YoVDO

Protocols - Wrap Up

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Network Security Courses Public Key Infrastructure Courses Oblivious RAM Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of cryptographic protocols and their applications in this comprehensive lecture. Delve into logarithmic lower and upper bounds for oblivious RAM, uncover the principles of private information retrieval, and address key questions in the field. Examine the concept of ideal ciphers and their practical implications. Gain insights into public key infrastructure and its role in modern cryptography. Conclude with a thorough wrap-up, solidifying your understanding of these essential topics in cryptographic theory and practice.

Syllabus

Logarithmic lower bound for oblivious ram
Logarithmic upper bound for oblivious ram
Private information retrieval
Questions
Ideal ciphers
Application
Public key infrastructure
Wrap up


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera