Secure Computation II
Offered By: TheIACR via YouTube
Course Description
Overview
Dive into an advanced exploration of secure computation in this 1-hour 17-minute lecture. Examine key concepts including information theory, MPC, ground complexity, and fairness in cryptographic protocols. Analyze impossible results and breakthrough findings in the field, while gaining insights into previous work and current research directions. Engage with thought-provoking questions and participate in a Q&A session to deepen your understanding of secure computation techniques and their applications.
Syllabus
Introduction
Questions
Information Theory
MPR
Incursible MPC
Ground Complexity
Air Questions
Fairness
Impossible Results
Breakthrough Results
Previous Work
Results
QA
Barelon
Taught by
TheIACR
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube