22:21 A Novel Completeness Test for Leakage Models and its Application to Side Channel Attacks and Re...
22:15 Towards Micro-Architectural Leakage Simulators: Reverse Engineering Micro-Architectural Leakage...
26:52 The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp: Preimage Attack on...
24:42 CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom ...
28:30 Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES ...
20:58 Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Atta...
20:14 Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to ...