1:38:11Ludovic Perret - Gröbner Bases Techniques in Post-Quantum CryptographyPQCrypto 20161.1K views·10 years ago
32:05Ingo von Maurich - IND-CCA Secure Hybrid Encryption from QC-MDPC NiederreiterPQCrypto 2016490 views·10 years ago
14:10Mayuresh Anand - Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of OperationPQCrypto 2016456 views·10 years ago
29:26Vladimir Soukharev - Post-Quantum Security Models for Authenticated EncryptionPQCrypto 2016340 views·10 years ago
16:40Ehsan Ebrahimi Targhi - Quantum Collision-Resistance of Non-Uniformly Distributed FunctionsPQCrypto 2016582 views·10 years ago
33:47Daniel Smith-Tone - Security Analysis and Key Modification for ZHFEPQCrypto 2016289 views·10 years ago
28:13Rodolfo Canto Torres - Analysis of Information Set Decoding for a Sub-Linear Error WeightPQCrypto 2016365 views·10 years ago
24:22Aurélie Phesso - An Efficient Attack on a Code-based Signature SchemePQCrypto 2016360 views·10 years ago
21:20Ray Perlner - Vulnerabilities of McEliece in the World of EscherPQCrypto 2016327 views·10 years ago
26:25Alan Szepieniec - Extension Field Cancellation [complete title below]PQCrypto 2016179 views·10 years ago
24:31Jeremy Vates - On the Differential Security of the HFEv- Signature PrimitivePQCrypto 2016253 views·10 years ago
28:46Vlad Dragoi - Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar CodesPQCrypto 2016852 views·10 years ago
27:35Dustin Moody - Post-Quantum Cryptography NIST's Plan for the FuturePQCrypto 20161.6K views·10 years ago
58:21Masahide Sasaki - Quantum Key Distribution Platform and Its ApplicationsPQCrypto 2016298 views·10 years ago
23:44Brandon Langenberg - Applying Grover's Algorithm to AES Quantum Resource EstimatesPQCrypto 20161.3K views·10 years ago