YoVDO

Secure Computation Courses

SPDZ2k - Efficient MPC mod 2^k for Dishonest Majority
TheIACR via YouTube
Limits of Practical Sublinear Secure Computation
TheIACR via YouTube
Two-Round Multiparty Secure Computation from Minimal Assumptions
TheIACR via YouTube
Overlaying Conditional Circuit Clauses for Secure Computation
TheIACR via YouTube
JIMU Faster LEGO Based Secure Computation Using Additive Homomorphic Hashes
TheIACR via YouTube
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
TheIACR via YouTube
Improved Private Set Intersection against Malicious Adversaries
TheIACR via YouTube
Unconditional UC Secure Computation with Stronger Malicious PUFs
TheIACR via YouTube
Group Based Secure Computation - Optimizing Rounds, Communication, and Computation
TheIACR via YouTube
Constant Round Asynchronous Multi Party Computation Based on One Way Functions
TheIACR via YouTube
< Prev Page 7 Next >