Videos of Crypto 2009 Talks

Courtesy of Georg Lippold

01_John_Black_-_Crypto_2009_Welcome
01_John_Black_-_Crypto_2009_Welcome.mp4

02_Bart_Preneel_-_IACR_Welcome
02_Bart_Preneel_-_IACR_Welcome.mp4

03_Heninger--Shacham_-_Reconstructing_RSA_Private_Keys_from_Random_Key_Bits
03_Heninger--Shacham_-_Reconstructing_RSA_Private_Keys_from_Random_Key_Bits.mp4

05_Alwen--Dodis--Wichs_-_Leakage-Resilient_Public-Key_Cryptography_in_the_Bounded-Retrieval_Model
05_Alwen--Dodis--Wichs_-_Leakage-Resilient_Public-Key_Cryptography_in_the_Bounded-Retrieval_Model.mp4

06_Stevens--Sotirov--Appelbaum--Lenstra--Molnar--Osvik--Weger_-_Short_Chosen-Prefix_Collisions_for_MD5_and_the_Creation_of_a_Rogue_CA_Certificate
06_Stevens--Sotirov--Appelbaum--Lenstra--Molnar--Osvik--Weger_-_Short_Chosen-Prefix_Collisions_for_MD5_and_the_Creation_of_a_Rogue_CA_Certificate.mp4

07_Aoki--Sasaki_-_Meet-in-the-Middle_Preimage_Attacks_Against_Reduced_SHA-0_and_SHA-1
07_Aoki--Sasaki_-_Meet-in-the-Middle_Preimage_Attacks_Against_Reduced_SHA-0_and_SHA-1.mp4

08_Edward_Felten_-_Alice_and_Bob_go_to_Washington
08_Edward_Felten_-_Alice_and_Bob_go_to_Washington.mp4

09_Jarecki--Liu_-_Private_Mutual_Authentication_and_Conditional_Oblivious_Transfer
09_Jarecki--Liu_-_Private_Mutual_Authentication_and_Conditional_Oblivious_Transfer.mp4

10_Belenkiy--Camenisch--Chase--Kohlweiss--Lysyanskaya--Shacham_-_Non-Interactive_Randomizable_Proofs_and_Delegatable_Anonymous_Credentials
10_Belenkiy--Camenisch--Chase--Kohlweiss--Lysyanskaya--Shacham_-_Non-Interactive_Randomizable_Proofs_and_Delegatable_Anonymous_Credentials.mp4

11_Mironov--Pandey--Reingold--Vadhan_-_Computational_Differential_Privacy
11_Mironov--Pandey--Reingold--Vadhan_-_Computational_Differential_Privacy.mp4

12_Kalai--Raz_-_Probabilistically_Checkable_Arguments
12_Kalai--Raz_-_Probabilistically_Checkable_Arguments.mp4

13_Pass--Tseng--Wiktröm_-_On_the_Composition_of_Public-Coin_Zero-Knowledge_Protocols
13_Pass--Tseng--Wiktröm_-_On_the_Composition_of_Public-Coin_Zero-Knowledge_Protocols.mp4

14_Cramer--Damgård_-_On_the_Amortized_Complexity_of_Zero-Knowledge_Proofs
14_Cramer--Damgård_-_On_the_Amortized_Complexity_of_Zero-Knowledge_Proofs.mp4

15_Jens_Groth_-_Linear_Algebra_with_Sub-linear_Zero-Knowledge_Arguments
15_Jens_Groth_-_Linear_Algebra_with_Sub-linear_Zero-Knowledge_Arguments.mp4

16_Yuan--Wang--Jia--Xu--Wang_-_New_Birthday_Attacks_on_Some_MACs_Based_on_Block_Ciphers
16_Yuan--Wang--Jia--Xu--Wang_-_New_Birthday_Attacks_on_Some_MACs_Based_on_Block_Ciphers.mp4

17_Biryukov--Khovratovich--Nikolić_-_Distinguisher_and_Related-Key_Attack_on_the_Full_AES-256
17_Biryukov--Khovratovich--Nikolić_-_Distinguisher_and_Related-Key_Attack_on_the_Full_AES-256.mp4

18_Borghoff--Knudsen--Leander--Matusiewicz_-_Cryptanalysis_of_C2
18_Borghoff--Knudsen--Leander--Matusiewicz_-_Cryptanalysis_of_C2.mp4

19_Dodis--Steinberger_-_Constructing_MACs_using_blockciphers_that_are_only_secure_as_MACs
19_Dodis--Steinberger_-_Constructing_MACs_using_blockciphers_that_are_only_secure_as_MACs.mp4

20_Morris--Rogaway--Stegers_-_How_to_Encipher_Messages_on_a_Small_Domain
20_Morris--Rogaway--Stegers_-_How_to_Encipher_Messages_on_a_Small_Domain.mp4

21_Thomas_Icart_-_How_to_Hash_into_Elliptic_Curves
21_Thomas_Icart_-_How_to_Hash_into_Elliptic_Curves.mp4

22_Daniel_J._Bernstein_-_Batch_binary_Edwards
22_Daniel_J._Bernstein_-_Batch_binary_Edwards.mp4

23_Adi_Akavia_-_Solving_Hidden_Number_Problem_with_One_Bit_Oracle_and_Advice
23_Adi_Akavia_-_Solving_Hidden_Number_Problem_with_One_Bit_Oracle_and_Advice.mp4

24_Maurer--Tessaro_-_Computational_Indistinguishability_Amplification_-_Tight_Produc_Theorems_for_System_Composition
24_Maurer--Tessaro_-_Computational_Indistinguishability_Amplification_-_Tight_Produc_Theorems_for_System_Composition.mp4

25_Rump_Session_Part_1
25_Rump_Session_Part_1.mp4

26_Rump_Session_Part_2
26_Rump_Session_Part_2.mp4

27_Rump_Session_Part_3
27_Rump_Session_Part_3.mp4

28_Mahmoody-Ghidary--Barak_-_Merkle_Puzzles_are_Optimal
28_Mahmoody-Ghidary--Barak_-_Merkle_Puzzles_are_Optimal.mp4

29_Chandran--Goyal--Moriarty--Ostrovsky_-_Position_Based_Cryptography
29_Chandran--Goyal--Moriarty--Ostrovsky_-_Position_Based_Cryptography.mp4

30_Damgård--Fehr--Lunemann--Salvail--Schaffner_-_Improving_the_Security_of_Quantum_Protocols_via_Commit_and_Open
30_Damgård--Fehr--Lunemann--Salvail--Schaffner_-_Improving_the_Security_of_Quantum_Protocols_via_Commit_and_Open.mp4

31_Coron--Naccache--Tibouchi--Weinmann_-_Practical_Cryptanalysis_of_ISO_IEC_9796-2_and_EMV_Signatures
31_Coron--Naccache--Tibouchi--Weinmann_-_Practical_Cryptanalysis_of_ISO_IEC_9796-2_and_EMV_Signatures.mp4

33_Maurer_-_Abstraction_in_Cryptography
33_Maurer_-_Abstraction_in_Cryptography.mp4

34_Cascudo--Chen--Cramer--Xing_-_Asymptotically_Good_Ideal_LSSS_with_Strong_Multiplication_over_Any_Fixed_Finite_Field
34_Cascudo--Chen--Cramer--Xing_-_Asymptotically_Good_Ideal_LSSS_with_Strong_Multiplication_over_Any_Fixed_Finite_Field.mp4

35_Patra--Choudhary--Rabin--Rangan_-_The_Round_Complexity_of_Verifiable_Secret_Sharing_Re-Visited
35_Patra--Choudhary--Rabin--Rangan_-_The_Round_Complexity_of_Verifiable_Secret_Sharing_Re-Visited.mp4

36_Zhou--Garay--Wichs_-_Somewhat_Non-Committing_Encryption_and_Efficient_Adaptively_Secure_Oblivious_Transfer
36_Zhou--Garay--Wichs_-_Somewhat_Non-Committing_Encryption_and_Efficient_Adaptively_Secure_Oblivious_Transfer.mp4

37_Alwen--Katz--Lindell--Persiano--Shelat--Visconti_-_Collusion-Free_Multiparty_Computation_in_the_Mediated_Model
37_Alwen--Katz--Lindell--Persiano--Shelat--Visconti_-_Collusion-Free_Multiparty_Computation_in_the_Mediated_Model.mp4

38_Miltersen--Nielsen--Triandopoulos_-_Privacy-enhancing_auctions_using_rational_cryptography
38_Miltersen--Nielsen--Triandopoulos_-_Privacy-enhancing_auctions_using_rational_cryptography.mp4

39_Asharov--Lindell_-_Utility_Dependence_in_Correct_and_Fair_Rational_Secret_Sharing
39_Asharov--Lindell_-_Utility_Dependence_in_Correct_and_Fair_Rational_Secret_Sharing.mp4

40_Lyubashevsky--Micciancio_-_On_Bounded_Distance_Decoding,_Unique_Shortest_Vectors,_and_the_Minimum_Distance_Problem
40_Lyubashevsky--Micciancio_-_On_Bounded_Distance_Decoding,_Unique_Shortest_Vectors,_and_the_Minimum_Distance_Problem.mp4

41_Applebaum--Cash--Peikert--Sahai_-_Fast_Cryptographic_Primitives_and_Circular-Secure_Encryption_Based_on_Hard_Learning_Problems
41_Applebaum--Cash--Peikert--Sahai_-_Fast_Cryptographic_Primitives_and_Circular-Secure_Encryption_Based_on_Hard_Learning_Problems.mp4

43_Hofheinz--Kiltz_-_The_group_of_signed_quadratic_residues_and_applications
43_Hofheinz--Kiltz_-_The_group_of_signed_quadratic_residues_and_applications.mp4

45_Abdalla--Chevalier--Pointcheval_-_Smooth_Projective_Hashing_for_Conditionally_Extractable_Commitments
45_Abdalla--Chevalier--Pointcheval_-_Smooth_Projective_Hashing_for_Conditionally_Extractable_Commitments.mp4