34:16 Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable...
10:39 Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key D...
22:14 Promise $\Sigma$-protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on...
23:31 Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmi...
22:57 Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions...
24:18 Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Paralle...
24:55 Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Exten...
28:37 On the non-tightness of measurement-based reductions for key encapsulation mechanism in the qua...
35:21 Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (T...
37:02 Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitment...