Home
Videos uploaded by user “TheIACR”
Tor and Circumvention: Lessons Learned, by Roger Dingledine
 
01:08:25
Invited talk at Crypto 2011, University of California, Santa Barbara
Views: 1069 TheIACR
Blockchain!
 
03:24
Presentation by Jon Callas at Crypto 2018 Rump Session
Views: 3007 TheIACR
Spying NSA (reprise).
 
04:13
A reprise of a rump session presentation at Crypto 2013. Recorded with Google Glass.
Views: 2249 TheIACR
The End of Crypto
 
01:05:37
Talk at crypto 2012. Author: Jonathan Zittrain. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24329
Views: 9701 TheIACR
Fully Homomorphic Encryption over the Integers with Shorter Public Keys
 
19:52
Talk at crypto 2011. Authors: Jean-Sébastien Coron, David Naccache, Avradip Mandal, Mehdi Tibouchi. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23592
Views: 2438 TheIACR
Biclique cryptanalysis of the full AES
 
06:22
Crypto 2011 Rump session presentation for Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, talk given by Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
Views: 1729 TheIACR
IO Obfuscation
 
06:10
Presentation at Crypto 2015 Rump session. Daniel J. Berstein, Geoffroy Couteau, Carl Ellison, Remi Geraud, Becca Kreuter, Tanja Lange, Kristin Lauter, Christof Paar, Tom Roeder, Mike Rosulek, and Eran Tromer.
Views: 1059 TheIACR
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
 
16:23
Talk at crypto 2011. Authors: Alexander Russell, Hang Dinh, Cristopher Moore. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23607
Views: 1932 TheIACR
SNARKs for C: Verifying Program Executions Succinctly an ...
 
21:18
Talk at crypto 2013. Authors: Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza
Views: 1849 TheIACR
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
 
19:02
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis by Adi Shamir, Eran Tromer, Daniel Genkin. Talk at Crypto 2014.
Views: 6323 TheIACR
Semantic Security for the Wiretap Channel
 
18:14
Talk at crypto 2012. Authors: Mihir Bellare, Stefano Tessaro, Alexander Vardy. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24292
Views: 1120 TheIACR
Homomorphic Encryption from Learning with Errors: Concep ...
 
23:16
Talk at crypto 2013. Authors: Craig Gentry, Amit Sahai, Brent Waters
Views: 2261 TheIACR
Obvious in Hindsight  From Side Channel Attacks to the Security Challenges Ahead
 
55:57
Paul Kocher. Invited talk joint between Crypto 2016 and CHES 2016.
Views: 2125 TheIACR
Delegatable Anonymous Credentials from Mercurial Signatures
 
04:00
Talk by Elizabeth Crites; Anna Lysyanskaya presented at Eurocrypt 2017 Rump Session.
Views: 433 TheIACR
The JMAC MAC
 
03:21
Talk by Pierre Karpman; Bart Mennink, presented at Crypto 2017 rump session.
Views: 484 TheIACR
Invited Talk: Failures of secret key cryptography
 
01:00:57
Invited talk by Daniel Bernstein at FSE 2013.
Views: 2161 TheIACR
Tutorial on Homomorphic Encryption (part 1)
 
42:38
Tutorial on homomorphic encryption by Shai Halevi, presented at Crypto 2011 in Santa Barbara, CA. Part 1 of 2. Presentation materials available at http://people.csail.mit.edu/shaih/presentations.html
Views: 12839 TheIACR
500 Bits - Implementor's Lament
 
02:49
Lyrics by Daniel J. Bernstein and Tanja Lange.
Views: 1109 TheIACR
Round Optimal Blind Signatures in the Standard Model
 
20:09
Talk at Crypto 2011. Authors: Amit Sahai, Dominique Unruh, Sanjam Garg, Dominique Schröder, Vanishree Rao. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23600
Views: 380 TheIACR
From Idea to Impact, the Crypto Story:  What's Next?
 
01:03:19
IACR Distinguished Lecture by Shafi Goldwasser, presented at Crypto 2018.
Views: 2511 TheIACR
Notes on ``Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it
 
04:28
Talk by Tomer Ashur, presented at Eurocrypt 2017 Rump Session.
Views: 654 TheIACR
Efficient Zero-Knowledge Argument for Correctness of a S ...
 
20:30
Talk at eurocrypt 2012. Authors: Stephanie Bayer, Jens Groth. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24253
Views: 265 TheIACR
Ouroboros  A Provably Secure Proof of Stake Protocol
 
26:43
Paper by Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov, presented at Crypto 2017. See https://www.iacr.org/cryptodb/data/paper.php?pubkey=28185
Views: 6037 TheIACR
May the Fourth Be With You  A Microarchitectural Side Channel Attack on Real World Applications of C
 
06:17
Paper by Daniel Genkin; Luke Valenta; Yuval Yarom, presented at Eurocrypt 2017 Rump Session.
Views: 269 TheIACR
Verifiable Delay Functions
 
22:15
Paper by Dan Boneh and Joseph Bonneau and Benedikt Bünz and Ben Fisch presented at Crypto 2018. See https://iacr.org/cryptodb/data/paper.php?pubkey=28858
Views: 565 TheIACR
Efficient High Speed WPA2 Brute Force Attacks using Scalable Low Cost FPGA Clustering
 
17:00
Markus Kammerstetter and Markus Muellner and Daniel Burian and Christian Kudera and Wolfgang Kastner, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27849
Views: 2750 TheIACR
Crowd-Blending Privacy
 
18:02
Talk at crypto 2012. Authors: Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24331
Views: 450 TheIACR
Program Chair's Report by Jonathan Katz
 
07:34
Presented by Jonathan Katz at Eurocrypt 2017 Rump Session.
Views: 545 TheIACR
A Tutorial on High Performance Computing Applied to Cryp ...
 
01:00:54
Talk at eurocrypt 2012. Author: Antoine Joux. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24276
Views: 674 TheIACR
Towards Easy Leakage Certification
 
20:52
François Durvaux and François-Xavier Standaert and Santos Merino Del Pozo, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27827
Views: 332 TheIACR
Antikernel  A Decentralized Secure Hardware Software Operating System
 
20:05
Andrew D. Zonenberg and Bülent Yener, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27850
Views: 568 TheIACR
Phil Rogaway - IACR Distinguished Lecture 2015
 
01:13:39
The moral character of cryptographic work. http://web.cs.ucdavis.edu/~rogaway/papers/moral.html Presented at Asiacrypt 2015 in Auckland, New Zealand.
Views: 3265 TheIACR
Substitution-Permutation Networks, Pseudorandom Function ...
 
20:39
Talk at crypto 2012. Authors: Eric Miles, Emanuele Viola. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24289
Views: 7708 TheIACR
Security of Symmetric Encryption against Mass Surveillance
 
18:38
Security of Symmetric Encryption against Mass Surveillance by Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway. Talk at Crypto 2014.
Views: 729 TheIACR
vatiCAN  Vetted, Authenticated CAN Bus
 
21:32
Stefan Nürnberger and Christian Rossow, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27855
Views: 230 TheIACR
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
 
24:42
Paper by Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin E. Lauter, presented at Asiacrypt 2017. See https://www.iacr.org/cryptodb/data/paper.php?pubkey=28291
Views: 155 TheIACR
On the Indifferentiability of Key-Alternating Ciphers
 
20:09
Talk at crypto 2013. Authors: Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
Views: 946 TheIACR
Encryption Switching Protocols
 
23:12
Geoffroy Couteau and Thomas Peters and David Pointcheval, Crypto 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27712
Views: 252 TheIACR
Non-malleable Codes from Two-Source Extractors
 
17:53
Talk at crypto 2013. Authors: Stefan Dziembowski, Tomasz Kazana, Maciej Obremski
Views: 243 TheIACR
QcBits  constant time small key code based cryptography
 
26:50
Tung Chou, CHES 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27846
Views: 229 TheIACR
Breaking the Circuit Size Barrier for Secure Computation Under DDH
 
26:32
Elette Boyle and Niv Gilboa and Yuval Ishai, Crypto 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27699
Views: 463 TheIACR
Efficient Algorithms for Supersingular Isogeny Diffie Hellman
 
29:06
Craig Costello and Patrick Longa and Michael Naehrig, Crypto 2016. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=27646
Views: 1698 TheIACR
Another Look at Provable Security.
 
52:39
Talk at Eurocrypt 2012. Author: Alfred Menezes. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24260
Views: 1605 TheIACR
Proofs of Space
 
23:54
Views: 189 TheIACR
Fast Secure Two Party ECDSA Signing
 
22:08
Paper by Yehuda Lindell presented at Crypto 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28210
Views: 1040 TheIACR
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
 
25:56
Paper by Juan A. Garay and Aggelos Kiayias and Nikos Leonardos, presented at Crypto 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28222
Views: 515 TheIACR
Fast Homomorphic Evaluation of Deep Discretized Neural Networks
 
22:55
Paper by Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier, presented at Crypto 2018. See https://iacr.org/cryptodb/data/paper.php?pubkey=28796
Views: 272 TheIACR
Merkle Puzzles in a Quantum World
 
18:37
Talk at crypto 2011. Authors: Gilles Brassard, Louis Salvail, Peter Høyer, Kassem Kalach, Marc Kaplan, Sophie Laplante. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23586
Views: 388 TheIACR
Scalable Zero Knowledge via Cycles of Elliptic Curves
 
19:43
Scalable Zero Knowledge via Cycles of Elliptic Curves by Eran Tromer, Alessandro Chiesa, Eli Ben-Sasson, Madars Virza. Talk at Crypto 2014.
Views: 459 TheIACR
Identity Based Encryption from the Diffie Hellman Assumption
 
27:39
Paper by Nico Döttling and Sanjam Garg, presented at Crypto 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28232
Views: 1943 TheIACR