YoVDO

Cryptographic Protocols and Secure Computation I

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Cybersecurity Courses Secure Computation Courses Secure Communication Courses Pseudorandom Functions Courses

Course Description

Overview

Explore cryptographic protocols and secure computation in this comprehensive lecture covering PRFs, online tests, gap assumptions, and two-party computation. Gain insights into secure communication techniques, delve into the concept of "beyond security," and learn from expert Alex Davison. Engage with thought-provoking questions and a thorough summary to solidify your understanding of these crucial aspects of modern cryptography.

Syllabus

Intro
What is PRF
Online tests
Gap assumption
Introduction
Background
Alex Davison
Beyond Security
Secure Communication
Questions
Summary
Twoparty computation


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
FHE and Private Set Intersection
Simons Institute via YouTube
Homomorphic Encryption in the SPDZ Protocol for MPC
Simons Institute via YouTube
Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube
Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube