Noisy Connections: A Survey of Interactive Coding and Its Borders with Other Topics
Subscribers:
68,700
Published on ● Video Link: https://www.youtube.com/watch?v=csVKItkuySs
Allison Bishop, Columbia University
The Mathematics of Modern Cryptography
http://simons.berkeley.edu/talks/allison-bishop-2015-07-09
Other Videos By Simons Institute for the Theory of Computing
2015-08-31 | On Algorithmic Game Theory II |
2015-08-31 | Scarf's Lemma and Applications II |
2015-08-31 | On Algorithmic Game Theory I |
2015-08-31 | Scarf's Lemma and Applications I |
2015-08-31 | Near-Optimal Equilibria II |
2015-08-13 | Data Structures and Cryptography: from UOWHFs to PSRs |
2015-08-13 | 20 years of PIR |
2015-08-06 | Hash Proof Systems, Old and New |
2015-08-05 | Non-Malleable Cryptography |
2015-07-15 | Arithmetic Cryptography |
2015-07-15 | Noisy Connections: A Survey of Interactive Coding and Its Borders with Other Topics |
2015-07-15 | Homomorphic Commitments & Signatures |
2015-07-15 | Attribute-based and Predicate Encryption |
2015-07-15 | Cryptography from Ideal Lattices |
2015-07-15 | Output-Compressing Randomized Encodings and Applications |
2015-07-15 | Cryptography via Burnside Groups |
2015-07-15 | Multilinear Maps Over the Integers: From Design to Security |
2015-07-15 | Attribute-based Encryption for Circuits |
2015-07-15 | Fully Homomorphic Encryption |
2015-07-15 | How Diffie-Hellman Fails in Practice |
2015-07-15 | Finding Short Generators of Principal Ideals |
Tags:
Simons Institute
UC Berkeley
computer science
theory of computing
Cryptography
Allison Bishop