22:56 Robust transforming combiners from indistinguishability obfuscation to functional encryptio IACR
25:01 Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degre IACR
16:54 High Throughput Secure Three Party Computation for Malicious Adversaries and an Honest Majo IACR
26:25 Separating Semantic and Circular Security for Symmetric Key Bit Encryption from the Learnin IACR
22:16 Relativistic or 2 prover 1 round zero knowledge protocol for NP secure against quantum adve IACR