Privacy-Preserving Technology Courses
TheIACR via YouTube Efficient Ring Signatures in the Standard Model
TheIACR via YouTube Unconditional UC Secure Computation with Stronger Malicious PUFs
TheIACR via YouTube Faster Secure Two Party Computation in the Single Execution Setting
TheIACR via YouTube Indistinguishable Proofs of Work or Knowledge
TheIACR via YouTube Reactive Garbling - Foundation, Instantiation, Application
TheIACR via YouTube TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
TheIACR via YouTube Malicious for Free OT Extension - The Pipe is the Limit
TheIACR via YouTube Indistinguishability Obfuscation from Compact Functional Encryption
TheIACR via YouTube Multiparty Computation with Low Communication
TheIACR via YouTube