Related lectures (9)
Multi-arm Bandits
Explores multi-arm bandits in adversarial settings and strategies for optimizing rewards.
Symmetric Encryption: Formalism and Security
Explores the formalism and security aspects of symmetric encryption systems, including block ciphers, variable length encryption, and security definitions.
Random Number Generators: Basics and Algorithms
Explores random number generators, from true random numbers to pseudo random algorithms, including the modulo generator and advanced techniques.
Boolean Hidden Matching Problem
Covers the Boolean Hidden Matching Problem and its applications to lower bounds.
Random Number Generators: Modulo Generator
Explores random number generators on computers, focusing on the Modulo generator and the criteria for pseudo random numbers.
Smart Contracts: Bitcoin and UTXO
Explores smart contracts in Bitcoin, UTXO model, authorization, validity checks, challenges, applications, and emerging trends.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.