24:56 A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati... IACR
34:22 Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integr... IACR
21:37 Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics IACR
28:56 A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth ... IACR
25:01 New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Intera... IACR
23:48 Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k... IACR
17:30 Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Gu... IACR
24:49 Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model IACR
28:41 Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All ... IACR
22:03 Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields IACR