Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Privacy Preserving Crypto I: Secure Multi-Party Computation
Graph Chatbot
Related lectures (32)
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
Quantum Circuits: Classic Circuits
Explores classic circuits in quantum computing, including Boolean functions and reversible gates.
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Privacy: Threat Modeling and Differential Privacy
Explores the significance of privacy, risks of targeted advertising, and the concept of differential privacy.
Privacy-Preserving Crypto I
Introduces Secure Multiparty Computation techniques, covering theoretical frameworks, security models, and practical applications in privacy-preserving cryptography.
Secure Collaborative Systems: Building Efficient Protocols for Linear Models
Explores building efficient protocols for linear models in secure collaborative systems, emphasizing security guarantees and computational efficiency.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
Logic Synthesis: Designing Efficient Digital Circuits
Discusses logic synthesis techniques for designing efficient digital circuits using minterms, maxterms, and new gates like XOR and XNOR.
Privacy Enhancing Technologies
Introduces a course on Privacy Enhancing Technologies covering various mechanisms and emphasizing privacy as a security property.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Non-Attributable Email: Forward-Forgeable Signatures
Explores non-attributable email using forward-forgeable signatures and the legal risks faced by security researchers.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Previous
Page 1 of 2
Next