non-malleable secret sharing against bounded joint-tampering attacks in the plain model
Published 4 years ago • 157 plays • Length 17:17Download video MP4
Download video MP3
Similar videos
-
15:29
continuously non-malleable secret sharing: joint tampering, plain model and capacity
-
28:25
revisiting non-malleable secret sharing
-
21:23
non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage re...
-
4:56
continuously non-malleable codes against bounded-depth tampering
-
24:24
non malleable secret sharing for general access structures
-
23:16
non-malleable codes, extractors and secret sharing for interleaved tampering and composition o...
-
20:22
non malleable codes for space bounded tampering
-
22:38
itc2020 pre-recording: leakage-resilient secret sharing in non-compartmentalized models
-
13:02
adb safegate: company merger made seamless with pim software | customer spotlight | inriver
-
22:40
lightweight, maliciously secure verifiable function secret sharing
-
47:09
"clevis and tang: securing your secrets at rest" - fraser tweedale (lca 2020)
-
20:13
explicit non malleable codes against bit wise tampering adn permutations
-
13:23
ndss 2021 more than a fair share: network data remanence attacks against secret sharing-based scheme
-
1:29:46
s-22: secret sharing and coding
-
4:00
metadata matters
-
3:12
choosing the right msp (feat. bezawit sumner)
-
0:50
hijacked devices explained
-
1:04:21
non-malleable cryptography
-
14:53
ndss 2022 titanium: a metadata-hiding file-sharing system with malicious security
-
26:48
secret sharing
-
22:59
session metal: a metadata-hiding file-sharing system
-
26:46
black-box non-interactive non-malleable commitments