Secure Computation Courses
TheIACR via YouTube Limits of Practical Sublinear Secure Computation
TheIACR via YouTube Two-Round Multiparty Secure Computation from Minimal Assumptions
TheIACR via YouTube Overlaying Conditional Circuit Clauses for Secure Computation
TheIACR via YouTube JIMU Faster LEGO Based Secure Computation Using Additive Homomorphic Hashes
TheIACR via YouTube Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
TheIACR via YouTube Improved Private Set Intersection against Malicious Adversaries
TheIACR via YouTube Unconditional UC Secure Computation with Stronger Malicious PUFs
TheIACR via YouTube Group Based Secure Computation - Optimizing Rounds, Communication, and Computation
TheIACR via YouTube Constant Round Asynchronous Multi Party Computation Based on One Way Functions
TheIACR via YouTube