22:22 Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
23:34 Characterisation and Estimation of the Key Rank Distribution in the context of side channel ...
28:22 A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not
27:10 Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ...
19:03 ParTI Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks
18:03 Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac
22:37 Design in Type I, Run in Type III Fast and Scalable Bilinear Type Conversion using Integer Programm