Simons Institute
Panel Discussion: Computational Assumptions
Streamed 4 years ago - 49:29
Ryan O'Donnell
Hardness Assumptions Beyond NP ≠ P || @ CMU || Lecture 26a of CS Theory Toolkit
4 years ago - 6:38
TEDx Talks
Assumptions in Cryptography: How Do Cryptographers Sleep Well? | Mohammad Mahmoody | TEDxUVA
10 years ago - 20:45
Simons Institute
Communication Complexity, Streaming and Computational Assumptions
Streamed 2 years ago - 1:01:21
IACR
A Classification of Computational Assumptions in the Algebraic Group Model
4 years ago - 21:27
DIMACS CCICADA
Allison Breton Bishop - A Survey of Computational Assumptions on Bilinear and Multilinear Maps
6 years ago - 1:03:40
Simons Institute
Self-testing of a single quantum device under computational assumptions
4 years ago - 22:53
Simons Institute
Device-Independent Protocols From Computational Assumptions
Streamed 3 years ago - 43:50
SIGACT EC
STOC24 6 B 5 Nonlocality under Computational Assumptions
11 months ago - 16:39
ACM SIGPLAN
[POPL 2021] The Taming of the Rew: A Type Theory with Computational Assumptions (full)
4 years ago - 27:52
QCrypt conference
QCrypt 2021: Device-independent protocols from computational assumptions
3 years ago - 24:40
Microsoft Research
Two-round Secure Multiparty Computations from Minimal Assumptions
7 years ago - 49:07
IACR
Towards a Classification of Non interactive Computational Assumptions in Cyclic Groups
7 years ago - 27:13
Microsoft Research
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions
8 years ago - 53:58
Simons Institute
Minimal Complexity Assumptions for Cryptography (Part I)
Streamed 2 years ago - 1:03:11
Joshuah Heath
Anne Broadbent - Secure Software Leasing Without Assumptions
4 years ago - 52:35
The Isogeny Club
The Isogeny Club #6.5 Unpredictability Assumptions, and Applying Generic Proof Systems to Isogenies
1 month ago - 54:34
IACR
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techn...
3 years ago - 31:02
UMIACS
Ilya Merkulov: Entropy Accumulation under Post-Quantum Cryptographic Assumptions
1 year ago - 18:36
Microsoft Research
Computational Limits in Statistical Inference: Hidden Cliques and Sum of Squares
8 years ago - 1:03:30
Simons Institute
Testing Assumptions of Learning Algorithms
Streamed 1 year ago - 59:09
IACR
An Algebraic Framework for Diffie-Hellman Assumptions
11 years ago - 19:44
Theoria Apophasis
😂 FAILURE: Computational Photography & Medium Format assumptions
6 years ago - 14:54
Ryan O'Donnell
Learning With Errors (LWE) and Public Key Encryption || @ CMU || Lecture 25d of CS Theory Toolkit
4 years ago - 25:54
Simons Institute
Incompressiblity and Next-Block Pseudoentropy
Streamed 2 years ago - 46:30
Krell Institute
DOE CSGF 2022: Communication-Efficient Secure Two-Party Computation From Minimal Assumptions
2 years ago - 15:55
Simons Institute
Black-Hole Radiation Decoding as a Cryptographic Assumption
Streamed 2 years ago - 47:20
Google TechTalks
Whole Brain Emulation: The Logical Endpoint of Neuroinformatics?
15 years ago - 58:55
Ryan O'Donnell
Hardness vs. Randomness I: Graduate Complexity Lecture 24 at CMU
7 years ago - 1:22:26
Illinois Quantum
"Cryptography from Pseudorandom Quantum States", presented by Henry Yuen
Streamed 3 years ago - 1:02:16
COLT
Reducibility and Statistical-Computational Gaps from Secret Leakage
4 years ago - 15:10
Ryan O'Donnell
Hardness vs. Randomness II: Graduate Complexity Lecture 25 at CMU
7 years ago - 1:17:53
Data Depth
What are the assumptions of logistic regression? #datascienceinterviewquestions #machinelearning
1 year ago - 0:31
Simons Institute
Quantum Algorithms and Post-Quantum Cryptography
Streamed 5 years ago - 49:23
Simons Institute
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
Streamed 2 years ago - 46:10
Stemble
The Biggest Problem in Cryptography ⚠️ #short
1 year ago - 0:49
Microsoft Research
Florian Speelman: Quantum homomorphic encryption for polynomial-sized circuits (Best Student Paper)
8 years ago - 53:54
Simons Institute
On Hardness Assumptions Needed for ``Extreme High-End'' PRGs and Fast Derandomization
3 years ago - 45:52
Simons Institute
Contention in Cryptography: Obfuscation, Leakage, UCE and the AI-DHI Assumptions
9 years ago - 30:43
FOCS 2024
FOCS 2024 6A Succinct arguments for QMA from standard assumptions via compiled nonlocal games
7 months ago - 22:23
Simons Institute
Indistinguishability Obfuscation from Simple-to-State Hard Problems
5 years ago - 1:24:58
CodeVisium
Post‑Quantum Cryptography: Securing Data Against Future Quantum Threats | #PostQuantum, #QuantumSafe
1 month ago - 0:10
Qiskit
Laptops wouldn't exist without Quantum Mechanics
2 years ago - 0:17
QuSoft
Tina Zhang (MIT) — Succinct arguments for QMA from standard assumptions via compiled nonlocal games
4 months ago - 51:15
IACR
Round Optimal Secure Multiparty Computation from Minimal Assumptions
4 years ago - 22:10
lanl-ansi
Convex Relaxations in Power System Optimization: Computational Hardness (4 of 8)
6 years ago - 19:39
IACR
Constraining and Watermarking PRFs from Milder Assumptions
5 years ago - 21:40