24:50 Fast Correlation Attacks over Extension Fields, Large unite Linear Approximation and Cryptoanalysis
19:31 Programmable Hash Functions go Private Constructions and Applications to Homomorphic Signatures wit
21:38 On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with ...