Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Privacy-Preserving Technology
YouTube
education
Showing:
61
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
TensorFlow
Federated Learning - Machine Learning on Decentralized Data
1
rewiews
Explore federated learning for privacy-preserving machine learning on decentralized data. Learn about its implementation in Google products and simulation using TensorFlow Federated.
Add to list
11
Lesons
41 minutes
On-Demand
Free-Video
Data Science Dojo
Pediatric Moonshot - Global, Real-Time, Privacy-Preserving Applications for Children's Medicine
0
rewiews
Exploring innovative AI applications in pediatric medicine using privacy-preserving, decentralized edge cloud technology to improve global healthcare equity and enable real-time diagnosis and treatment.
Add to list
25
Lesons
39 minutes
On-Demand
Free-Video
IEEE
Private Resource Allocators and Their Applications
0
rewiews
Introduces private resource allocators to prevent allocation-based side-channel attacks in systems like anonymous messaging, with various constructions offering different privacy guarantees and trade-offs in efficiency.
Add to list
16
Lesons
17 minutes
On-Demand
Free-Video
USENIX
A New Model for International, Privacy-Preserving Data Science
0
rewiews
Explore a groundbreaking approach to international data analysis using privacy-preserving technologies, enabling secure collaboration between statistical organizations without direct data access.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
ETHTaipei
Zero-Knowledge Development Tooling
0
rewiews
Explore the latest developments in zero-knowledge proof development tools and their practical applications in blockchain technology through insights from PSE's expert presentation.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
TheIACR
Privacy and Zero-Knowledge Proofs - Session Overview
0
rewiews
Explore privacy and Zero-Knowledge Proofs (ZKP) in this comprehensive session, covering fundamental concepts and advanced applications in cryptography and blockchain technology.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs - Advanced Concepts and Applications - Session 1 Continuation
0
rewiews
Explore cutting-edge developments in zero-knowledge proofs and their applications in cryptography at this advanced Eurocrypt 2023 session.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs - Session 1
0
rewiews
Explore cutting-edge research on zero-knowledge proofs and cryptographic protocols in this advanced session from a leading cryptography conference.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Oblivious Data Access - Session 1
0
rewiews
Explore cutting-edge research on oblivious data access techniques, enhancing privacy and security in cryptographic systems and applications.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Oblivious Transfer Advancements - Eurocrypt 2023 Session
0
rewiews
Explore advanced cryptographic techniques and latest research in oblivious transfer protocols, a fundamental building block for secure multiparty computation and privacy-preserving technologies.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
TheIACR
Oblivious Transfer - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge research on oblivious transfer protocols, a fundamental cryptographic primitive, presented by leading experts at the prestigious Eurocrypt 2023 conference.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
TheIACR
Fully Homomorphic Encryption - AC 2023 Session
0
rewiews
Explore cutting-edge advancements in fully homomorphic encryption at this IACR session, delving into secure computation techniques and their real-world applications.
Add to list
1
Lesons
1 hour 45 minutes
On-Demand
Free-Video
TheIACR
Secure Two-Party Computation - AC 2023 Partial Session
0
rewiews
Explore secure two-party computation techniques and advancements in cryptography, focusing on protecting data privacy during collaborative computations between parties.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation
0
rewiews
Explore multiparty computation concepts, including abstract circuits, applications, and communication complexity, with insights into motivation scenarios and new research developments.
Add to list
21
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Fast Large Scale Honest Majority MPC for Malicious Adversaries
0
rewiews
Explore advanced techniques for secure multi-party computation, focusing on fast, large-scale protocols resistant to malicious adversaries. Learn about cheating detection, optimization, and efficient sum-of-products computation.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
IEEE
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
0
rewiews
Explore transparent polynomial delegation for zero-knowledge proofs, including constructions, applications to verifiable secret sharing, and comparisons with other ZKP systems.
Add to list
13
Lesons
17 minutes
On-Demand
Free-Video
Data Science Dojo
Pediatric Moonshot - Global, Real-Time, Privacy-Preserving Applications for Children's Medicine
0
rewiews
Exploring decentralized AI applications in pediatric medicine to reduce healthcare inequity globally, using privacy-preserving edge cloud services for real-time data access from children's hospitals worldwide.
Add to list
16
Lesons
59 minutes
On-Demand
Free-Video
Simons Institute
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
0
rewiews
Explores innovative cryptographic solutions for private internet searches, combining efficient data structures with Ring LWE-based encryption to enable secure, scalable information retrieval.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Simons Institute
Efficient Zero-Knowledge Proofs: A Modular Approach
0
rewiews
Explore modular techniques for creating efficient zero-knowledge proofs, focusing on probabilistically checkable and interactive proof systems in cryptography.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
tinyML
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
0
rewiews
Innovative smartphone security: Deep Learning for quick impostor detection, preserving user privacy with on-device processing and minimal hardware support.
Add to list
13
Lesons
21 minutes
On-Demand
Free-Video
IEEE
Indistinguishability Obfuscation from Well-Founded Assumptions Tutorial
0
rewiews
Explore cutting-edge cryptography with experts as they delve into indistinguishability obfuscation, its foundations, and implications for secure computation and privacy-preserving technologies.
Add to list
1
Lesons
3 hours 16 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation with Low Communication
0
rewiews
Explore secure multiparty computation techniques with low communication and computational overhead, focusing on fully homomorphic encryption and threshold-based approaches.
Add to list
21
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Anonymous Credentials - Crypto 2023
0
rewiews
Explore cutting-edge research on anonymous credential systems at this Crypto 2023 session, featuring presentations on advanced cryptographic techniques for privacy-preserving authentication.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
TheIACR
MPC - Emerging Models in Cryptography - Session 1
0
rewiews
Explore cutting-edge developments in Multi-Party Computation (MPC) models presented at Crypto 2023, focusing on emerging trends and innovative approaches in cryptography.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
TheIACR
Succinct Proofs in Cryptography - TCC 2022 Session
0
rewiews
Explore cutting-edge research on succinct proofs in cryptography, featuring presentations from leading experts at the Theory of Cryptography Conference 2022.
Add to list
1
Lesons
1 hour 16 minutes
On-Demand
Free-Video
TheIACR
IO and ZK II - Advances in Input-Output Analysis and Zero-Knowledge Proofs
0
rewiews
Explore advanced concepts in Interactive Oracle Proofs and Zero-Knowledge systems, delving into cutting-edge cryptographic research and applications.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs - Session I
0
rewiews
Explore zero-knowledge proofs in cryptography, covering fundamental concepts, applications, and recent advancements in this cutting-edge field.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
TheIACR
Zero Knowledge Proofs: Advanced Concepts and Applications - Session 2
0
rewiews
Explore cutting-edge developments in zero-knowledge proofs at Asiacrypt 2022, featuring expert presentations on this crucial cryptographic technique.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
TheIACR
Lattice-Based Zero Knowledge Protocols - Session Overview
0
rewiews
Explore cutting-edge developments in lattice-based zero-knowledge proofs, a crucial cryptographic technique for privacy and security in modern digital systems.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
TheIACR
Randomness in Cryptography - Session Overview
0
rewiews
Explore cutting-edge research on randomness in cryptography, featuring presentations from leading experts at the prestigious Crypto 2022 conference.
Add to list
1
Lesons
1 hour 35 minutes
On-Demand
Free-Video
TheIACR
SNARKs, NIZKs, and Key Exchange - Session 20
0
rewiews
Explore SNARKs, NIZKs, and key exchange protocols in cryptography, focusing on their applications, security properties, and implementation challenges.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Linux Foundation
Using Blockchain and Cryptography to Enable Privacy-preserving and Inclusive Financial Services
0
rewiews
Explore blockchain and cryptography for privacy-preserving financial services. Learn about data renting, secure joint computation, and real-world applications in inclusive banking and targeted marketing.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
Paul G. Allen School
ZK-PCPs from Leakage-Resilient Secret Sharing - 2021 ITC Conference
0
rewiews
Explore cutting-edge cryptography research on ZK-PCPs derived from leakage-resilient secret sharing. Learn about innovative constructions combining the best aspects of zero-knowledge proofs and probabilistically checkable proofs.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Fully Homomorphic Encryption
0
rewiews
Explore cutting-edge advancements in Fully Homomorphic Encryption at Eurocrypt 2024, featuring expert presentations on this revolutionary cryptographic technique for secure data processing.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
DevConf
Homomorphic Encryption: Enhancing Data Privacy in Open Source - DevConf.CZ 2023
0
rewiews
Explore homomorphic encryption's role in data privacy, comparing open-source tools and examining its impact on secure data sharing and AI applications.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
USENIX
XRD - Scalable Messaging System with Cryptographic Privacy
0
rewiews
Scalable messaging system offering cryptographic privacy, using parallel mix networks and novel techniques to support millions of users with low latency while protecting communication metadata.
Add to list
13
Lesons
22 minutes
On-Demand
Free-Video
IEEE
Path Oblivious Heap - Optimal and Practical Oblivious Priority Queue
0
rewiews
Explore an innovative, efficient oblivious priority queue algorithm with optimal performance and practical applications in secure data structures and sorting.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
USENIX
ReClaim - A Privacy-Preserving Decentralized Social Network
0
rewiews
Explore ReClaim, a decentralized social network that prioritizes privacy through homomorphic encryption and peer-to-peer connections, enabling secure communication and data sharing without centralized control.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
IEEE
SoK - A Critical Evaluation of Efficient Website Fingerprinting Defenses
0
rewiews
Evaluates efficient defenses against website fingerprinting attacks, analyzing their effectiveness and trade-offs to enhance online privacy and security.
Add to list
1
Lesons
16 minutes
On-Demand
Free-Video
IEEE
Deep Perceptual Hashing Algorithms With Hidden Dual Purpose - Client-Side Scanning Facial Recognition
0
rewiews
Explore hidden capabilities of deep perceptual hashing algorithms, focusing on client-side scanning and facial recognition applications in this cutting-edge IEEE presentation.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
IEEE
ShorTor - Improving Tor Network Latency via Multi-hop Overlay Routing
0
rewiews
Explore innovative techniques to enhance Tor network performance through multi-hop overlay routing, reducing latency and improving user experience while maintaining anonymity.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
USENIX
zkSaaS - Zero-Knowledge SNARKs as a Service
0
rewiews
Explore zkSaaS, a framework for faster zk-SNARK computation by distributing proof generation across multiple servers while preserving privacy and achieving significant speed-ups.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
USENIX
Duoram - A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
0
rewiews
Innovative distributed ORAM protocol for secure computation, offering significant bandwidth efficiency and performance improvements through novel vector dot product evaluation techniques.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
TheIACR
Indistinguishability Obfuscation from Compact Functional Encryption
0
rewiews
Explore advanced cryptography concepts including indistinguishability obfuscation, compact functional encryption, and multi-input functional encryption. Delve into arity amplification and function privacy in secret key settings.
Add to list
15
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Malicious for Free OT Extension - The Pipe is the Limit
0
rewiews
Explore oblivious transfer extensions, from basic concepts to advanced implementations, focusing on security, efficiency, and practical applications in cryptographic protocols.
Add to list
13
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
0
rewiews
Explore efficient oblivious RAM techniques, their applications in searchable encryption, and advancements in non-interactive ORAM, focusing on the TWORAM algorithm and its impact on adaptive computation.
Add to list
10
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Reactive Garbling - Foundation, Instantiation, Application
0
rewiews
Explore reactive garbling schemes, their foundations, implementations, and applications in cryptography. Learn about secure computation techniques and their practical uses.
Add to list
21
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Indistinguishable Proofs of Work or Knowledge
0
rewiews
Explore privacy-preserving proofs of work/knowledge, pricing functions, and cryptographic puzzles. Learn about innovative algorithms and applications in this cutting-edge cryptography talk.
Add to list
12
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Faster Secure Two Party Computation in the Single Execution Setting
0
rewiews
Explore advanced techniques for faster and more secure two-party computation, focusing on single execution settings and improvements to existing protocols.
Add to list
14
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Unconditional UC Secure Computation with Stronger Malicious PUFs
0
rewiews
Explore unconditional UC secure computation using stronger malicious PUFs, as presented at Eurocrypt 2017. Learn about advancements in cryptographic protocols and their implications.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Efficient Ring Signatures in the Standard Model
0
rewiews
Explore efficient ring signatures in the standard model, enhancing privacy and security in cryptographic protocols without relying on random oracles.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Hardness of Non Interactive Differential Privacy from One Way Functions and Risky Traitor Tracing
0
rewiews
Explore cryptographic techniques for differential privacy and traitor tracing, examining their hardness and implications for data security and privacy protection.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
SPDZ2k - Efficient MPC mod 2^k for Dishonest Majority
0
rewiews
Efficient multiparty computation protocol for dishonest majority settings, operating modulo 2^k. Presents novel techniques for secure computation with improved efficiency.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Private Circuits - A Modular Approach
0
rewiews
Explore modular approaches to private circuits, focusing on cryptographic techniques for secure computation and data protection in various applications.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
A Simple Obfuscation Scheme for Pattern Matching with Wildcards
0
rewiews
Explore a novel obfuscation scheme for pattern matching with wildcards, presented at Crypto 2018, offering insights into cryptographic techniques and their applications.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Non Interactive Zero Knowledge Proofs for Composite Statements
0
rewiews
Explore advanced zero-knowledge proofs for composite statements, covering Sigma protocols, garbled circuits, and SNARK constructions. Learn about privacy-preserving credentials and RSA signatures.
Add to list
18
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Advanced Cryptography Applications and Standards 2020
0
rewiews
Explore privacy-preserving tech and advanced cryptography trends through expert presentations and a fireside chat on deployment challenges and latest innovations.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation
0
rewiews
Explore secure multiparty computation techniques for collaborative data analysis while preserving privacy in distributed settings.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
Confidential Computing Consortium
Super Protocol Tech Overview
0
rewiews
Explore the technical aspects and architecture of Super Protocol, a confidential computing solution for secure data processing and privacy protection.
Add to list
1
Lesons
28 minutes
On-Demand
Free-Video
LF Decentralized Trust
AnonCreds Working Group Meeting - May 13, 2024
0
rewiews
Explore AnonCreds developments: revocation specs, BBS libraries, W3C VC-DI-BBS updates, and AnonCreds v2 BBS support. Gain insights into decentralized trust advancements.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Toronto Machine Learning Series (TMLS)
Federated Learning: Unlocking the Value of Distributed Data
0
rewiews
Explore federated learning to leverage distributed data for robust machine learning models without centralizing sensitive information. Learn benefits, challenges, and practical applications.
Add to list
1
Lesons
1 hour 35 minutes
On-Demand
Free-Video
load more...