Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Explores intersection numbers for counting solutions to polynomial equations algebraically and their geometric significance in intersection theory and enumerative geometry.