Secure Computation from Leaky Correlated Randomness
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a conference talk that delves into the concept of secure computation using leaky correlated randomness. Learn about the challenges and potential solutions in cryptographic protocols when dealing with imperfect randomness sources. Gain insights into how researchers are addressing the issue of information leakage in secure multi-party computation and its implications for privacy-preserving technologies. Discover the latest advancements in this field and understand how they contribute to the development of more robust and secure cryptographic systems.
Syllabus
Secure Computation from Leaky Correlated Randomness
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera