YoVDO

Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2

Offered By: IEEE via YouTube

Tags

Cryptography Courses Secure Computation Courses Theoretical Computer Science Courses Indistinguishability Obfuscation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Delve into the advanced concepts of indistinguishability obfuscation in this second part of a comprehensive lecture series. Explore well-founded assumptions that form the basis for this cryptographic technique, gaining insights into its theoretical foundations and practical implications. Examine the latest research developments and potential applications in secure computation and cryptography.

Syllabus

Indistinguishability Obfuscation from Well Founded Assumptions Part 2


Taught by

IEEE FOCS: Foundations of Computer Science

Tags

Related Courses

Applied Cryptography
University of Virginia via Udacity
FHE and Private Set Intersection
Simons Institute via YouTube
Homomorphic Encryption in the SPDZ Protocol for MPC
Simons Institute via YouTube
Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube
Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube