20:25 A High Throughput Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths
24:50 Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis
19:31 Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit