Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2

IEEE via YouTube

Overview

Delve into the advanced concepts of indistinguishability obfuscation in this second part of a comprehensive lecture series. Explore well-founded assumptions that form the basis for this cryptographic technique, gaining insights into its theoretical foundations and practical implications. Examine the latest research developments and potential applications in secure computation and cryptography.

Syllabus

Indistinguishability Obfuscation from Well Founded Assumptions Part 2

Taught by

IEEE FOCS: Foundations of Computer Science

Reviews

Start your review of Indistinguishability Obfuscation from Well-Founded Assumptions - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.