Breaking the Sub Exponential Barrier in Obfustopia
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a groundbreaking paper presented at Eurocrypt 2017 that challenges the sub-exponential barrier in obfuscation. Delve into the first candidate construction and its applications in indistinguishability obfuscation (IO). Examine the sub-exponential barrier and its implications. Discover key applications, including functional encryption and the FE2 IO transformation. Gain insights into the intuition behind the research and the key techniques employed. Learn about non-interactive key exchange and its relevance to the topic. Conclude with a comprehensive understanding of this significant advancement in cryptography and its potential impact on the field.
Syllabus
Introduction
First Candidate Construction
Applications of IO
Sub Exponential Barrier
Applications
Outline
Functional Encryption
Fe2 IO Transformation
Intuition
Key Technique
NonInteractive Key Exchange
Conclusion
Taught by
TheIACR
Related Courses
Save and Load Files with C# in UnityCoursera Project Network via Coursera Reverse Engineering 6: Reversing .NET with dnSpy
Udemy Reverse Engineering & Malware Analysis of .NET & Java
Udemy JavaScript: Security Essentials
LinkedIn Learning TypeScript Crash Course with Matt Pocock
Visual Studio Code via YouTube