Selected Areas in Cryptography
SAC2020 Program: Session 3
21:44
Selected Areas in Cryptography
SAC2020 Closing Remarks
10:12
Selected Areas in Cryptography
SAC2020 Program: Session 5 - Part 2
22:10
Selected Areas in Cryptography
SAC2020 Program: Session 5 - Part 1
35:50
Selected Areas in Cryptography
SAC2020 Program: Session 4
53:45
Selected Areas in Cryptography
SAC2020 Program: Session 6
45:45
Selected Areas in Cryptography
SAC2020 Invited Talk: Trustless groups of unknown order
1:13:45
Selected Areas in Cryptography
26. Improvements to quantum search techniques for block-ciphers, with applications to AES
24:23
Selected Areas in Cryptography
SAC2020 Invited Talk: What’s so hard about Internet voting?
47:51
Selected Areas in Cryptography
SAC2020 Program: Session 2
29:09
Selected Areas in Cryptography
SAC2020 Program: Session 1
30:16
Selected Areas in Cryptography
24. Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
25:50
Selected Areas in Cryptography
SAC2020 Day 1: Opening Remarks
7:04
Selected Areas in Cryptography
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 3/4
1:09:21
Selected Areas in Cryptography
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 4/4
39:27
Selected Areas in Cryptography
13. Boolean Ring Cryptographic Equation Solving
36:02
Selected Areas in Cryptography
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 1/2
1:00:19
Selected Areas in Cryptography
20. Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
22:39
Selected Areas in Cryptography
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 2/2
39:09
Selected Areas in Cryptography
16. Unintended Features of APIs: Cryptanalysis of Incremental HMAC
23:13
Selected Areas in Cryptography
23. On the Influence of Optimizers in Deep Learning-based Side-Channel Analysis
26:57
Selected Areas in Cryptography
18. On Index Calculus Algorithms for Subfield Curves
19:08
Selected Areas in Cryptography
17. Trapdoor DDH groups from pairings and isogenies
18:29
Selected Areas in Cryptography
22. WARP: Revisiting GFN for Lightweight 128-bit Block Cipher
19:50
Selected Areas in Cryptography
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 2/4
53:25
Selected Areas in Cryptography
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 2/2
1:13:31
Selected Areas in Cryptography
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 1/4
50:51
Selected Areas in Cryptography
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 1/2
1:08:00
Selected Areas in Cryptography
15. Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning
22:18
Selected Areas in Cryptography
5. Not enough LESS: An improved algorithm for solving Code Equivalence Problems over Fq
27:17
Selected Areas in Cryptography
19. Correlation Power Analysis and Higher-order Masking Implementation of WAGE
26:47
Selected Areas in Cryptography
27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions
21:30
Selected Areas in Cryptography
21. Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
24:33
Selected Areas in Cryptography
09. Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
13:32
Selected Areas in Cryptography
14. Towards Post-Quantum Security for Signal’s X3DH Handshake
31:07
Selected Areas in Cryptography
04. Low-gate Quantum Golden Collision Finding
21:16
Selected Areas in Cryptography
03. Weak-Key Distinguishers for AES
32:50
Selected Areas in Cryptography
07. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
23:07
Selected Areas in Cryptography
10 - Obfuscating Finite Automata
19:44
Selected Areas in Cryptography
12 - Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
30:21
Selected Areas in Cryptography
02 - On Self-Equivalence Encodings in White-Box Implementations
27:39
Selected Areas in Cryptography
06 - FROST: Flexible Round-Optimized Schnorr Threshold Signatures
23:06
Selected Areas in Cryptography
11 - Improved (Related-key) Differential Cryptanalysis on GIFT
21:23
Selected Areas in Cryptography
25 - Practical Isogeny-Based Key-exchange with Optimal Tightness
23:11
Selected Areas in Cryptography
08 - PRINCEv2: More Security for (Almost) No Overhead
15:49
Selected Areas in Cryptography
01 - Efficient Lattice-Based Polynomial Evaluation and Batch Zero-Knowledge Arguments
38:18