Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Post-quantum cryptography
Applied sciences
Computer engineering
Computer security
Post-quantum cryptography
Graph Chatbot
Related lectures (9)
Previous
Page 1 of 1
Next
Homomorphic Encryption
Covers the historical development and key concepts of homomorphic encryption, focusing on the Paillier cryptosystem and the BGV cryptosystem.
Topological Waves for Robust Signal Processing Applications
Explores topological waves for robust signal processing applications, focusing on resistance to perturbations and the design paradigm of topological systems.
Anomalous Topological Networks: Theory and Experiment
Explores anomalous robustness in nonreciprocal topological networks, covering topological Floquet states, unitary scattering networks, and practical implementations.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
SecChisel: Security Verification of Secure Processor Architectures
Presents the SecChisel framework for verifying security properties of secure processor architectures at design-time.
Voronoi Analysis: Closest Vector Problem
Explores Voronoi analysis for efficient Closest Vector Problem solutions.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Untitled
Homomorphic Encryption: BGV Cryptosystem
Delves into the BGV cryptosystem, covering security, correctness, noise management, and practical considerations in homomorphic encryption.