Applications of Obfuscation II
Subscribers:
68,700
Published on ● Video Link: https://www.youtube.com/watch?v=JMZOxIawoAs
Craig Gentry, IBM T.J. Watson Research Center
Cryptography Boot Camp
http://simons.berkeley.edu/talks/craig-gentry-2015-05-20b
Other Videos By Simons Institute for the Theory of Computing
2015-05-28 | Garbled Circuits I |
2015-05-28 | Applications of Obfuscation I |
2015-05-28 | Differential Privacy: Fundamentals to Forefront I |
2015-05-28 | Obfuscation II |
2015-05-28 | Secure Multiparty Computation II |
2015-05-28 | Oblivious RAM II |
2015-05-28 | Delegating Computation II |
2015-05-28 | Fully Homomorphic Encryption II |
2015-05-28 | Secure Multiparty Computation I |
2015-05-28 | Obfuscation I |
2015-05-28 | Applications of Obfuscation II |
2015-05-28 | Garbled Circuits II |
2015-05-28 | Multilinear Maps and Attacks I |
2015-05-28 | Fully Homomorphic Encryption I |
2015-05-28 | Multilinear Maps and Attacks II |
2015-05-28 | The Mathematics of Lattices II |
2015-05-28 | The Mathematics of Lattices I |
2015-05-18 | Cryptography: From Mathematical Magic to Secure Communication |
2015-05-12 | Quantum Error Correction |
2015-05-12 | QEC in AdS/CFT |
2015-05-12 | MERA and Holography |
Tags:
Simons Institute
UC Berkeley
computer science
theory of computing
Cryptography
Craig Gentry