YoVDO

Privacy-Preserving Technology Courses

Hardness of Non Interactive Differential Privacy from One Way Functions and Risky Traitor Tracing
TheIACR via YouTube
Efficient Ring Signatures in the Standard Model
TheIACR via YouTube
Unconditional UC Secure Computation with Stronger Malicious PUFs
TheIACR via YouTube
Faster Secure Two Party Computation in the Single Execution Setting
TheIACR via YouTube
Indistinguishable Proofs of Work or Knowledge
TheIACR via YouTube
Reactive Garbling - Foundation, Instantiation, Application
TheIACR via YouTube
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
TheIACR via YouTube
Malicious for Free OT Extension - The Pipe is the Limit
TheIACR via YouTube
Indistinguishability Obfuscation from Compact Functional Encryption
TheIACR via YouTube
Multiparty Computation with Low Communication
TheIACR via YouTube
< Prev Page 5 Next >