SAC2020 Program: Session 3
Selected Areas in Cryptography
SAC2020 Program: Session 3
21:44
SAC2020 Closing Remarks
Selected Areas in Cryptography
SAC2020 Closing Remarks
10:12
SAC2020 Program: Session 5 - Part 2
Selected Areas in Cryptography
SAC2020 Program: Session 5 - Part 2
22:10
SAC2020 Program: Session 5 - Part 1
Selected Areas in Cryptography
SAC2020 Program: Session 5 - Part 1
35:50
SAC2020 Program: Session 4
Selected Areas in Cryptography
SAC2020 Program: Session 4
53:45
SAC2020 Program: Session 6
Selected Areas in Cryptography
SAC2020 Program: Session 6
45:45
SAC2020 Invited Talk: Trustless groups of unknown order
Selected Areas in Cryptography
SAC2020 Invited Talk: Trustless groups of unknown order
1:13:45
26. Improvements to quantum search techniques for block-ciphers, with applications to AES
Selected Areas in Cryptography
26. Improvements to quantum search techniques for block-ciphers, with applications to AES
24:23
SAC2020 Invited Talk: What’s so hard about Internet voting?
Selected Areas in Cryptography
SAC2020 Invited Talk: What’s so hard about Internet voting?
47:51
SAC2020 Program: Session 2
Selected Areas in Cryptography
SAC2020 Program: Session 2
29:09
SAC2020 Program: Session 1
Selected Areas in Cryptography
SAC2020 Program: Session 1
30:16
24. Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
Selected Areas in Cryptography
24. Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
25:50
SAC2020 Day 1: Opening Remarks
Selected Areas in Cryptography
SAC2020 Day 1: Opening Remarks
7:04
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 3/4
Selected Areas in Cryptography
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 3/4
1:09:21
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 4/4
Selected Areas in Cryptography
SAC2020 Summer School by Vanessa Teague - Can crypto help enhance democracy? Part 4/4
39:27
13. Boolean Ring Cryptographic Equation Solving
Selected Areas in Cryptography
13. Boolean Ring Cryptographic Equation Solving
36:02
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 1/2
Selected Areas in Cryptography
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 1/2
1:00:19
20. Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
Selected Areas in Cryptography
20. Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
22:39
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 2/2
Selected Areas in Cryptography
SAC2020 Summer School by Antoine Joux - Polynomial systems of equations ... Part 2/2
39:09
16. Unintended Features of APIs: Cryptanalysis of Incremental HMAC
Selected Areas in Cryptography
16. Unintended Features of APIs: Cryptanalysis of Incremental HMAC
23:13
23. On the Influence of Optimizers in Deep Learning-based Side-Channel Analysis
Selected Areas in Cryptography
23. On the Influence of Optimizers in Deep Learning-based Side-Channel Analysis
26:57
18. On Index Calculus Algorithms for Subfield Curves
Selected Areas in Cryptography
18. On Index Calculus Algorithms for Subfield Curves
19:08
17. Trapdoor DDH groups from pairings and isogenies
Selected Areas in Cryptography
17. Trapdoor DDH groups from pairings and isogenies
18:29
22. WARP: Revisiting GFN for Lightweight 128-bit Block Cipher
Selected Areas in Cryptography
22. WARP: Revisiting GFN for Lightweight 128-bit Block Cipher
19:50
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 2/4
Selected Areas in Cryptography
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 2/4
53:25
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 2/2
Selected Areas in Cryptography
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 2/2
1:13:31
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 1/4
Selected Areas in Cryptography
SAC2020 Summer School by Jeremy Clark - Can crypto help enhance democracy? Part 1/4
50:51
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 1/2
Selected Areas in Cryptography
SAC2020 Summer School by Ben Smith - Modern elliptic curve cryptography Part 1/2
1:08:00
15. Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning
Selected Areas in Cryptography
15. Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning
22:18
5. Not enough LESS: An improved algorithm for solving Code Equivalence Problems over Fq
Selected Areas in Cryptography
5. Not enough LESS: An improved algorithm for solving Code Equivalence Problems over Fq
27:17
19. Correlation Power Analysis and Higher-order Masking Implementation of WAGE
Selected Areas in Cryptography
19. Correlation Power Analysis and Higher-order Masking Implementation of WAGE
26:47
27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions
Selected Areas in Cryptography
27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions
21:30
21. Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
Selected Areas in Cryptography
21. Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
24:33
09. Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Selected Areas in Cryptography
09. Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM
13:32
14. Towards Post-Quantum Security for Signal’s X3DH Handshake
Selected Areas in Cryptography
14. Towards Post-Quantum Security for Signal’s X3DH Handshake
31:07
04. Low-gate Quantum Golden Collision Finding
Selected Areas in Cryptography
04. Low-gate Quantum Golden Collision Finding
21:16
03. Weak-Key Distinguishers for AES
Selected Areas in Cryptography
03. Weak-Key Distinguishers for AES
32:50
07. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Selected Areas in Cryptography
07. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
23:07
10 - Obfuscating Finite Automata
Selected Areas in Cryptography
10 - Obfuscating Finite Automata
19:44
12 - Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
Selected Areas in Cryptography
12 - Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
30:21
02 - On Self-Equivalence Encodings in White-Box Implementations
Selected Areas in Cryptography
02 - On Self-Equivalence Encodings in White-Box Implementations
27:39
06 - FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Selected Areas in Cryptography
06 - FROST: Flexible Round-Optimized Schnorr Threshold Signatures
23:06
11 - Improved (Related-key) Differential Cryptanalysis on GIFT
Selected Areas in Cryptography
11 - Improved (Related-key) Differential Cryptanalysis on GIFT
21:23
25 - Practical Isogeny-Based Key-exchange with Optimal Tightness
Selected Areas in Cryptography
25 - Practical Isogeny-Based Key-exchange with Optimal Tightness
23:11
08 - PRINCEv2: More Security for (Almost) No Overhead
Selected Areas in Cryptography
08 - PRINCEv2: More Security for (Almost) No Overhead
15:49
01 - Efficient Lattice-Based Polynomial Evaluation and Batch Zero-Knowledge Arguments
Selected Areas in Cryptography
01 - Efficient Lattice-Based Polynomial Evaluation and Batch Zero-Knowledge Arguments
38:18