21:38 On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with ... IACR
19:01 How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs IACR
17:21 Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources IACR
16:03 Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications IACR
15:06 Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation IACR