.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.tsv  12.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Accelerating the Search of Differential and Linear Characteristics with the SAT Method.eng.text  12.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2016/Eurocrypt 2016 captions/Online Offline OR Composition of Sigma Protocols.eng.text  12.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Empowering Protocols Secure reporting of serial perpetrators of sexual assault.eng.srt  12.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Physically Uncloneable Functions in the Universal Composition Framework.eng.text  12.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Coded BKW with Sieving.eng.text  12.2 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Impossibility Results for Concurrent Composition and.eng.text  12.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices.eng.text  12.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Correlated Extra Reductions Defeat Blinded Regular Exponentiation.eng.text  12.2 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Bit Commitment schemes with Non Signaling Adversaries.eng.text  12.2 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.tsv  12.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.tsv  12.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/What does the SHARK say.eng.srt  12.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Efficient Redactable Signature and Application to Anonymous Credentials.eng.text  12.1 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Programmable Hash Functions in the Multilinear Setting.eng.text  12.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Applying MILP Method to Searching Integral Distinguishers Based on Division Property for.eng.text  12.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Security of Encryption Schemes in Weakened Random Oracle Models.eng.text  12.1 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/A Classification of Computational Assumptions in the Algebraic Group Model.eng.text  12.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Supersingular isogeny based cryptography gets practical - Patrick Longa (Microsoft R.).eng.text  12.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2022/PKC 2022 captions/Test of Time Award Ceremony.eng.srt  12.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/An Efficient and Generic Construction for Signal's Handshake (X3DH) Post-Quantum, State Leakag.eng.text  12.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.eng.text  12.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Block Ciphers - Focus on the Linear Layer (feat. PRIDE).eng.text  12.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Linearly-Homomorphic Signatures and Scalable Mix-Nets.eng.text  12.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.eng.text  12.0 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/The Summation-Truncation Hybrid Reusing Discarded Bits for Free.eng.text  12.0 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Accuracy-Privacy Tradeoffs for Two-Party Differentially.eng.text  12.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Obfuscation Using Tensor Products.eng.srt  12.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2012/Eurocrypt 2012 captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product.eng.text  12.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Adaptive Oblivious Transfer and Generalization.eng.text  12.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.eng.text  11.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.vtt  11.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Masking AES with d1 Shares in Hardware.eng.text  11.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Limits of Provable Security for Homomorphic Encryption.eng.text  11.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/He Gives C Sieves on the CSIDH.eng.srt  11.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.tsv  11.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Non-interactive Mimblewimble transactions, revisited.eng.srt  11.9 KB
 
                
                    - Workshops/CFAIL 2021/CFAIL 2021 captions/Session 3 Talk #1 A comparative study of Vision and SES in the FHE Setting.eng.srt  11.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/MuSig-L Lattice-Based Multi-Signature With Single-Round Online Phase.eng.srt  11.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to.eng.text  11.9 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2021/PKC 2021 captions/More Efficient Digital Signatures with Tight Multi-User Security.eng.srt  11.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.vtt  11.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.txt  11.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.vtt  11.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.tsv  11.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.txt  11.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/MPSign A Signature from Small-Secret Middle-Product Learning with Errors.eng.text  11.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.txt  11.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.eng.text  11.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Generic Framework for Key-Guessing Improvements.eng.text  11.8 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/The PHOTON Family of Lightweight Hash Functions (Crypto 2011).eng.text  11.8 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography with Streaming Algorithms.eng.text  11.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Blackbox Secret Sharing Revisited A Coding-Theoretic Approach with Application to Expansionles.eng.text  11.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Tamper and Leakage Resilience in the Split-State Model.eng.text  11.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.tsv  11.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Tight Security Bounds for Double-block Hash-then-Sum MACs.eng.text  11.7 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange.eng.text  11.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.lrc  11.7 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Cryptography from Compression Functions - The UCE Bridge to the ROM.eng.text  11.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.srt  11.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats.eng.text  11.7 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.lrc  11.7 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/On the Achievability of Simulation-Based Security for Fu.eng.text  11.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.tsv  11.7 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.tsv  11.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.txt  11.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds Trading NIZKs with.eng.srt  11.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.srt  11.5 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Resistance against Iterated Attacks by Decorrelation Rev.eng.text  11.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.lrc  11.5 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/EnCounter On Breaking the Nonce Barrier in Differential Fault Analysis with a Case Study on PAEQ.eng.text  11.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.vtt  11.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.lrc  11.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Authenticated garbling from simple correlations.eng.srt  11.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.srt  11.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Dynamic Local Searchable Symmetric Encryption.eng.srt  11.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.tsv  11.4 KB
 
                
                    - Crypto/Crypto 2021/Crypto 2021 captions/Limits on the Adaptive Security of Yao’s Garbling.eng.srt  11.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.srt  11.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.json  11.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Preventing CLT Attacks on Obfuscation with Linear Overhead.eng.text  11.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/f time and best paper awards.eng.srt  11.3 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Analyzing Blockwise Lattice Algorithms using Dynamical Systems.eng.text  11.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.tsv  11.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Lattice-Based SNARKs Publicly Verifiable, Preprocessing, and Recursively Composable.eng.srt  11.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/Lower Bounds on Lattice Enumeration with Extreme Pruning.eng.text  11.3 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Concurrent Non Malleable Commitments and More in 3 Rounds.eng.text  11.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.txt  11.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Account Management and Stake Pools in Proof of Stake Ledgers.eng.srt  11.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/An analysis of the NIST SP 800-90A DRBGs - Joanne Woodage (Royal Holloway).eng.text  11.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.tsv  11.2 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Universally Composable End-to-End Secure Messaging 2-2.eng.srt  11.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2023/Asiacrypt 2023 captions/Functional Encryption 1 - talk 3 4.eng.text  11.2 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.json  11.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.tsv  11.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Welcome - RWC steering committee.eng.text  11.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.lrc  11.1 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.tsv  11.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.tsv  11.1 KB
 
                
                    - Crypto/Crypto 2024/Crypto 2024 captions/Opening remarks.eng.srt  11.1 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.tsv  11.1 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Breaking and Repairing GCM Security Proofs.eng.text  11.1 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.srt  11.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Efficient Constructions for Almost-everywhere Secure Computation.eng.text  11.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.txt  11.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/PAKEs New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan.eng.text  11.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A Modular Approach to the Security Analysis of Two-Permutation Constructions.eng.srt  10.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.json  10.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2023/Real World Crypto 2023 captions/RWC 2023 Closing Remarks.eng.srt  10.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.eng.text  10.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Moz$ mathbb{Z} {2k}$zarella Efficient Vector-OLE and Zero-Knowledge Proofs Over $ mathbb{Z} {.eng.srt  10.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Decoding distortions using frequency analysis.eng.srt  10.9 KB
 
                
                    - Crypto/Crypto 2013/Crypto 2013 captions/Real Time Cryptanalysis of Bluetooth Encryption with Con.eng.text  10.9 KB
 
                
                    - Crypto/Crypto 2017/Crypto 2017 captions/Middle Product Learning With Errors.eng.text  10.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.eng.text  10.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.lrc  10.8 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/ParTI - Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks.eng.srt  10.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.vtt  10.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Winkle Protecting Proof of Stake Blockchains From Long Range Attacks.eng.srt  10.8 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.eng.text  10.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/New Key Recovery Attacks on Minimal Two Round Even Mansour Ciphers.eng.text  10.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.vtt  10.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/How to Mimic Nakamoto's Design via Proof of stake and more.eng.srt  10.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Cryptographic Primitives with Hinting Property.eng.srt  10.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.txt  10.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.txt  10.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.vtt  10.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2.eng.text  10.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Universally Composable End-to-End Secure Messaging 1-2.eng.srt  10.6 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Practical CCA2 Secure and Masked Ring LWE Implementation.eng.text  10.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Differential Cryptanalysis in the Fixed-Key Model.eng.srt  10.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting -.eng.text  10.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/PLCrypto A Symmetric Cryptographic Library for Programmable Logic Controllers.eng.text  10.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.vtt  10.5 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Updates on Generic Attacks against HMAC and NMAC.eng.text  10.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Simplified MITM Modeling for Permutations New (Quantum) Attacks.eng.srt  10.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Beyond the Csiszár-Korner Bound Best-Possible Wiretap Coding via Obfuscation.eng.srt  10.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.lrc  10.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/SwiftEC Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves.eng.srt  10.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.eng.text  10.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/State Machine Replication under Changing Network Conditions.eng.srt  10.4 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2020/PKC 2020 captions/Fast, Compact, and Expressive Attribute-Based Encryption.eng.text  10.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.lrc  10.4 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.eng.text  10.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.vtt  10.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Threshold Signatures with Private Accountability.eng.srt  10.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Secure MPC Laziness Leads to GOD.eng.srt  10.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Efficient Side Channel Protections of ARX Ciphers.eng.text  10.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.tsv  10.3 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.tsv  10.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.eng.text  10.3 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/Opening remarks at TASER 2021, by Dan Page, Bristol University.eng.srt  10.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/A New Approach to Efficient Non-Malleable Zero-Knowledge.eng.srt  10.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Random Sources in Private Computation.eng.srt  10.3 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices.eng.text  10.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via.eng.srt  10.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.srt  10.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/EvalRound Algorithm in CKKS Bootstrapping.eng.srt  10.2 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials.eng.text  10.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.srt  10.1 KB
 
                
                    - Crypto/Crypto 2016/Crypto 2016 captions/Design in Type I, Run in Type III - Fast and Scalable Bilinear Type Conversion using Integer Programm.eng.text  10.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/NIST Update.eng.srt  10.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Opening remarks at Asiacrypt 2017.eng.text  10.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.eng.text  10.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Batch Arguments for NP and More from Standard Bilinear Group Assumptions.eng.srt  10.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.tsv  10.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.txt  10.0 KB
 
                
                    - Crypto/Crypto 2011/Crypto 2011 captions/Random Oracle Reducibility (Crypto 2011).eng.text  10.0 KB
 
                
                    - Crypto/Crypto 2014/Crypto 2014 captions/Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.eng.text  10.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2019/Eurocrypt 2019 captions/Welcome to Eurocrypt 2019, Marc Fischlin.eng.srt  10.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.srt  10.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Laconic Function Evaluation.eng.srt  10.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.tsv  10.0 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Strong Machine Learning Attack against PUFs with No Mathematical Model.eng.text  9.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.lrc  9.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Short Leakage Resilient and Non-malleable Secret Sharing Schemes.eng.srt  9.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Shorter Hash-and-Sign Lattice-Based Signatures.eng.srt  9.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.srt  9.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Gossiping for Communication-Efficient Broadcast.eng.srt  9.8 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/Closing remarks at CHES 2018.eng.srt  9.8 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Synesthesia.eng.srt  9.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Attaining GOD Beyond Honest Majority With Friends and Foes.eng.srt  9.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Asymmetric distributed trust.eng.srt  9.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Breaking Rainbow Takes a Weekend on a Laptop.eng.srt  9.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security.eng.srt  9.7 KB
 
                
                    - Crypto/Crypto 2022 Live/Crypto 2022 Live captions/Opening Remarks at Crypto 2022.eng.srt  9.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Encryption to the Future A Paradigm for Sending Secret Messages to Future (Anonymous) Committee.eng.srt  9.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Lower Bound on SNARGs in the Random Oracle Model.eng.srt  9.7 KB
 
                
                    - Crypto/Crypto 2015/Crypto 2015 captions/Capacity and Data Complexity in Multidimensional Linear Attack.eng.text  9.7 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Multiparty Computation from Somewhat Homomorphic Encryption.eng.text  9.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Nova Recursive Zero-Knowledge Arguments from Folding Schemes.eng.srt  9.6 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Let A Non Barking Watchdog Bite Cliptographic Signatures With An Offline Watchdog.eng.srt  9.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Programmable Distributed Point Functions.eng.srt  9.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.eng.srt  9.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring QR-UOV.eng.text  9.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.eng.srt  9.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Tight Preimage Resistance of the Sponge Construction.eng.srt  9.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Time-Space Tradeoffs for Sponge Hashing Attacks and Limitations for Short Collisions.eng.srt  9.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/On the Quantum Complexity of the Continuous Hidden Subgroup Problem.eng.text  9.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2020/Eurocrypt 2020 captions/Double-Base Chains for Scalar Multiplications on Elliptic Curves.eng.text  9.5 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2019/FSE 2019 captions/Separable Statistics and Multidimensional Linear Cryptanalysis.eng.text  9.4 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2018/CHES 2018 captions/High Order Masking of Look up Tables with Common Shares.eng.text  9.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.txt  9.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.txt  9.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Setup Free SNARKs from Hidden Order Groups.eng.srt  9.3 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2010/PKC 2010 captions/Solving a 676-Bit Discrete Logarithm Problem in GF(36n).eng.text  9.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.vtt  9.3 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan.eng.srt  9.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Non-Interactive Secure Computation of Inner-Product from LPN and LWE.eng.srt  9.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.lrc  9.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.lrc  9.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Implicit White-Box Implementations White-Boxing ARX Ciphers.eng.srt  9.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/48ce563f89a0ed9414f5aa28ad0d96d6795f9c62.eng.srt  9.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Security of Truncated Permutation Without Initial Value.eng.srt  9.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Concurrently Composable Non-Interactive Secure Computation.eng.srt  9.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.vtt  9.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.vtt  9.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Oblivious Message Retrieval.eng.srt  9.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.srt  9.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.tsv  9.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-1 Opening Remarks.eng.srt  9.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.eng.srt  9.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.vtt  8.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/On the Impossibility of Key Agreements from Quantum Random Oracles.eng.srt  8.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/SIDH Proof of Knowledge.eng.srt  8.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.eng.text  8.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/On the Insider Security of MLS.eng.srt  8.9 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2016/CHES 2016 captions/Faster Evaluation of SBoxes via Common Shares.eng.text  8.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.tsv  8.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Efficient Adaptively-Secure Byzantine Agreement for Long Messages.eng.srt  8.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/SNACKs Leveraging Proofs of Sequential Work for Blockchain Light Clients.eng.srt  8.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/A More Complete Analysis of the Signal Double Ratchet Algorithm.eng.srt  8.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Linear-map Vector Commitments and their Practical Applications.eng.srt  8.8 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/Improved Preimage Attacks on 3-Round Keccak-224 256.eng.text  8.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.txt  8.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Knowledge Encryption and Its Applications to Simulatable Protocols With Low Round-Complexity.eng.srt  8.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Key-schedule Security for the TLS 1.3 Standard.eng.srt  8.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Superposition Meet-in-the-Middle Attacks Updates on Fundamental Security of AES-like Ciphers.eng.srt  8.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/New Preimage Attacks against Reduced SHA-1.eng.text  8.8 KB
 
                
                    - Crypto/Crypto 2023/Crypto 2023 captions/Crypto 2023 opening remarks.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.lrc  8.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Le Mans Dynamic and Fluid MPC for Dishonest Majority.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/log∗-Round Game-Theoretically-Fair Leader Election.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Microsoft's ElectionGuard.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Multi-Input Attribute Based Encryption and Predicate Encryption.eng.srt  8.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.eng.srt  8.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Puncturable Key Wrapping and Its Applications.eng.srt  8.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/The problem of private identification protocols - Ruxandra F. Olimid (NTNU).eng.text  8.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Short-lived zero-knowledge proofs and signatures.eng.srt  8.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.srt  8.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Jammin' on the deck.eng.srt  8.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Continuously Non-Malleable Codes against Bounded-Depth Tampering.eng.srt  8.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.tsv  8.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Opening and Borg Early Career Award (BECA) for Nadia Heninger.eng.srt  8.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Ofelimos Combinatorial Optimization via Proof-of-Useful-Work.eng.srt  8.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Succinct Interactive Oracle Proofs Applications and Limitations.eng.srt  8.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/nuFHE reaching 0 13ms gate for fully homomorphic encryption with Python.eng.srt  8.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Block-Cipher-Based Tree Hashing.eng.srt  8.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/FINAL Faster FHE instantiated with NTRU and LWE.eng.srt  8.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.tsv  8.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Privacy-Preserving Authenticated Key Exchange in the Standard Model.eng.srt  8.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.vtt  8.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/In memory attacks at crypto currency wallets.eng.srt  8.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The 2011 IACR Fellowship Induction Ceremony.eng.text  8.4 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DARPA Cryptographic Research.eng.srt  8.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.srt  8.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.txt  8.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.eng.srt  8.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.eng.srt  8.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.txt  8.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.txt  8.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.srt  8.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.tsv  8.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.lrc  8.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.txt  8.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.srt  8.3 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.lrc  8.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.lrc  8.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Full Quantum Equivalence of Group Action DLog and CDH, and More.eng.srt  8.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.eng.srt  8.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.lrc  8.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.eng.srt  8.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Failing gracefully Decryption failures and the Fujisaki-Okamoto transform.eng.srt  8.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Succinct Classical Verification of Quantum Computation.eng.srt  8.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/PI-Cut-Choo and Friends Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.eng.srt  8.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Authenticated Encryption with Key Identification.eng.srt  8.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.eng.srt  8.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.txt  8.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.tsv  8.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/On the Feasibility of Unclonable Encryption and, More.eng.srt  8.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Password-Authenticated Key Exchange from Group Actions.eng.srt  8.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Time-Space Lower Bounds for Finding Collisions in Merkle-Damgard Hash Functions.eng.srt  8.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Algebraic Meet-in-the-Middle Attack on LowMC.eng.srt  8.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.eng.srt  8.0 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.vtt  8.0 KB
 
                
                    - Public Key Cryptography (PKC)/PKC 2023/PKC 2023 captions/Opening Remarks.eng.srt  8.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Stand up Crypto Comedy.eng.srt  8.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.lrc  8.0 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.eng.srt  7.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.vtt  7.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Unconditionally Secure NIZK in the Fine-Grained Setting.eng.srt  7.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.txt  7.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Key Words.eng.srt  7.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.vtt  7.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Counting Vampires From Univariate Sumcheck to Updatable ZK-SNARK.eng.srt  7.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW.eng.srt  7.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt.eng.srt  7.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.lrc  7.8 KB
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.json  7.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Some Easy Instances of Ideal-SVP and Implications to the Partial Vandermonde Knapsack Problem.eng.srt  7.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.eng.srt  7.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.tsv  7.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.txt  7.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Multi-Client Functional Encryption with Fine-Grained Access Control.eng.srt  7.7 KB
 
                
                    - Crypto/Crypto 2020/Crypto 2020 captions/Slide Reduction, Revisited-Filling the Gaps in SVP Approximation.eng.srt  7.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Robust Property Preserving Hashes.eng.srt  7.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/On Codes and Learning with Errors over Function Fields.eng.srt  7.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.srt  7.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Efficient NIZKs from LWE via Polynomial Reconstruction and MPC in the Head''.eng.srt  7.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.vtt  7.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Cryptography from Pseudorandom Quantum States.eng.srt  7.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agree.eng.srt  7.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.txt  7.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.lrc  7.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Provably Secure Reflection Ciphers.eng.srt  7.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Better than Advertised Security for Non-Interactive Threshold Signatures.eng.srt  7.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Certified Everlasting Zero-Knowledge Proof for QMA.eng.srt  7.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.lrc  7.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.tsv  7.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.srt  7.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.srt  7.5 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Parallel Repetition of $(k 1, dots,k { mu})$-Special-Sound Multi-Round Interactive Proofs.eng.srt  7.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.vtt  7.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.txt  7.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/The CERES Project Campaign to Enhance Research Experience.eng.srt  7.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.eng.srt  7.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.txt  7.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/P2P social networks - why and how viable.eng.srt  7.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resist.eng.srt  7.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/RISC V Foundation Security Standing Committee Call to action.eng.srt  7.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.eng.srt  7.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.lrc  7.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Welcome to Asiacrypt.eng.text  7.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/The Abe-Okamoto Partially Blind Signature Scheme Revisited.eng.srt  7.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.srt  7.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.eng.srt  7.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.lrc  7.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.tsv  7.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.srt  7.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Memory-Tight Multi-Challenge Security of Public-Key Encryption.eng.srt  7.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.eng.srt  7.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Recovering the tight security proof of SPHINCS.eng.srt  7.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Anonymous Public Key Encryption under Corruptions.eng.srt  7.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/General Properties of Quantum Bit Commitments (Extended Abstract).eng.srt  7.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.srt  7.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.txt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Rotatable Zero Knowledge Sets Post Compromise Secure Auditable Dictionaries with application t.eng.srt  7.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Program Chair's Report by Jonathan Katz.eng.text  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Agg.eng.srt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A Universally Composable Non-Interactive Aggregate Cash System.eng.srt  7.2 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Nearly Optimal Property Preserving Hashing.eng.srt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Nostradamus goes Quantum.eng.srt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Horizontal racewalking using radical isogenies.eng.srt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/DAG-$ Sigma$ A DAG-based Sigma Protocol for Relations in CNF.eng.srt  7.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/New Algorithms and Analyses for Sum-Preserving Encryption.eng.srt  7.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Large-Precision Homomorphic Sign Evaluation using FHEW TFHE Bootstrapping.eng.srt  7.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.lrc  7.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.srt  7.1 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.eng.srt  7.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Stretching Cube Attacks Improved Methods to Recover Massive Superpolies.eng.srt  7.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Enhancing Differential-Neural Cryptanalysis.eng.srt  7.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.vtt  7.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.txt  7.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.srt  7.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.txt  7.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.vtt  7.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.txt  7.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.lrc  7.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.vtt  7.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.srt  6.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.tsv  6.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.tsv  6.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Universal Ring Signatures in the Standard Model.eng.srt  6.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM.eng.srt  6.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers.eng.srt  6.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.lrc  6.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Overloading the Nonce Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.eng.srt  6.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/The Collector - Gigabit True Random Number Generator Using Image Sensor Noise.eng.srt  6.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.srt  6.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.lrc  6.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.tsv  6.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Surveillance from Brussels Privacy at UCSB CAM for fun.eng.srt  6.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.txt  6.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.txt  6.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Improving Support-Minors rank attacks applications to GeMSS and Rainbow.eng.srt  6.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.txt  6.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Simon's Algorithm and Symmetric Crypto Generalizations and Automatized Applications.eng.srt  6.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.srt  6.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.srt  6.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Small-Box Cryptography, and the Provable Security of SPNs.eng.text  6.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.vtt  6.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.lrc  6.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.lrc  6.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.lrc  6.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Classically Verifiable NIZK for QMA with Preprocessing.eng.srt  6.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Real world zkSNARKs updates on Zcash, libsnark.eng.text  6.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.vtt  6.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Syndrome Decoding in the Head Shorter Signatures from Zero-Knowledge Proofs.eng.srt  6.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.tsv  6.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection.eng.srt  6.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Statistically Sender-Private OT From LPN and Derandomization.eng.srt  6.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.vtt  6.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.vtt  6.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Blockchains and consensus protocols Snake oil warning.eng.text  6.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.tsv  6.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.txt  6.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks.eng.srt  6.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Practical Provably Secure Flooding for Blockchains.eng.srt  6.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.txt  6.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.tsv  6.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.lrc  6.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.vtt  6.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Random Oracles in the Real World.eng.text  6.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.srt  6.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.lrc  6.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences.eng.srt  6.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.srt  6.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.srt  6.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A New Isogeny Representation and Applications to Cryptography.eng.srt  6.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.vtt  6.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.srt  6.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.tsv  6.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.srt  6.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.txt  6.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.vtt  6.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2022/FSE 2022 captions/(Quantum) Collision Attacks on Reduced Simpira v2.eng.text  6.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.tsv  6.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/OPA.eng.srt  6.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.txt  6.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.vtt  6.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.tsv  6.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.lrc  6.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.eng.srt  6.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.tsv  6.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.lrc  6.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Accelerating the Delfs-Galbraith algorithm with fast subfield root detection.eng.srt  6.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.srt  6.2 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Sustained Space and Cumulative Complexity Trade-offs for Data-Dependent Memory-Hard Functions.eng.srt  6.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.vtt  6.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.srt  6.2 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Quantum Commitments and Signatures without One-Way Functions.eng.srt  6.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.txt  6.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Collusion Preserving Computation without a Mediator.eng.srt  6.1 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Zero Knowledge Standardization.eng.srt  6.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/On the Field-Based Division Property Applications to MiMC, Feistel MiMC and GMiMC.eng.srt  6.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/You are strong, FALCON, but we will break you.eng.srt  6.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.srt  6.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Forty years and still running.eng.text  6.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.srt  6.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.txt  6.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.lrc  6.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Trivial Real World Crypto.eng.srt  6.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.tsv  6.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.txt  6.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.lrc  6.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Synchronous Consensus with Optimal Asynchronous Fallback The Crypto Chickens Go to the Beach.eng.srt  6.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.txt  6.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/Asiacrypt 2021 closing remarks.eng.srt  6.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.vtt  6.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.lrc  5.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/RSA Encraption.eng.srt  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.tsv  5.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.txt  5.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.vtt  5.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.srt  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.srt  5.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2021/Asiacrypt 2021 captions/session-48 Closing Remarks.eng.srt  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.vtt  5.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.tsv  5.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.txt  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.txt  5.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.lrc  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.srt  5.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.lrc  5.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Implementing Signal.eng.text  5.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.txt  5.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.txt  5.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.srt  5.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.lrc  5.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.lrc  5.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.lrc  5.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.txt  5.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Efficient Searchable Symmetric Encryption for Join Queries.eng.srt  5.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.srt  5.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.tsv  5.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Hawk Module LIP makes Lattice Signatures Fast, Compact and Simple.eng.srt  5.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.lrc  5.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.tsv  5.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.vtt  5.7 KB
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/s-42 CHES 2021 closing remarks.eng.srt  5.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Bodka Not V, But B.eng.srt  5.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.lrc  5.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.vtt  5.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.vtt  5.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.txt  5.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.tsv  5.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Blockchain.eng.srt  5.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/IACR Award Ceremony.eng.text  5.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.srt  5.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.txt  5.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Triangulating Rebound Attack on AES-like Hashing.eng.srt  5.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.srt  5.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Lockable Obfuscation.eng.text  5.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.lrc  5.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.tsv  5.6 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.lrc  5.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.tsv  5.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.vtt  5.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.txt  5.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.srt  5.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.srt  5.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.vtt  5.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Identity-Based Matchmaking Encryption from Standard Assumptions.eng.srt  5.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.vtt  5.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.srt  5.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.srt  5.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.lrc  5.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/The Danish Crypto Choir - Don't Worry, Be Happy.eng.srt  5.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Modern jets, retro ciphers - how monoalphabetic substitution ciphers are still in use - Matthew Smith.eng.text  5.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to (not) share a password.eng.text  5.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.srt  5.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.tsv  5.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.vtt  5.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Computer-Aided Search Heuristic for Blind Revocable Identity Based Encryption Schemes.eng.text  5.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.txt  5.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Optimizing Rectangle Attacks A Unified and Generic Framework for Key Recovery.eng.srt  5.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.vtt  5.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.tsv  5.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/PQCzoo Post Quantum Beasts and Where to Find Them.eng.srt  5.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.vtt  5.3 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Lattice-Based Zero-Knowledge Proofs and Applications Shorter, Simpler, and More General.eng.srt  5.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Multi-User Security of the Sum of Truncated Random Permutations.eng.srt  5.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.lrc  5.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.txt  5.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.vtt  5.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/A Third is All You Need Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent.eng.srt  5.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.txt  5.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.txt  5.3 KB
 
                
                    - Crypto/Crypto 2019/Crypto 2019.m3u  5.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.tsv  5.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.vtt  5.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.srt  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.txt  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.txt  5.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.vtt  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.tsv  5.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.txt  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Illegitimi Non Irritatum (aut Lorem Ipsum Deserti Omnium).eng.text  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.srt  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.tsv  5.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.srt  5.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.vtt  5.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.lrc  5.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.vtt  5.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Exploring SAT for Cryptanalysis (Quantum) Collision Attacks against 6-Round SHA-3.eng.srt  5.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/State-Separating Proofs - A Reduction Methodology for Real-World Protocols.eng.text  5.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.txt  5.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.vtt  5.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Threshold Linearly Homomorphic Encryption on Z 2kZ.eng.srt  5.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.vtt  5.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.tsv  5.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.vtt  5.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.vtt  5.1 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.srt  5.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.lrc  5.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2017 captions/Welcome.eng.text  5.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Consensus in the Asynchronous Hybrid Byzantine Model with Optimal Resilience.eng.text  5.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.tsv  5.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.tsv  5.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/main.css  5.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.txt  4.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.tsv  4.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.srt  4.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.vtt  4.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.tsv  4.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.tsv  4.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.srt  4.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.tsv  4.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.srt  4.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.lrc  4.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Bernstein Bound is Tight.eng.text  4.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Practical Statistically-Sound Proofs of Exponentiation in any Group.eng.srt  4.9 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.srt  4.8 KB
 
                
                    - IACR Crypt thank you.txt  4.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.txt  4.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/On Module Unique-SVP and NTRU.eng.srt  4.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.txt  4.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/How not to pay with Bitcoin.eng.text  4.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Orion Zero Knowledge Proof with Linear Prover Time.eng.srt  4.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Functional Encryption with Secure Key Leasing.eng.srt  4.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/css.css  4.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/NIST announcements PQC, LWC, TDEA, 56A C, and Beacon.eng.text  4.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Revisiting Related-Key Boomerang attacks on AES using computer-aided tool.eng.srt  4.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.lrc  4.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.lrc  4.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.vtt  4.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/A basketful of secret shares.eng.text  4.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.vtt  4.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.txt  4.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/PQC Wiki.eng.srt  4.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.txt  4.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/New Constructions of Collapsing Hashes.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.srt  4.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.srt  4.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.srt  4.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.lrc  4.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.lrc  4.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.srt  4.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Collision-Resistance from Multi-Collision-Resistance.eng.srt  4.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.tsv  4.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Garden-Hose Model.eng.text  4.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/CSIDH - an efficient post-quantum commutative group action.eng.text  4.6 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.tsv  4.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.srt  4.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.txt  4.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.tsv  4.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.srt  4.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.txt  4.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.tsv  4.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.txt  4.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.srt  4.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.tsv  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Pseudorandom Functions and Lattices.eng.text  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.txt  4.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.lrc  4.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.lrc  4.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Flashproofs Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transpa.eng.srt  4.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/DHE and the leading zeros in the premaster secret in TLS 1 1 1 2.eng.text  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.lrc  4.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Self Correcting Random Oracles and Its Cliptographic Applications.eng.text  4.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.vtt  4.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.srt  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Biclique cryptanalysis of the full AES.eng.text  4.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.txt  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.lrc  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.txt  4.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.txt  4.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/May the Fourth Be With You A Microarchitectural Side Channel Attack on Real World Applications of C.eng.text  4.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.lrc  4.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.vtt  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.tsv  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.srt  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.lrc  4.4 KB
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.json  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.vtt  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.lrc  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.txt  4.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.vtt  4.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.tsv  4.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.vtt  4.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.txt  4.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.vtt  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.tsv  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.tsv  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Trapdoors for Lattices - Simpler, Tighter, Faster, Smaller.eng.text  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.vtt  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.vtt  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.srt  4.4 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Cryptanalyzing the Legendre PRF.eng.srt  4.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.lrc  4.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.vtt  4.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.lrc  4.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.txt  4.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.tsv  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.vtt  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.txt  4.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.lrc  4.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.tsv  4.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.txt  4.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.txt  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.txt  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.srt  4.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.vtt  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.lrc  4.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.srt  4.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.vtt  4.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.lrc  4.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.lrc  4.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.srt  4.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.lrc  4.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.srt  4.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.txt  4.2 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/On the Round Complexity of Randomized Byzantine Agreement.eng.srt  4.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.vtt  4.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Opening remarks.eng.srt  4.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.srt  4.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.txt  4.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.vtt  4.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The Best of Both Worlds - Byzantine Agreement Protocols for (but not limited to) Chickens.eng.text  4.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Robust Coin Flipping.eng.text  4.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.txt  4.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.lrc  4.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.vtt  4.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.lrc  4.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Algebraically Structured LWE, Revisited.eng.text  4.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting Sublogarithmic Proof or Subli.eng.srt  4.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.lrc  4.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.txt  4.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Browser Security with a Grain of Salt.eng.text  4.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.srt  4.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.txt  4.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/The Hunting of the SNARK.eng.text  4.1 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.txt  4.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.tsv  4.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.vtt  4.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.lrc  4.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.lrc  4.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.tsv  4.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.vtt  4.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Tight Security Bounds for OMAC, XCBC and TMAC.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.lrc  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/HBN - An HB-like protocol secure against Man-in-the-Middle attacks.eng.text  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.vtt  4.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.tsv  4.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Blinding ballot copying in Helios - from Condorcet to IACR.eng.text  4.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.vtt  4.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.tsv  4.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.vtt  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.tsv  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.srt  4.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.vtt  4.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.txt  4.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Blockchain and the Identity Problem.eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/New Conference on Information Theoretic Cryptography (ITC).eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.tsv  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.tsv  3.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.tsv  3.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.tsv  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.txt  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.txt  3.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.lrc  3.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.srt  3.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2018/Real World Crypto 2018 captions/Quam Bene Non Quantum - identifying bias in a commercial quantum random number generator.eng.text  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.vtt  3.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Test of Time Award for the best Rump Session Presentation.eng.text  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.srt  3.9 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Augmented Random Oracles.eng.srt  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.lrc  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.lrc  3.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.tsv  3.9 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.tsv  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.tsv  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.txt  3.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Statistical Decoding 2.0 Reducing Decoding to LPN.eng.text  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.tsv  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.srt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.txt  3.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.srt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.vtt  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.vtt  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.srt  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.lrc  3.8 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.vtt  3.8 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.vtt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.txt  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.txt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.srt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.lrc  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.srt  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.tsv  3.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/BLOOM Bimodal Lattice One-Out-of-Many Proofs and Applications.eng.srt  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.txt  3.8 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Practical Sublinear Proofs for R1CS from Lattices.eng.srt  3.8 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.eng.srt  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.tsv  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.lrc  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.txt  3.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.txt  3.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.vtt  3.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.lrc  3.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.lrc  3.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.txt  3.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.vtt  3.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.lrc  3.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.lrc  3.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/To Label, or Not To Label (in Generic Groups).eng.srt  3.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.txt  3.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.srt  3.7 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Constructive Post-Quantum Reductions.eng.srt  3.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.lrc  3.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.tsv  3.7 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.tsv  3.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.srt  3.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.lrc  3.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.vtt  3.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Separable Statistics, New Extension to Linear Cryptanalysis.eng.text  3.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.vtt  3.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.vtt  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.srt  3.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.tsv  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.srt  3.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.vtt  3.6 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Faster Sounder Succinct Arguments and IOPs.eng.srt  3.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/NIST Update.eng.text  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.txt  3.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.vtt  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.txt  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.vtt  3.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.vtt  3.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.srt  3.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.lrc  3.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.tsv  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.srt  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.lrc  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.vtt  3.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.tsv  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.vtt  3.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.txt  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/3rd SKINNY Breaking Competition.eng.text  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Proofs of Work for Blockchain Protocols.eng.text  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.tsv  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Delegatable Anonymous Credentials from Mercurial Signatures.eng.text  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Magallanes.eng.text  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.txt  3.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.lrc  3.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.tsv  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Notes on Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it.eng.text  3.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.srt  3.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.txt  3.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Case-Optimized Hybrid Homomorphic Encryption -Featuring the Elisabeth Stream Cipher-.eng.srt  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Conditional Linear Cryptanalysis.eng.text  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.lrc  3.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.vtt  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.tsv  3.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/GUC-Secure Commitments via Random Oracles New Impossibility and Feasibility.eng.text  3.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.tsv  3.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.vtt  3.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.tsv  3.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.vtt  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.txt  3.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.lrc  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.txt  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes.eng.text  3.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.vtt  3.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.tsv  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.lrc  3.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.vtt  3.4 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Cards Against Cryptography.eng.srt  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.lrc  3.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Extreme Threshold Cryptosystems.eng.text  3.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.tsv  3.4 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Welcome to Crypto 2012.eng.text  3.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Towards Practical Topology-Hiding Computation.eng.text  3.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.tsv  3.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/On Rejection Sampling in Lyubashevsky's Signature Scheme.eng.srt  3.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.vtt  3.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.vtt  3.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Cryptography with Dispensable Backdoors.eng.text  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.tsv  3.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.tsv  3.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.tsv  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.vtt  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Rethinking IDEA.eng.text  3.3 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Latin Dances Reloaded Improved Cryptanalysis against Salsa and ChaCha, and the proposal of For.eng.srt  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.tsv  3.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/The Grand Unified Theory of Cryptology.eng.srt  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/FlipIt and the Cramér-Rao bound.eng.text  3.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Computation with Sublinear Amortized Work.eng.text  3.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.txt  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.srt  3.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.tsv  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A brief chat about approximate GCDs.eng.text  3.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.vtt  3.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.tsv  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.srt  3.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.lrc  3.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.tsv  3.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.tsv  3.2 KB
 
                
                    - RealWorldCrypto logo.jpg  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.srt  3.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length.eng.text  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Non-Malleable Codes in the Split-State Model.eng.text  3.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/NIST Announcements.eng.text  3.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.tsv  3.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.tsv  3.1 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.srt  3.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.tsv  3.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/Bringing Verifiable Delay Functions Into Production.eng.text  3.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.tsv  3.1 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/A new Paradigm Shift for the Crypto BlockChain Proof of Ability.eng.text  3.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/Mind the TWEAKEY Schedule Cryptanalysis on SKINNYe-64-256.eng.text  3.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.txt  3.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Kittens, Models And Thieves.eng.text  3.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The early history of blockchains.eng.text  3.0 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.tsv  3.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.lrc  3.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.tsv  3.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.vtt  3.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.txt  3.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.vtt  2.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.txt  2.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.lrc  2.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.txt  2.9 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/On parameter choices of Round5.eng.srt  2.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.lrc  2.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.srt  2.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.lrc  2.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.tsv  2.9 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.vtt  2.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Secure Verification of Delegated Presentation Delivery.eng.text  2.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An historical call for papers.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.vtt  2.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.txt  2.8 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Towards a general classification framework for cryptocurrency.eng.text  2.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/How to synchronize efficiently.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Report from ECC 2017.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Observations on H-PRESENT-128.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Remotegrity.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.lrc  2.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Workshops @ Crypto 2018.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Constrain't Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.json  2.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Implementing Provably Secure Detection of Direct Injection Attacks.eng.text  2.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/PRG.eng.text  2.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.tsv  2.8 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/decodingchallenge org.eng.srt  2.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/The ZUC-256 Stream Cipher.eng.text  2.7 KB
 
                
                    - Asiacrypt/Asiacrypt 2022/Asiacrypt 2022 captions/An Analysis of the Algebraic Group Model.eng.srt  2.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/From Single Key to Collusion Resistant Secret Key Functional Encryption by Leveraging Succinctness.eng.text  2.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.srt  2.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/(More) Efficient Secure Computation from Garbled Circuits.eng.text  2.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.srt  2.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Make AES great again.eng.text  2.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Do Not Trust Anybody ZK Proofs for Image Transformations Tile by Tile on Your Laptop.eng.text  2.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Security and Composition of Rational Cryptographic Protocols.eng.text  2.7 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.tsv  2.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Must the Communication Graph of MPC Protocols be an Expander.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.srt  2.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/libpqcrypto.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/International Olympiad in Cryptography NSUCRYPTO.eng.srt  2.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.txt  2.6 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.tsv  2.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/All Your Plaintext Are Belong To Us How the Mercenary Spyware Industry Helps.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The JMAC MAC.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Adversarial Correctness Favors Laziness.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Predicate Encryption for Inner Products from LWE.eng.text  2.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.tsv  2.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.srt  2.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.lrc  2.5 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.tsv  2.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.txt  2.5 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/IACR Fellows nomination.eng.text  2.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.srt  2.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.vtt  2.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.srt  2.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.lrc  2.5 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.txt  2.5 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Trick or Tweak On the Insecurity of OTR’s Tweaks.eng.text  2.5 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.txt  2.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.vtt  2.4 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.lrc  2.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.lrc  2.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.srt  2.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/ElectroEuro.eng.text  2.4 KB
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/(Nondeterministic) Hardness vs. Non-Malleability.eng.srt  2.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.txt  2.4 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.srt  2.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.eng.text  2.4 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.lrc  2.4 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.vtt  2.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.vtt  2.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.txt  2.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.tsv  2.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.vtt  2.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.tsv  2.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.txt  2.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.lrc  2.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.vtt  2.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Make Crypto Not Maps.eng.text  2.3 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.lrc  2.3 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.srt  2.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.srt  2.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.vtt  2.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.vtt  2.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.txt  2.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.txt  2.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.srt  2.2 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.lrc  2.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.srt  2.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.srt  2.2 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.vtt  2.2 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Quantum Computing Threat or Menace.eng.text  2.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.lrc  2.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.vtt  2.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An update about HiDalgo.eng.text  2.1 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.eng.text  2.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.tsv  2.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.srt  2.1 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.tsv  2.0 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.tsv  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.txt  2.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.tsv  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.txt  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.lrc  2.0 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.vtt  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.vtt  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.lrc  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.tsv  2.0 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.vtt  2.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.tsv  1.9 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.vtt  1.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Statistical Ineffective Fault Attacks.eng.text  1.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.txt  1.9 KB
 
                
                    - Workshops/TASER 2021/TASER 2021 captions/Closing remarks at TASER 2021, by Dan Page of Bristol University.eng.srt  1.9 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.tsv  1.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.lrc  1.9 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.srt  1.9 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.srt  1.9 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.vtt  1.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.srt  1.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Variants of Sponge-like Construction.eng.text  1.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.tsv  1.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.txt  1.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.txt  1.8 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.lrc  1.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.tsv  1.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.tsv  1.8 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.lrc  1.8 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.vtt  1.8 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/A small problem Regarding permutations.eng.text  1.8 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.vtt  1.7 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/A silent competition for ultra-fast public key cryptography.eng.text  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/program.js  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.txt  1.7 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Indistinguishability Obfuscation for All Circuits from Secret Key Functional Encryption.eng.text  1.7 KB
 
                
                    - Eurocrypt/Eurocrypt 2022/Eurocrypt 2022 captions/Response to questions on - Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.eng.srt  1.7 KB
 
                
                    - Crypto/Crypto 2018/Crypto 2018 captions/The Algebraic Group Model and its Applications.eng.text  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.lrc  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.tsv  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.srt  1.7 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.tsv  1.6 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.vtt  1.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.txt  1.6 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.lrc  1.6 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Computational Ring LWR problem.eng.text  1.6 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Learning the One Time Pad algorithm with Chosen Plain'text Attack Adversarial Neural Cryptography.eng.text  1.6 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.srt  1.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.tsv  1.5 KB
 
                
                    - Crypto/Crypto 2018 Rump Session/Crypto 2018 Rump Session captions/Theory of Cryptography Conference Test-of-Time Award Recipients.eng.text  1.5 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/Top secret A world of codes and ciphers an exhibition.eng.text  1.5 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/The Chia Proof of Space construction and implementation competition.eng.srt  1.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2017/Real World Crypto 2017 captions/David Cash.eng.text  1.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Verifiable Verification in Cryptographic Protocols.eng.text  1.4 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.tsv  1.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.srt  1.4 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.tsv  1.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.vtt  1.4 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.srt  1.4 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.tsv  1.3 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Practical demonstration of Bananb Target Collisions for Skein with NIST KAT files.eng.text  1.3 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.vtt  1.3 KB
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session.m3u  1.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.txt  1.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.lrc  1.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What Does Privacy Mean for Stock Trading.eng.text  1.3 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.json  1.3 KB
 
                
                    - Crypto/Crypto 2017 Rump Session/Crypto 2017 Rump Session captions/The Sound of Quantum.eng.text  1.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.txt  1.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.vtt  1.2 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.lrc  1.2 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.vtt  1.2 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2023/FSE 2023 captions/FSE 2023 Closing Remarks.eng.text  1.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.txt  1.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.srt  1.2 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.lrc  1.1 KB
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.txt  1.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.txt  1.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.srt  1.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.lrc  1.1 KB
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.lrc  1.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.txt  1.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/QueerCrypt.eng.text  1.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.txt  1.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.lrc  1.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.lrc  1.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.srt  1.1 KB
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.vtt  1.1 KB
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.vtt  1.1 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/theme.css  1.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.srt  1.1 KB
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.vtt  1.0 KB
 
