Secure Computation from Leaky Correlated Randomness
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a conference talk that delves into the concept of secure computation using leaky correlated randomness. Learn about the challenges and potential solutions in cryptographic protocols when dealing with imperfect randomness sources. Gain insights into how researchers are addressing the issue of information leakage in secure multi-party computation and its implications for privacy-preserving technologies. Discover the latest advancements in this field and understand how they contribute to the development of more robust and secure cryptographic systems.
Syllabus
Secure Computation from Leaky Correlated Randomness
Taught by
TheIACR
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube