Parent directory/ | - | - |
A General Polynomial Selection Method and New Asymptotic Complexities for ....mp4 | 51.0 MiB | 2017-Mar-05 07:21 |
A New Algorithm for the Unbalanced Meet in the Middle Problem.mp4 | 85.3 MiB | 2017-Mar-05 07:27 |
A Shuffle Argument Secure in the Generic Model.mp4 | 54.3 MiB | 2017-Mar-05 07:31 |
A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not.mp4 | 59.1 MiB | 2017-Mar-05 07:34 |
Adaptive Oblivious Transfer and Generalization.mp4 | 16.1 MiB | 2017-Mar-05 07:36 |
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ....mp4 | 95.3 MiB | 2017-Mar-05 07:38 |
Asiacrypt 2016 Rump Session.mp4 | 263.7 MiB | 2017-Mar-05 07:45 |
Asiacrypt Invited Lecture II Hoeteck Wee, Advances in Functional Encryption.mp4 | 203.3 MiB | 2017-Mar-05 07:51 |
Asiacrypt@14h45 Collapse binding quantum commitments without random oracles.mp4 | 44.2 MiB | 2017-Mar-05 07:54 |
Asiacrypt@Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings.mp4 | 78.7 MiB | 2017-Mar-05 07:57 |
Authenticated Encryption with Variable Stretch.mp4 | 26.3 MiB | 2017-Mar-05 08:00 |
Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks.mp4 | 175.7 MiB | 2017-Mar-05 08:03 |
Characterisation and Estimation of the Key Rank Distribution in the context of side channel ....mp4 | 68.2 MiB | 2017-Mar-05 08:05 |
Cliptography Clipping the Power of Kleptographic Attacks.mp4 | 108.1 MiB | 2017-Mar-05 08:09 |
Constant Round Asynchronous Multi Party Computation Based on One Way Functions.mp4 | 61.4 MiB | 2017-Mar-05 08:12 |
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.mp4 | 81.5 MiB | 2017-Mar-05 08:19 |
Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ....mp4 | 122.5 MiB | 2017-Mar-05 08:15 |
Cryptography in Vietnam in the French and American Wars.mp4 | 118.5 MiB | 2017-Mar-05 08:27 |
Déjà Q All Over Again Tighter and Broader Reductions of q Type Assumptions.mp4 | 110.9 MiB | 2017-Mar-05 08:29 |
Efficient IBE with Tight Reduction to Standard Assumption in the Multi challenge Setting_.mp4 | 30.1 MiB | 2017-Mar-05 08:34 |
Efficient KDM CCA Secure Public Key Encryption for Polynomial Functions.mp4 | 17.8 MiB | 2017-Mar-05 08:37 |
Efficient Public Key Distance Bounding Protocol.mp4 | 124.7 MiB | 2017-Mar-05 08:40 |
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience.mp4 | 57.3 MiB | 2017-Mar-05 08:43 |
Efficient and Provable White Box Primitives.mp4 | 35.0 MiB | 2017-Mar-05 08:32 |
Faster Fully Homomorphic Encryption Bootstrapping in less than 0.1 Seconds.mp4 | 118.2 MiB | 2017-Mar-05 08:52 |
From 5 pass MQ based identification to MQ based signatures.mp4 | 29.3 MiB | 2017-Mar-05 08:56 |
From Identification to Signatures, Tightly A Framework and Generic Transforms.mp4 | 40.5 MiB | 2017-Mar-05 08:59 |
General IACR Business Meeting.mp4 | 126.0 MiB | 2017-Mar-05 09:04 |
How to Circumvent the Two Ciphertext Lower Bound for Linear Garbling Schemes.mp4 | 89.6 MiB | 2017-Mar-05 09:07 |
How to Generate and use Universal Samplers.mp4 | 35.1 MiB | 2017-Mar-05 09:09 |
How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones.mp4 | 31.0 MiB | 2017-Mar-05 09:12 |
Indistinguishable Proofs of Work or Knowledge.mp4 | 91.9 MiB | 2017-Mar-05 09:15 |
Iterated Random Oracle A Universal Approach for Finding Loss in Security Reduction.mp4 | 105.2 MiB | 2017-Mar-05 09:18 |
