non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage re...
Published 4 years ago • 90 plays • Length 21:23Download video MP4
Download video MP3
Similar videos
-
17:17
non-malleable secret sharing against bounded joint-tampering attacks in the plain model
-
15:29
continuously non-malleable secret sharing: joint tampering, plain model and capacity
-
28:25
revisiting non-malleable secret sharing
-
23:16
non-malleable codes, extractors and secret sharing for interleaved tampering and composition o...
-
24:24
non malleable secret sharing for general access structures
-
20:22
non malleable codes for space bounded tampering
-
40:52
eurocrypt 2023 session: non-malleable commitments and obfuscation
-
3:45
how vulnerable is the connected factory? new
-
25:06
shamir's secret sharing
-
30:13
non-malleable codes against constant split-state tampering
-
22:38
itc2020 pre-recording: leakage-resilient secret sharing in non-compartmentalized models
-
23:12
practical non-interactive publicly verifiable secret sharing with thousands of parties
-
22:05
traceable secret sharing and applications
-
22:40
lightweight, maliciously secure verifiable function secret sharing
-
26:46
black-box non-interactive non-malleable commitments
-
5:45
a new approach to efficient non-malleable zero-knowledge
-
24:19
interactive non-malleable codes (tcc 2019)
-
1:29:46
s-22: secret sharing and coding
-
2:06
the difference between symmetric and asymmetric algorithm #encryption essentials
-
10:57
11-2 secret sharing
-
25:07
continuous non-malleable codes
-
18:16
on the complexity of arithmetic secret sharing