Duration: (21:33) ?Subscribe5835 2025-02-09T09:25:47+00:00
On the Indifferentiability of Key-Alternating Ciphers
(20:9)
Indifferentiability of Confusion-Diffusion Networks
(25:30)
Indifferentiability of Iterated Even Mansour Ciphers with Non Idealized Key Schedules
(23:25)
Indifferentiability of 8 Round Feistel Networks
(21:33)
Indifferentiability for Public Key Cryptosystems
(22:29)
Redeeming Reset Indifferentiability and Applications to Post-Quantum Security
(25:13)
Indifferentiable Authenticated Encryption
(18:47)
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
(18:40)
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
(18:37)
How to Pronounce Indifferentiability
(20)
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
(26:6)
Improving the Indifferentiability Security Bounds for the Fast Wide-pipe and the JH Modes
(4:35)
Length Extension Attacks
(3:15)
Tight Preimage Resistance of the Sponge Construction
(4:44)