YoVDO

Secure Computation from Leaky Correlated Randomness

Offered By: TheIACR via YouTube

Tags

Conference Talks Courses Cryptography Courses Secure Computation Courses Data Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into the concept of secure computation using leaky correlated randomness. Learn about the challenges and potential solutions in cryptographic protocols when dealing with imperfect randomness sources. Gain insights into how researchers are addressing the issue of information leakage in secure multi-party computation and its implications for privacy-preserving technologies. Discover the latest advancements in this field and understand how they contribute to the development of more robust and secure cryptographic systems.

Syllabus

Secure Computation from Leaky Correlated Randomness


Taught by

TheIACR

Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube