YoVDO

Secure Computation Courses

Reactive Garbling - Foundation, Instantiation, Application
TheIACR via YouTube
Size-Hiding Computation for Multiple Parties
TheIACR via YouTube
On the Communication Required for Unconditionally Secure Multiplication
TheIACR via YouTube
Two Message Oblivious Evaluation of Cryptographic Functionalities
TheIACR via YouTube
TWORAM - Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
TheIACR via YouTube
Breaking the Circuit Size Barrier for Secure Computation Under DDH
TheIACR via YouTube
Adaptively Secure Garbled Circuits from One Way Functions
TheIACR via YouTube
Secure Computation from Elastic Noisy Channels
TheIACR via YouTube
The Exact Round Complexity of Secure Computation
TheIACR via YouTube
Secure Computation from Leaky Correlated Randomness
TheIACR via YouTube
< Prev Page 8 Next >