27:10 Cryptographic applications of capacity theory On the optimality of Coppersmith's Method for ... IACR
28:22 A Tale of Two Shares Why Two Share Threshold Implementation Seems Worthwhile - and Why It Is Not IACR
25:07 Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions IACR
46:52 Side Channel Analysis Protection and Low Latency in Action - Case Study of PRINCE and Midori IACR
23:34 Characterisation and Estimation of the Key Rank Distribution in the context of side channel ... IACR
18:12 Applying MILP Method to Searching Integral Distinguishers Based on Division Property for ... IACR
26:40 Partitioning via Non Linear Polynomial Functions More Compact IBEs from Ideal Lattices and IACR
21:32 How to Obtain Fully Structure Preserving Automorphic Signatures from Structure Preserving ones IACR
22:22 Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions IACR
25:30 MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative complexity IACR
24:56 Balloon Hashing A Memory Hard Function Providing Provable Protection Against Sequential attacks IACR