                
                    - HEADER.md  1.0 KB
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.txt  1.0 KB
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.tsv  1017 bytes
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.lrc  1015 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Extracting Secret Keys from a device by analyzing the intensity of the light emitted.eng.text  1000 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.tsv  991 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.tsv  984 bytes
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.tsv  980 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.tsv  976 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.tsv  974 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Levchin Prize ceremony.eng.text  955 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.vtt  950 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.srt  947 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.txt  940 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.lrc  925 bytes
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.tsv  881 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.srt  869 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/An Application Of Frequency Shift Keying To Communication Resynchronisation.eng.text  858 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/menus.js  857 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.tsv  856 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.vtt  846 bytes
 
                
                    - Fast Software Encryption (FSE)/FSE 2013/FSE 2013 captions/Program Chair' Opening Remarks.eng.text  838 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/TCC GOA.eng.text  787 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Announcement - Lightsec workshop.eng.text  786 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.vtt  758 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.tsv  730 bytes
 
                
                    - Crypto/Crypto 2019 Rump Session/Crypto 2019 Rump Session captions/STARK friendly hash challenge.eng.srt  695 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/navmenu.css  672 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.txt  663 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.lrc  653 bytes
 
                
                    - Asiacrypt/Asiacrypt 2016/Asiacrypt 2016 captions/Neal Koblitz, Cryptography in Vietnam in the French and American Wars.eng.text  625 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018/Eurocrypt 2018 captions/too short MTS.eng.srt  616 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Swoosh Efficient Lattice-Based Non-Interactive Key Exchange.eng.text  588 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/The Good, The Bad, and The Ugly - Lessons from an MPC for Social Good Deployment.eng.text  555 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.tsv  538 bytes
 
                
                    - Crypto/Crypto 2011 Rump Sessions/Crypto 2011 Rump Session captions/Panel discussion on leakage.eng.text  535 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Under Surveillance.eng.text  524 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.srt  451 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.srt  420 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.vtt  407 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.txt  403 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.lrc  397 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA (reprise).eng.text  393 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.srt  393 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.vtt  385 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.srt  380 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/presentation.svg  370 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.vtt  363 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.txt  353 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.lrc  350 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.vtt  349 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.txt  335 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.lrc  330 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.tsv  325 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.tsv  323 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.txt  313 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.lrc  310 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.txt  283 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.tsv  280 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.lrc  279 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.srt  274 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Unknown presentation.eng.text  272 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.tsv  270 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.srt  269 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.vtt  261 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.tsv  253 bytes
 
                
                    - Eurocrypt/Eurocrypt 2018 Rump Session/Eurocrypt 2018 Rump Session captions/Reverse Kuleshov effect in cryptography.eng.text  241 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.vtt  239 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/navTitleFade.js  236 bytes
 
                
                    - Asiacrypt/Asiacrypt 2017/Asiacrypt 2017 captions/ABE with Tag Made Easy Concise Framework and New Instantiations in Prime order Groups.eng.text  232 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.txt  200 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2021/CHES 2021 captions/A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA-tagged.eng.text  200 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.lrc  196 bytes
 
                
                    - Cryptographic Hardware and Embedded Systems (CHES)/CHES 2022/CHES 2022 captions/Silent session on Masking.eng.text  175 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.tsv  156 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.vtt  123 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.srt  122 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.txt  113 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.lrc  112 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.tsv  112 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.srt  109 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.vtt  101 bytes
 
                
                    - Crypto/Crypto 2013 Rump Session/Crypto 2013 Rump Session captions/Spying NSA.eng.text  92 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.txt  91 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.lrc  89 bytes
 
                
                    - Workshops/WAC 2021 4/WAC 2021 4 captions/A Side Journey To Titan-tagged.eng.text  86 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.tsv  77 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2020/Real World Crypto 2020 Program_files/tooltips.js  76 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.vtt  61 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.srt  60 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.tsv  54 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.txt  51 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.lrc  50 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.json  41 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.json  41 bytes
 
                
                    - Crypto/Crypto 2012/Crypto 2012 captions/Succinct Arguments from Multi-prover Interactive Proofs.eng.text  37 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/zk-creds Flexible Anonymous Credentials from zkSNARKs and Existing Identity.eng.text  24 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.tsv  16 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.tsv  16 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.vtt  10 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.vtt  10 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.lrc  0 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.srt  0 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.text  0 bytes
 
                
                    - Crypto/Crypto 2022/Crypto 2022 captions/Secret Can Be Public Low-Memory AEAD Mode for High-Order Masking.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A High-Performance Enterprise System for Key Management.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging The Case of.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Adoption of High Assurance and Highly Performant Cryptographic Algorithms at AWS.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advanced FHE Protocols for the Blockchain.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Advancements and Future Directions in Secure Messaging with MLS and MIMI.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/An Analysis of Signal's PQXDH.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Building the Next Generation of AEAD.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome’s Password.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Compact Frequency Estimators in Adversarial Environments.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Designing iMessage PQ3 Quantum-Secure Messaging at Scale.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Entering to a New Era of Crypto Engineering Cryptographic Visibility and Agility.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Hertzbleed Claims of Constant-Time Execution Are Frequently Wrong.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/How can cryptography help with AI regulation compliance.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/I want to encrypt 264 bytes with AES-GCM using a single key.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Injection Attacks Against End-to-End Encrypted Applications.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Key transparency introduction, recent results, and open problems.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LaZer a Lattice Library for Zero-Knowledge and Succinct Proofs.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/LLMs can do it better Patching Code for Side-Channel Leakages.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Modern transparency logs.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/More Efficient Protocols for Post-Quantum Secure Messaging.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Obfuscated Key Exchange.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private Hierarchical Governance for Encrypted Messaging.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Private web search.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Reclaiming our passwords Protecting End-to-End Encryption from a Malicious Zoom Server.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/RISC-V Cryptography Evolution High Assurance and Post-Quantum Cryptography.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Shipping end-to-end encryption to billions.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/SIGMA Secure GPT Inference with Function Secret Sharing.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/STIR SHAKEN A Looming Privacy Disaster.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Terrapin Attack Breaking SSH Channel Integrity By Sequence Number Manipulation.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Towards robust FHE for the real world.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Watermarks for Language Models a Cryptographic Perspective.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Weak Fiat-Shamir attacks on modern proof systems.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/What's wrong with Poly1305 - Improving Poly1305 through a Systematic Exploration of.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/WhatsApp Key Transparency.eng.txt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.lrc  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.srt  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.text  0 bytes
 
                
                    - Real World Crypto (RWC)/Real World Crypto 2024/Real World Crypto 2024 captions/Who tracks the trackers Balancing privacy and stalker detection for Apple's AirTags.eng.txt  0 bytes
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.