Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2
Offered By: IEEE via YouTube
Course Description
Overview
Delve into the advanced concepts of indistinguishability obfuscation in this second part of a comprehensive lecture series. Explore well-founded assumptions that form the basis for this cryptographic technique, gaining insights into its theoretical foundations and practical implications. Examine the latest research developments and potential applications in secure computation and cryptography.
Syllabus
Indistinguishability Obfuscation from Well Founded Assumptions Part 2
Taught by
IEEE FOCS: Foundations of Computer Science
Tags
Related Courses
Cryptography for Quantum ComputersSimons Institute via YouTube Indistinguishability Obfuscation from Well Founded Assumptions - Part 1
IEEE via YouTube Indistinguishability Obfuscation from Well Founded Assumptions - Part 3
IEEE via YouTube Mutual Empowerment Between Circuit Obfuscation and Circuit Minimization
Simons Institute via YouTube The Mathematics of Hiding Secrets in Software
International Mathematical Union via YouTube