Linear Structures Applications to Cryptanalysis of Round Reduced Keccak.mp4 | 131.5 MiB | 2017-Mar-05 09:22 |
MiMC Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity.mp4 | 72.0 MiB | 2017-Mar-05 09:28 |
More Powerful and Reliable Second level Statistical Randomness Tests for NIST SP 800-22.mp4 | 27.6 MiB | 2017-Mar-05 09:30 |
Multi Input Functional Encryption with Unbounded Message Security.mp4 | 98.5 MiB | 2017-Mar-05 09:33 |
Multi Key Homomorphic Authenticators.mp4 | 66.6 MiB | 2017-Mar-05 09:36 |
NIZKs with an Untrusted CRS Security in the Face of Parameter Subversion.mp4 | 61.6 MiB | 2017-Mar-05 09:47 |
Neal Koblitz, Cryptography in Vietnam in the French and American Wars.mp4 | 449.5 MiB | 2017-Mar-05 09:44 |
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,and Midori64.mp4 | 59.3 MiB | 2017-Mar-05 09:50 |
On the Security of Supersingular Isogeny Cryptosystems.mp4 | 51.8 MiB | 2017-Mar-05 09:53 |
Optimization of LPN Solving Algorithms.mp4 | 51.2 MiB | 2017-Mar-05 09:57 |
Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and.mp4 | 65.7 MiB | 2017-Mar-05 10:00 |
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.mp4 | 49.0 MiB | 2017-Mar-05 10:03 |
Reactive Garbling Foundation, Instantiation, Application.mp4 | 47.5 MiB | 2017-Mar-05 10:06 |
Reverse Cycle Walking and Its Applications.mp4 | 95.0 MiB | 2017-Mar-05 10:09 |
Selective Opening Security from Simulatable Data Encapsulation.mp4 | 40.3 MiB | 2017-Mar-05 10:12 |
Selective Opening Security in the Presence of Randomness Failures.mp4 | 48.5 MiB | 2017-Mar-05 10:15 |
Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori.mp4 | 146.8 MiB | 2017-Mar-05 10:20 |
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.mp4 | 48.9 MiB | 2017-Mar-05 10:23 |
Simpira v2 A Family of Efficient Permutations Using the AES Round Function.mp4 | 63.2 MiB | 2017-Mar-05 10:28 |
Size-Hiding Computation for Multiple Parties.mp4 | 62.8 MiB | 2017-Mar-05 10:31 |
Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes.mp4 | 43.9 MiB | 2017-Mar-05 10:34 |
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.mp4 | 63.7 MiB | 2017-Mar-05 12:35 |
The Kernel Matrix Diffie Hellman Assumption.mp4 | 93.2 MiB | 2017-Mar-05 12:38 |
The Reality of Cryptographic Deployments on the Internet.mp4 | 30.2 MiB | 2017-Mar-05 12:40 |
Towards Practical Whitebox cryptography Optimizing Efficiency and Space Hardness.mp4 | 56.2 MiB | 2017-Mar-05 12:44 |
Towards Tightly Secure Lattice Short Signature and Id Based Encryption.mp4 | 62.0 MiB | 2017-Mar-05 12:47 |
Trick or Tweak On the Insecurity of OTR’s Tweaks.mp4 | 42.2 MiB | 2017-Mar-05 12:50 |
Universal Composition with Responsive Environments.mp4 | 36.2 MiB | 2017-Mar-05 12:53 |
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.mp4 | 32.5 MiB | 2017-Mar-05 12:56 |
Unknown-Input Attacks in the Parallel Setting Improving the Security of the ....mp4 | 58.9 MiB | 2017-Mar-05 13:01 |
Verifiable Functional Encryption.mp4 | 74.5 MiB | 2017-Mar-05 13:04 |
Welcome to Asiacrypt.mp4 | 41.6 MiB | 2017-Mar-05 13:06 |
When are Fuzzy Extractors Possible.mp4 | 52.1 MiB | 2017-Mar-05 13:09 |
Zero Knowledge Accumulators and Set Algebra.mp4 | 22.2 MiB | 2017-Mar-05 13:12 |
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption.mp4 | 55.2 MiB | 2017-Mar-05 13:15 |