Applications of Obfuscation I
Subscribers:
68,700
Published on ● Video Link: https://www.youtube.com/watch?v=UdDQ49HUOSA
Craig Gentry, IBM T.J. Watson Research Center
Cryptography Boot Camp
http://simons.berkeley.edu/talks/craig-gentry-2015-05-20a
Other Videos By Simons Institute for the Theory of Computing
2015-06-15 | SNARKs and their Practical Applications |
2015-06-15 | Contention in Cryptography: Obfuscation, Leakage, UCE and the AI-DHI Assumptions |
2015-06-15 | Obfuscation: Past, Present, and Possible Futures |
2015-06-15 | New Developments in Multilinear Maps: Zeroizing Attacks, Defenses, and Post-Zeroizing Obfuscation |
2015-06-04 | On the Growth of Cryptography |
2015-05-29 | Delegating Computation I |
2015-05-28 | Spacetime, Entropy, and Quantum Information |
2015-05-28 | Differential Privacy: Fundamentals to Forefront II |
2015-05-28 | Oblivious RAM I |
2015-05-28 | Garbled Circuits I |
2015-05-28 | Applications of Obfuscation I |
2015-05-28 | Differential Privacy: Fundamentals to Forefront I |
2015-05-28 | Obfuscation II |
2015-05-28 | Secure Multiparty Computation II |
2015-05-28 | Oblivious RAM II |
2015-05-28 | Delegating Computation II |
2015-05-28 | Fully Homomorphic Encryption II |
2015-05-28 | Secure Multiparty Computation I |
2015-05-28 | Obfuscation I |
2015-05-28 | Applications of Obfuscation II |
2015-05-28 | Garbled Circuits II |
Tags:
Simons Institute
UC Berkeley
computer science
theory of computing
Cryptography
Craig Gentry