Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Privacy Preserving Crypto I: Secure Multi-Party Computation
Graph Chatbot
Related lectures (32)
Previous
Page 2 of 4
Next
Secure Collaborative Systems: Building Efficient Protocols for Linear Models
Explores building efficient protocols for linear models in secure collaborative systems, emphasizing security guarantees and computational efficiency.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
Logic Synthesis: Designing Efficient Digital Circuits
Discusses logic synthesis techniques for designing efficient digital circuits using minterms, maxterms, and new gates like XOR and XNOR.
Privacy Enhancing Technologies
Introduces a course on Privacy Enhancing Technologies covering various mechanisms and emphasizing privacy as a security property.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Non-Attributable Email: Forward-Forgeable Signatures
Explores non-attributable email using forward-forgeable signatures and the legal risks faced by security researchers.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.