34:22 Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr...
24:56 A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati...
24:49 Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
28:41 Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All ...
17:30 Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu...
25:01 New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Intera...
23:48 Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k...
28:56 A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth ...
19:16 Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Funct...
25:34 PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Stan...