YoVDO

Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2

Offered By: IEEE via YouTube

Tags

Cryptography Courses Secure Computation Courses Theoretical Computer Science Courses Indistinguishability Obfuscation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Delve into the advanced concepts of indistinguishability obfuscation in this second part of a comprehensive lecture series. Explore well-founded assumptions that form the basis for this cryptographic technique, gaining insights into its theoretical foundations and practical implications. Examine the latest research developments and potential applications in secure computation and cryptography.

Syllabus

Indistinguishability Obfuscation from Well Founded Assumptions Part 2


Taught by

IEEE FOCS: Foundations of Computer Science

Tags

Related Courses

Cryptography for Quantum Computers
Simons Institute via YouTube
Indistinguishability Obfuscation from Well Founded Assumptions - Part 1
IEEE via YouTube
Indistinguishability Obfuscation from Well Founded Assumptions - Part 3
IEEE via YouTube
Mutual Empowerment Between Circuit Obfuscation and Circuit Minimization
Simons Institute via YouTube
The Mathematics of Hiding Secrets in Software
International Mathematical Union via YouTube