YoVDO

Lower Bounds on Obfuscation from All or Nothing Encryption

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Encryption Courses Decryption Courses Obfuscation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a presentation from Crypto 2017 on lower bounds for obfuscation derived from all-or-nothing encryption. Delve into the paper by Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed as they discuss key assumptions for indistinguishability obfuscation, the nature of all-or-nothing constructs, and blackbox implementations. Examine high-level concepts, the definition of idealized oracles and decryption processes, and the role of hidden queries in this cryptographic research. Gain insights into cutting-edge obfuscation techniques and their theoretical foundations in this 21-minute talk that covers introduction, assumptions, constructions, and a comprehensive summary of findings.

Syllabus

Introduction
What assumptions could give us IO
Allornothing nature
Blackbox construction
Highlevel ideas
Defining idealized Oracle
Defining decryption
Hidden Queries
Summary


Taught by

TheIACR

Related Courses

Save and Load Files with C# in Unity
Coursera Project Network via Coursera
Reverse Engineering 6: Reversing .NET with dnSpy
Udemy
Reverse Engineering & Malware Analysis of .NET & Java
Udemy
JavaScript: Security Essentials
LinkedIn Learning
TypeScript Crash Course with Matt Pocock
Visual Studio Code via YouTube