Protocols - Wrap Up
Offered By: TheIACR via YouTube
Course Description
Overview
Explore the intricacies of cryptographic protocols and their applications in this comprehensive lecture. Delve into logarithmic lower and upper bounds for oblivious RAM, uncover the principles of private information retrieval, and address key questions in the field. Examine the concept of ideal ciphers and their practical implications. Gain insights into public key infrastructure and its role in modern cryptography. Conclude with a thorough wrap-up, solidifying your understanding of these essential topics in cryptographic theory and practice.
Syllabus
Logarithmic lower bound for oblivious ram
Logarithmic upper bound for oblivious ram
Private information retrieval
Questions
Ideal ciphers
Application
Public key infrastructure
Wrap up
Taught by
TheIACR
Related Courses
Криптографические методы защиты информацииNational Research Nuclear University MEPhI via edX Ethical Hacking: Cryptography
LinkedIn Learning Learning SSL/TLS
LinkedIn Learning Blockchain Deep-Dive: from Bitcoin to Ethereum to Crypto
Udemy Systems and Usable Security
NPTEL via Swayam