Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Secure Computation
YouTube
education
Showing:
119
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Bill Buchanan OBE
World-leaders in Cryptography - Phillip Rogaway
0
rewiews
Dive into the groundbreaking work of cryptography pioneer Phillip Rogaway, exploring his contributions to random oracles, symmetric key modes, and ethical considerations in the field.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
Paul G. Allen School
Innovations in Theoretical Computer Science 2020 - Session 8
0
rewiews
Explore cutting-edge research in theoretical computer science, including cryptography, obfuscation, and secure computation. Gain insights into novel concepts and techniques shaping the field.
Add to list
1
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Paul G. Allen School
Innovations in Theoretical Computer Science 2020 - Session 5
0
rewiews
Explore cutting-edge research in theoretical computer science, including secure computation, communication protocols, coding theory, and fault-tolerant algorithms presented at ITCS 2020.
Add to list
1
Lesons
1 hour 36 minutes
On-Demand
Free-Video
TheIACR
Privacy and Zero-Knowledge Proofs - Session Overview
0
rewiews
Explore privacy and Zero-Knowledge Proofs (ZKP) in this comprehensive session, covering fundamental concepts and advanced applications in cryptography and blockchain technology.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
TheIACR
MPC Round Efficiency - Session 2
0
rewiews
Explore cutting-edge advancements in Multi-Party Computation round efficiency at this Crypto 2023 session, chaired by Antigoni Polychroniadou.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
TheIACR
Oblivious Random Access Memory (ORAM) - Session 1
0
rewiews
Explore cutting-edge developments in Oblivious Random Access Memory (ORAM) presented at Crypto 2023, featuring innovative research and insights from leading cryptography experts.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
TheIACR
ORAM 2 - Oblivious Random Access Memory Advancements
0
rewiews
Explore cutting-edge developments in Oblivious Random Access Memory (ORAM) technology at this Crypto 2023 session, chaired by Niv Gilboa.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
TheIACR
Fully Homomorphic Encryption - AC 2023 Session
0
rewiews
Explore cutting-edge advancements in fully homomorphic encryption at this IACR session, delving into secure computation techniques and their real-world applications.
Add to list
1
Lesons
1 hour 45 minutes
On-Demand
Free-Video
TheIACR
On Black-Box Knowledge-Sound Commit-and-Prove SNARKs
0
rewiews
Explore cutting-edge research on Black-Box Knowledge-Sound Commit-And-Prove SNARKs in this remote presentation from Asiacrypt 2023, delving into advanced cryptographic concepts.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Simple Threshold Fully Homomorphic Encryption From LWE With Polynomial Modulus - Asiacrypt 2023
0
rewiews
Explore a novel approach to threshold encryption using LWE with polynomial modulus, offering insights into advanced cryptographic techniques and their applications.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Compressing Vector OLE
0
rewiews
Explore secure two-party protocols for vector oblivious linear evaluation, its applications, and improvements in pseudorandom correlations and sparse vector-OLE generation.
Add to list
13
Lesons
28 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Secure Outsourced Matrix Computation and Application to Neural Networks
0
rewiews
Explore practical solutions for encrypted matrix operations in homomorphic encryption, including novel encoding methods and efficient evaluation strategies for basic matrix arithmetic and neural networks.
Add to list
11
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation 2
0
rewiews
Explore advanced multiparty computation techniques, including stacked garbling and improved primitives, in this in-depth presentation and discussion.
Add to list
7
Lesons
39 minutes
On-Demand
Free-Video
TheIACR
Blazing Fast OT for Three-Round UC OT Extension
0
rewiews
Explore a novel three-round UC OT extension protocol, offering improved efficiency and security for secure two-party computation in cryptographic applications.
Add to list
14
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Secure Computation
0
rewiews
Explore resource-restricted cryptography, efficient constructions, and secure computation techniques in this comprehensive overview of advanced cryptographic concepts.
Add to list
10
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
Cryptographic Protocols and Secure Computation I
0
rewiews
Explore cryptographic protocols, secure computation, and their applications in communication. Delve into PRFs, gap assumptions, and two-party computation concepts.
Add to list
12
Lesons
1 hour 7 minutes
On-Demand
Free-Video
TheIACR
Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin
0
rewiews
Explores advanced cryptographic techniques for secure attribute-based encryption in arithmetic branching programs, focusing on adaptive security and efficiency improvements.
Add to list
15
Lesons
30 minutes
On-Demand
Free-Video
TheIACR
Succinct Non-Interactive Secure Computation
0
rewiews
Explore cutting-edge advancements in secure two-party computation, focusing on non-interactive protocols and achieving malicious security while maintaining succinctness.
Add to list
11
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
Fast Large Scale Honest Majority MPC for Malicious Adversaries
0
rewiews
Explore advanced techniques for secure multi-party computation, focusing on fast, large-scale protocols resistant to malicious adversaries. Learn about cheating detection, optimization, and efficient sum-of-products computation.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
IEEE
SecFloat- Accurate Floating-Point Meets Secure 2-Party Computation
0
rewiews
Explore SecFloat, a novel approach combining accurate floating-point arithmetic with secure two-party computation, enhancing privacy-preserving data analysis and machine learning.
Add to list
10
Lesons
16 minutes
On-Demand
Free-Video
IEEE
GraphSC: Parallel Secure Computation Made Easy
0
rewiews
Parallel secure computation framework for efficient, oblivious execution of graph-based algorithms on large datasets, enabling practical big data analysis with minimal privacy leakage.
Add to list
13
Lesons
16 minutes
On-Demand
Free-Video
Alan Turing Institute
Secure Computation with RAMs - Dr. Mariana Raykova, Yale University
0
rewiews
Explore secure computation techniques for protecting private data, including ORAM constructions and encrypted search schemes. Learn about cryptographic advancements for efficient and privacy-preserving data processing.
Add to list
23
Lesons
57 minutes
On-Demand
Free-Video
Alan Turing Institute
Privacy-Preserving Information Sharing - Tools and Applications
0
rewiews
Explore privacy-preserving techniques for secure information sharing, including two-party computation, private set intersection, and authorized PSI, with applications in collaborative anomaly detection.
Add to list
25
Lesons
1 hour 16 minutes
On-Demand
Free-Video
Simons Institute
FHE and Private Set Intersection
0
rewiews
Explore advanced cryptographic techniques for secure data comparison, focusing on Private Set Intersection and Fully Homomorphic Encryption applications in contact discovery.
Add to list
19
Lesons
53 minutes
On-Demand
Free-Video
Simons Institute
Homomorphic Encryption in the SPDZ Protocol for MPC
0
rewiews
Explore homomorphic encryption in SPDZ protocol for secure multi-party computation, covering threshold encryption, distributed decryption, and zero-knowledge proofs for improved security and efficiency.
Add to list
23
Lesons
54 minutes
On-Demand
Free-Video
Simons Institute
Geometry of Secure Computation
0
rewiews
Explore the geometric framework for secure computation, focusing on round and communication complexity for randomized-output functions. Learn about innovative approaches to long-standing cryptography challenges.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
IEEE
Indistinguishability Obfuscation from Well-Founded Assumptions Tutorial
0
rewiews
Explore cutting-edge cryptography with experts as they delve into indistinguishability obfuscation, its foundations, and implications for secure computation and privacy-preserving technologies.
Add to list
1
Lesons
3 hours 16 minutes
On-Demand
Free-Video
IEEE
Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2
0
rewiews
Explore advanced cryptographic concepts and techniques related to indistinguishability obfuscation, building on foundational assumptions in the field.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Multiparty Computation with Low Communication
0
rewiews
Explore secure multiparty computation techniques with low communication and computational overhead, focusing on fully homomorphic encryption and threshold-based approaches.
Add to list
21
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Secure Computation on the Web- Computing without Simultaneous Interaction
0
rewiews
Explore secure computation in client-server models, addressing limitations and presenting practical protocols for web-based scenarios without simultaneous client interaction.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
On the Feasibility of Consistent Computations
0
rewiews
Explore the feasibility of consistent computations in cryptography, covering privacy, two-party security models, and complaint handling, with insights on construction and simulation.
Add to list
15
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
The IPS Compiler - Optimizations, Variants and Concrete Efficiency
0
rewiews
Explore optimizations, variants, and concrete efficiency of the IPS compiler for secure multi-party computation protocols, focusing on improved watchlist setup and covert adversary security.
Add to list
17
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Threshold Cryptography 2
0
rewiews
Explore advanced concepts in threshold cryptography, focusing on cutting-edge research and applications presented at a leading cryptography conference.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Efficient Fully Homomorphic Encryption - Crypto 2023
0
rewiews
Explore cutting-edge advancements in Fully Homomorphic Encryption (FHE) and its efficient implementations, as presented at the Crypto 2023 conference.
Add to list
1
Lesons
1 hour 15 minutes
On-Demand
Free-Video
TheIACR
MPC - Emerging Models in Cryptography - Session 1
0
rewiews
Explore cutting-edge developments in Multi-Party Computation (MPC) models presented at Crypto 2023, focusing on emerging trends and innovative approaches in cryptography.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
TheIACR
MPC - Emerging Models in Cryptography - Session 2
0
rewiews
Explore cutting-edge developments in Multi-Party Computation (MPC) and emerging models presented at Crypto 2023, offering insights into advanced cryptographic techniques and protocols.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
TheIACR
Privacy Preserving AI in Cryptography - Round Table Discussion
0
rewiews
Explore privacy-preserving AI techniques in this roundtable discussion from the Glowing Hot Topics in Cryptography workshop, focusing on the intersection of cryptography and artificial intelligence.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
TheIACR
Crypto Intersects AI - Round Table Discussion
0
rewiews
Explore the intersection of cryptography and AI in this roundtable discussion from the Glowing Hot Topics in Cryptography workshop, featuring expert insights on emerging trends and challenges.
Add to list
1
Lesons
1 hour 21 minutes
On-Demand
Free-Video
TheIACR
Privacy-Preserving Machine Learning Workshop 2023 - Contributed Talks Session II
0
rewiews
Explore cutting-edge research in privacy-preserving machine learning through expert presentations at the PPML 2023 workshop, covering innovative techniques and applications in the field.
Add to list
1
Lesons
1 hour 50 minutes
On-Demand
Free-Video
TheIACR
Privacy-Preserving Machine Learning - Invited and Contributed Talks
0
rewiews
Explore privacy-preserving machine learning with expert Mariana Raykova and contributed talks from PPML 2023, covering cutting-edge research and advancements in secure AI and data protection.
Add to list
1
Lesons
1 hour 26 minutes
On-Demand
Free-Video
TheIACR
Privacy-Preserving Machine Learning Workshop - Invited and Contributed Talks
0
rewiews
Explore cutting-edge research in privacy-preserving machine learning with expert talks and contributions at PPML 2023, covering innovative techniques and advancements in the field.
Add to list
1
Lesons
1 hour 28 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs - Session I
0
rewiews
Explore zero-knowledge proofs in cryptography, covering fundamental concepts, applications, and recent advancements in this cutting-edge field.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
TheIACR
Garbling Schemes and Oblivious Transfer - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge cryptographic techniques in garbling schemes and oblivious transfer, advancing secure computation and privacy-preserving protocols in this advanced research session.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Secure Multi-Party Computation and Secret Sharing - Session 1 and 2
0
rewiews
Explore the fundamentals of Multi-Party Computation and Secret Sharing techniques in cryptography, including key concepts, applications, and recent advancements in the field.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
TheIACR
Fully Homomorphic Encryption and Indistinguishability Obfuscation - Session 7
0
rewiews
Explore fully homomorphic encryption (FHE) and its applications in input/output operations, focusing on advanced cryptographic techniques and their practical implementations.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
TheIACR
Homomorphic Encryption Advances - Asiacrypt 2022 Session
0
rewiews
Explore cutting-edge advancements in homomorphic encryption, a cryptographic technique enabling secure computations on encrypted data, presented by leading experts at Asiacrypt 2022.
Add to list
1
Lesons
1 hour 44 minutes
On-Demand
Free-Video
TheIACR
Proof Systems in Cryptography
0
rewiews
Explore cutting-edge developments in cryptographic proof systems at this Crypto 2022 session, featuring expert presentations and discussions on advanced theoretical concepts.
Add to list
1
Lesons
1 hour 37 minutes
On-Demand
Free-Video
TheIACR
Homomorphic Cryptography and Other Topics - PKC 2023 Session
0
rewiews
Explore cutting-edge developments in homomorphic cryptography and related fields, advancing your understanding of secure computation and data privacy techniques.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
TheIACR
IOPs and Succinctness in Cryptography
0
rewiews
Explore cutting-edge research on Interactive Oracle Proofs and succinct cryptographic protocols, presented at the Theory of Cryptography Conference 2023.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
TheIACR
Multi-Party Computation for General Functionalities and Functional Encryption - Session 2
0
rewiews
Explore advanced cryptographic techniques in multi-party computation and functional encryption, focusing on cutting-edge research and applications in secure data processing and privacy-preserving computations.
Add to list
1
Lesons
1 hour 34 minutes
On-Demand
Free-Video
TheIACR
MPC for General Functionalities - Part 2
0
rewiews
Explore advanced secure multi-party computation techniques for general functionalities in this Asiacrypt 2023 session, chaired by Siu Ming Yiu.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
TheIACR
Functional Encryption - Session 1
0
rewiews
Explore advanced cryptographic techniques and latest research in functional encryption, presented by leading experts at a major international cryptology conference.
Add to list
1
Lesons
1 hour 38 minutes
On-Demand
Free-Video
Paul G. Allen School
Perfectly Oblivious RAM and Parallel RAM Revisited - Improved Constructions
0
rewiews
Explore novel constructions and asymptotic improvements in perfect ORAM/OPRAM performance metrics. Gain insights into advanced cryptographic techniques and their applications.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
Paul G. Allen School
ZK-PCPs from Leakage-Resilient Secret Sharing - 2021 ITC Conference
0
rewiews
Explore cutting-edge cryptography research on ZK-PCPs derived from leakage-resilient secret sharing. Learn about innovative constructions combining the best aspects of zero-knowledge proofs and probabilistically checkable proofs.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
GOTO Conferences
Computing on Encrypted Data - It's a Kind of Magic
0
rewiews
Explore practical applications of computing on encrypted data, including cross-organizational data collaboration, through demonstrations and real-world use cases. Learn about the magic of ciphertext computation.
Add to list
8
Lesons
31 minutes
On-Demand
Free-Video
TheIACR
NIZK and SNARKs - Asiacrypt 2021
0
rewiews
Explore advanced cryptographic techniques like NIZKs and SNARKs, covering topics such as universal zkSNARKs, non-adaptive soundness, inner pairing products, and efficient proofs for algebraic sets.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
TheIACR
Opening Remarks and Best Paper Award - Eurocrypt 2022
0
rewiews
Welcome and best paper presentation at Eurocrypt 2022, featuring remarks from officials and an award-winning talk on practical Garbled RAM implementation called EpiGRAM.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
Simons Institute
Information Theoretic MPC - Techniques That Age Well
0
rewiews
Explore cutting-edge techniques in Information Theoretic Multi-Party Computation, focusing on enduring methods that remain relevant and effective over time.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Fully Homomorphic Encryption
0
rewiews
Explore cutting-edge advancements in Fully Homomorphic Encryption at Eurocrypt 2024, featuring expert presentations on this revolutionary cryptographic technique for secure data processing.
Add to list
1
Lesons
1 hour 12 minutes
On-Demand
Free-Video
TheIACR
Garbled Circuits - Eurocrypt 2024
0
rewiews
Explore cutting-edge cryptographic techniques and advancements in garbled circuits at this Eurocrypt 2024 session, chaired by Peter Scholl.
Add to list
1
Lesons
1 hour 19 minutes
On-Demand
Free-Video
IEEE
Scalable Verification of Zero Knowledge Protocols
0
rewiews
Explore scalable verification techniques for zero-knowledge protocols, enhancing efficiency and security in cryptographic systems.
Add to list
1
Lesons
19 minutes
On-Demand
Free-Video
NorthSec
Path to Software-Defined Cryptography via Multi-Party Computation
0
rewiews
Exploring software-defined cryptography through multi-party computation, addressing enterprise key management challenges and enabling innovation in data protection and privacy.
Add to list
21
Lesons
52 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Building a Secure Data Market on Blockchain - USENIX Enigma 2019
0
rewiews
Explore blockchain-based secure data markets for privacy-preserving analytics and machine learning, addressing challenges and showcasing real-world applications in healthcare and beyond.
Add to list
16
Lesons
23 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Secure Stable Matching at Scale
0
rewiews
Explore secure stable matching algorithms for large-scale applications, focusing on privacy preservation and efficient computation in scenarios like medical residency matching.
Add to list
14
Lesons
27 minutes
On-Demand
Free-Video
USENIX
GAZELLE - A Low Latency Framework for Secure Neural Network Inference
0
rewiews
Efficient framework for secure neural network inference combining homomorphic encryption and two-party computation, outperforming existing systems in speed while preserving privacy for cloud-based machine learning.
Add to list
11
Lesons
27 minutes
On-Demand
Free-Video
USENIX
MAGE - Nearly Zero-Cost Virtual Memory for Secure Computation
0
rewiews
MAGE: An execution engine for secure computation, enabling efficient processing of large-scale encrypted data by leveraging oblivious memory access patterns to optimize virtual memory management.
Add to list
18
Lesons
15 minutes
On-Demand
Free-Video
IEEE
Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation
0
rewiews
Explores modifications to square-root ORAM for efficient random access in multi-party computation, offering significant performance improvements over existing approaches for various applications.
Add to list
1
Lesons
14 minutes
On-Demand
Free-Video
IEEE
SoK - Cryptographic Neural-Network Computation
0
rewiews
Explore cryptographic techniques for secure neural network computation, focusing on privacy-preserving methods and their applications in machine learning.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
0
rewiews
Explore high-throughput secure three-party computation with an honest majority in this presentation on advanced cryptographic protocols and their practical applications.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Amortizing Secure Computation with Penalties
0
rewiews
Explore secure computation with penalties, focusing on amortization techniques to enhance efficiency in cryptographic protocols for multi-party computations.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Improvements to Secure Computation
0
rewiews
Explore advancements in secure computation techniques, focusing on enhanced privacy and efficiency in multi-party protocols presented at the ACM CCS 2016 conference.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
IEEE
ObliVM - A Programming Framework for Secure Computation
0
rewiews
Explore ObliVM, a framework for secure computation offering a domain-specific language, user-friendly abstractions, and efficient oblivious representations for various applications like data mining and genomic analysis.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
USENIX
Duoram - A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation
0
rewiews
Innovative distributed ORAM protocol for secure computation, offering significant bandwidth efficiency and performance improvements through novel vector dot product evaluation techniques.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
TheIACR
Collusion-Preserving Computation
0
rewiews
Explore collusion-preserving computation, its definition, related work, criticism, security aspects, and applications in game theory.
Add to list
12
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Non-Interactive Secure Multiparty Computation
0
rewiews
Explore non-interactive secure multiparty computation, covering basic concepts, extensions, and applications. Learn about multi-input functional encryption and fully-robust NIMPC for various functions.
Add to list
10
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
How to Use Bitcoin to Design Fair Protocols
0
rewiews
Learn to design fair protocols using Bitcoin, exploring concepts like fair exchange, claim-or-refund functionality, and secure computation with penalties in this cryptography-focused talk.
Add to list
15
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Leakage-Tolerant Computation with Input-Independent Preprocessing
0
rewiews
Explore leakage-tolerant computation techniques with input-independent preprocessing, focusing on multi-party computation models and innovative encoding methods for enhanced security.
Add to list
17
Lesons
20 minutes
On-Demand
Free-Video
TheIACR
Concurrent Secure Computation with Optimal Query Complexity
0
rewiews
Explore concurrent secure computation, focusing on optimal query complexity, circumventing impossibility results, and improving simulation techniques in cryptographic protocols.
Add to list
17
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
0
rewiews
Learn efficient techniques for secure multi-party computation, combining BMR and SPDZ approaches to achieve constant-round protocols with improved performance and security guarantees.
Add to list
17
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Secure Computation with Minimal Interaction, Revisited
0
rewiews
Explore advanced techniques for secure computation with minimal interaction, revisiting key concepts and presenting new insights in cryptography and data privacy.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Efficient Multi Party Computation - From Passive to Active Security via Secure SIMD Circuits
0
rewiews
Explore advanced techniques in multi-party computation, focusing on the transition from passive to active security through secure SIMD circuits.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Large Scale Secure Computation - Multi Party Computation for Parallel RAM Programs
0
rewiews
Explore secure multi-party computation techniques for parallel RAM programs, focusing on large-scale applications and advanced cryptographic protocols.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Incoercible Multi Party Computation and Universally Composable Receipt Free Voting
0
rewiews
Explore incoercible multi-party computation and its application in creating universally composable, receipt-free voting systems for enhanced election integrity.
Add to list
7
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Secure Computation from Leaky Correlated Randomness
0
rewiews
Explore advanced cryptographic techniques for secure computation using leaky correlated randomness, enhancing privacy and security in distributed systems.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
The Exact Round Complexity of Secure Computation
0
rewiews
Explore the precise round complexity in secure computation, examining theoretical foundations and practical implications for cryptographic protocols.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Secure Computation from Elastic Noisy Channels
0
rewiews
Explore secure computation using elastic noisy channels, covering ideal and real-world scenarios, unfair noisy channels, elastic erasure channels, and elastic binary symmetric channels.
Add to list
17
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Adaptively Secure Garbled Circuits from One Way Functions
0
rewiews
Explore adaptive security in garbled circuits, examining complexity, hybrid approaches, and encryption strategies for enhanced cryptographic protocols.
Add to list
8
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Breaking the Circuit Size Barrier for Secure Computation Under DDH
0
rewiews
Explore secure computation techniques breaking circuit size barriers, including homomorphic encryption and secret sharing, with applications in branching programs and two-party computation.
Add to list
19
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
0
rewiews
Explore efficient oblivious RAM techniques, their applications in searchable encryption, and advancements in non-interactive ORAM, focusing on the TWORAM algorithm and its impact on adaptive computation.
Add to list
10
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Two Message Oblivious Evaluation of Cryptographic Functionalities
0
rewiews
Explore secure two-message protocols for oblivious evaluation of cryptographic functions, enhancing privacy and efficiency in multi-party computations.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
On the Communication Required for Unconditionally Secure Multiplication
0
rewiews
Explore unconditionally secure multiplication protocols, analyzing communication requirements and theoretical implications in cryptographic systems.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Size-Hiding Computation for Multiple Parties
0
rewiews
Explore secure multi-party computation techniques for hiding data sizes, with applications in privacy-preserving data analysis and secure information sharing protocols.
Add to list
15
Lesons
28 minutes
On-Demand
Free-Video
TheIACR
Reactive Garbling - Foundation, Instantiation, Application
0
rewiews
Explore reactive garbling schemes, their foundations, implementations, and applications in cryptography. Learn about secure computation techniques and their practical uses.
Add to list
21
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Constant Round Asynchronous Multi Party Computation Based on One Way Functions
0
rewiews
Explore constant-round asynchronous multi-party computation protocols using one-way functions, enhancing secure distributed computing in asynchronous networks.
Add to list
1
Lesons
27 minutes
On-Demand
Free-Video
TheIACR
Group Based Secure Computation - Optimizing Rounds, Communication, and Computation
0
rewiews
Explore optimizations for group-based secure computation, focusing on rounds, communication, and computation efficiency. Learn about homomorphic secret sharing and cryptographic frameworks.
Add to list
14
Lesons
26 minutes
On-Demand
Free-Video
TheIACR
Unconditional UC Secure Computation with Stronger Malicious PUFs
0
rewiews
Explore unconditional UC secure computation using stronger malicious PUFs, as presented at Eurocrypt 2017. Learn about advancements in cryptographic protocols and their implications.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
TheIACR
Improved Private Set Intersection against Malicious Adversaries
0
rewiews
Explore advanced techniques for secure private set intersection, focusing on enhanced protection against malicious adversaries in cryptographic protocols.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
0
rewiews
Explore advanced cryptographic techniques for secure oblivious linear function evaluation, focusing on malicious security and constant overhead improvements.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
JIMU Faster LEGO Based Secure Computation Using Additive Homomorphic Hashes
0
rewiews
Explore a novel secure computation technique using additive homomorphic hashes, enhancing LEGO-based protocols for improved efficiency and security in cryptographic applications.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Overlaying Conditional Circuit Clauses for Secure Computation
0
rewiews
Explore innovative techniques for enhancing secure computation through conditional circuit clause overlays, improving efficiency and functionality in cryptographic protocols.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
load more...