Panel Discussion: Computational Assumptions

Simons Institute

Panel Discussion: Computational Assumptions

Streamed 4 years ago - 49:29

Hardness Assumptions Beyond NP ≠ P || @ CMU || Lecture 26a of CS Theory Toolkit

Ryan O'Donnell

Hardness Assumptions Beyond NP ≠ P || @ CMU || Lecture 26a of CS Theory Toolkit

4 years ago - 6:38

Assumptions in Cryptography: How Do Cryptographers Sleep Well? | Mohammad Mahmoody | TEDxUVA

TEDx Talks

Assumptions in Cryptography: How Do Cryptographers Sleep Well? | Mohammad Mahmoody | TEDxUVA

10 years ago - 20:45

QIP2021 | Device-independent protocols from computational assumptions (Tony Metger)

Munich Center for Quantum Science & Technology

QIP2021 | Device-independent protocols from computational assumptions (Tony Metger)

4 years ago - 29:54

Communication Complexity, Streaming and Computational Assumptions

Simons Institute

Communication Complexity, Streaming and Computational Assumptions

Streamed 2 years ago - 1:01:21

Allison Breton Bishop - A Survey of Computational Assumptions on Bilinear and Multilinear Maps

DIMACS CCICADA

Allison Breton Bishop - A Survey of Computational Assumptions on Bilinear and Multilinear Maps

6 years ago - 1:03:40

A Classification of Computational Assumptions in the Algebraic Group Model

IACR

A Classification of Computational Assumptions in the Algebraic Group Model

4 years ago - 21:27

Self-testing of a single quantum device under computational assumptions

Simons Institute

Self-testing of a single quantum device under computational assumptions

4 years ago - 22:53

Device-Independent Protocols From Computational Assumptions

Simons Institute

Device-Independent Protocols From Computational Assumptions

Streamed 3 years ago - 43:50

[POPL 2021] The Taming of the Rew: A Type Theory with Computational Assumptions (full)

ACM SIGPLAN

[POPL 2021] The Taming of the Rew: A Type Theory with Computational Assumptions (full)

4 years ago - 27:52

The Quest for the Minimal Hardness Assumptions

Microsoft Research

The Quest for the Minimal Hardness Assumptions

8 years ago - 56:04

STOC24 6 B 5 Nonlocality under Computational Assumptions

SIGACT EC

STOC24 6 B 5 Nonlocality under Computational Assumptions

11 months ago - 16:39

Two-round Secure Multiparty Computations from Minimal Assumptions

Microsoft Research

Two-round Secure Multiparty Computations from Minimal Assumptions

7 years ago - 49:07

QCrypt 2021: Device-independent protocols from computational assumptions

QCrypt conference

QCrypt 2021: Device-independent protocols from computational assumptions

3 years ago - 24:40

Quantum Supremacy and its Applications

Simons Institute

Quantum Supremacy and its Applications

6 years ago - 49:29

The Isogeny Club #6.5 Unpredictability Assumptions, and Applying Generic Proof Systems to Isogenies

The Isogeny Club

The Isogeny Club #6.5 Unpredictability Assumptions, and Applying Generic Proof Systems to Isogenies

1 month ago - 54:34

Classical Commitment to Quantum States

Simons Institute

Classical Commitment to Quantum States

5 years ago - 55:32

Computational Complexity of Statistical Estimation

Simons Institute

Computational Complexity of Statistical Estimation

Streamed 4 years ago - 29:06

Minimal Complexity Assumptions for Cryptography (Part I)

Simons Institute

Minimal Complexity Assumptions for Cryptography (Part I)

Streamed 2 years ago - 1:03:11

Fang Song: Zero-knowledge proof systems for QMA

Microsoft Research

Fang Song: Zero-knowledge proof systems for QMA

8 years ago - 31:38

Anne Broadbent - Secure Software Leasing Without Assumptions

Joshuah Heath

Anne Broadbent - Secure Software Leasing Without Assumptions

4 years ago - 52:35

Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techn...

IACR

Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techn...

3 years ago - 31:02

Ilya Merkulov: Entropy Accumulation under Post-Quantum Cryptographic Assumptions

UMIACS

Ilya Merkulov: Entropy Accumulation under Post-Quantum Cryptographic Assumptions

1 year ago - 18:36

Computational Limits in Statistical Inference: Hidden Cliques and Sum of Squares

Microsoft Research

Computational Limits in Statistical Inference: Hidden Cliques and Sum of Squares

8 years ago - 1:03:30

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols

IEEE Symposium on Security and Privacy

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols

2 years ago - 18:04

Joan Bruna: "On Computational Hardness with Graph Neural Networks"

Institute for Pure & Applied Mathematics (IPAM)

Joan Bruna: "On Computational Hardness with Graph Neural Networks"

7 years ago - 55:31

Indistinguishability Obfuscation from Well-Founded Assumptions - Huijia (Rachel) Lin

Institute for Advanced Study

Indistinguishability Obfuscation from Well-Founded Assumptions - Huijia (Rachel) Lin

4 years ago - 1:13:02

An Algebraic Framework for Diffie-Hellman Assumptions

IACR

An Algebraic Framework for Diffie-Hellman Assumptions

11 years ago - 19:44

Testing Assumptions of Learning Algorithms

Simons Institute

Testing Assumptions of Learning Algorithms

Streamed 1 year ago - 59:09

Learning With Errors (LWE) and Public Key Encryption || @ CMU || Lecture 25d of CS Theory Toolkit

Ryan O'Donnell

Learning With Errors (LWE) and Public Key Encryption || @ CMU || Lecture 25d of CS Theory Toolkit

4 years ago - 25:54

Dakshita Khurana - Weakening Assumptions in Quantum Cryptography IV.b Part 2 of 2 - IPAM at UCLA

Institute for Pure & Applied Mathematics (IPAM)

Dakshita Khurana - Weakening Assumptions in Quantum Cryptography IV.b Part 2 of 2 - IPAM at UCLA

2 years ago - 1:39:44

Discrete logarithm problem I - Hardness assumptions and usage

Tanja Lange: Cryptology

Discrete logarithm problem I - Hardness assumptions and usage

3 years ago - 20:22

😂 FAILURE: Computational Photography & Medium Format assumptions

Theoria Apophasis

😂 FAILURE: Computational Photography & Medium Format assumptions

6 years ago - 14:54

Incompressiblity and Next-Block Pseudoentropy

Simons Institute

Incompressiblity and Next-Block Pseudoentropy

Streamed 2 years ago - 46:30

Whole Brain Emulation: The Logical Endpoint of Neuroinformatics?

Google TechTalks

Whole Brain Emulation: The Logical Endpoint of Neuroinformatics?

15 years ago - 58:55

"Cryptography from Pseudorandom Quantum States", presented by Henry Yuen

Illinois Quantum

"Cryptography from Pseudorandom Quantum States", presented by Henry Yuen

Streamed 3 years ago - 1:02:16

Black-Hole Radiation Decoding as a Cryptographic Assumption

Simons Institute

Black-Hole Radiation Decoding as a Cryptographic Assumption

Streamed 2 years ago - 47:20

DOE CSGF 2022: Communication-Efficient Secure Two-Party Computation From Minimal Assumptions

Krell Institute

DOE CSGF 2022: Communication-Efficient Secure Two-Party Computation From Minimal Assumptions

2 years ago - 15:55

Mark Zhandry - Security Reductions (Part 1)

The BIU Research Center on Applied Cryptography and Cyber Security

Mark Zhandry - Security Reductions (Part 1)

4 years ago - 1:00:29

Hardness vs. Randomness I: Graduate Complexity Lecture 24 at CMU

Ryan O'Donnell

Hardness vs. Randomness I: Graduate Complexity Lecture 24 at CMU

7 years ago - 1:22:26