57:18 Building Blockchain Wallets - Technical Details - Yehuda Lindell The BIU Research Center on Applied Cryptography and Cyber Security 649 views - 3 years ago
1:03:12 Building Blockchain Wallets - Challenges and Solutions - Yehuda Lindell The BIU Research Center on Applied Cryptography and Cyber Security 564 views - 3 years ago
42:25 DeFi Attacks - Arthur Gervais The BIU Research Center on Applied Cryptography and Cyber Security 412 views - 3 years ago
1:06:45 MEV and Fair Ordering - Valeria Nikolaenko and Dan Boneh The BIU Research Center on Applied Cryptography and Cyber Security 798 views - 3 years ago
1:00:46 Lending, Liquidations, Stablecoins - Arthur Gervais The BIU Research Center on Applied Cryptography and Cyber Security 301 views - 3 years ago
1:09:12 Decentralized Exchanges, Sandwich, Arbitrage - Arthur Gervais The BIU Research Center on Applied Cryptography and Cyber Security 344 views - 3 years ago
55:26 DAG Meets BFT & Theory Meets Practice - Alexander Speigelman The BIU Research Center on Applied Cryptography and Cyber Security 405 views - 3 years ago
50:32 Data Availability Sampling, Data Dispersal and Reconstruction - Valeria Nikolaenko The BIU Research Center on Applied Cryptography and Cyber Security 480 views - 3 years ago
1:07:33 Permissionless Consensus II - Rafael Pass The BIU Research Center on Applied Cryptography and Cyber Security 295 views - 3 years ago
1:04:49 Permissionless Consensus I - Rafael Pass The BIU Research Center on Applied Cryptography and Cyber Security 495 views - 3 years ago
41:48 A Close Look at a Lookup Argument - Mary Maller The BIU Research Center on Applied Cryptography and Cyber Security 1.7K views - 3 years ago
57:51 How Custom Gates Are Used During Arithmetization - Mary Maller The BIU Research Center on Applied Cryptography and Cyber Security 743 views - 3 years ago
1:04:11 Proving Properties of Committed Polynomials, and the Derived Snarks The BIU Research Center on Applied Cryptography and Cyber Security 703 views - 3 years ago
1:03:10 Arithmetization - What's Algebra Got to Do With It? - Eli Ben-Sasson The BIU Research Center on Applied Cryptography and Cyber Security 1K views - 3 years ago
1:01:32 A Cambrian Explosion of Cryptographic Proofs - Eli Ben-Sasson The BIU Research Center on Applied Cryptography and Cyber Security 924 views - 3 years ago
1:09:59 What Are Snarks and What Are They Good for? - Dan Boneh The BIU Research Center on Applied Cryptography and Cyber Security 1.7K views - 3 years ago
55:39 The Risk of Censorship and De-anonymization - Arthur Gervais The BIU Research Center on Applied Cryptography and Cyber Security 272 views - 3 years ago
52:16 Hard Problems in Blockchains - Valeria Nikolaenko The BIU Research Center on Applied Cryptography and Cyber Security 542 views - 3 years ago
1:00:42 CeFi Versus DeFi - Arthur Gervais The BIU Research Center on Applied Cryptography and Cyber Security 528 views - 3 years ago
1:03:04 An Overview of the Ethereum Excecution Layer - Dan Boneh The BIU Research Center on Applied Cryptography and Cyber Security 2.5K views - 3 years ago
58:53 An Overview of PoW and PoS Consensus - Valeria Nikoaenko The BIU Research Center on Applied Cryptography and Cyber Security 959 views - 3 years ago
56:19 What are Blockchains and What are They For? - Dan Boneh The BIU Research Center on Applied Cryptography and Cyber Security 2.7K views - 3 years ago
57:50 Offline/Online Private Information Retrieval - Dima Kogan The BIU Research Center on Applied Cryptography and Cyber Security 663 views - 4 years ago
51:40 Threshold Signatures - Discrete Log Based Schemes (Part 2) - Rosario Gennaro The BIU Research Center on Applied Cryptography and Cyber Security 621 views - 4 years ago
1:16:07 Threshold Signatures - RSA signatures - Rosario Gennaro The BIU Research Center on Applied Cryptography and Cyber Security 1.1K views - 4 years ago
32:25 Threshold Signatures - Quantum Resistant Schemes - Rosario Gennaro The BIU Research Center on Applied Cryptography and Cyber Security 327 views - 4 years ago
18:46 Threshold Signatures - Discrete Log Based Schemes (Part 3) - Rosario Gennaro The BIU Research Center on Applied Cryptography and Cyber Security 366 views - 4 years ago
50:21 Pseudorandom Correlation Generators (Part 4) - Peter Scholl The BIU Research Center on Applied Cryptography and Cyber Security 370 views - 4 years ago
50:57 Pseudorandom Correlation Generators (Part 3) - Peter Scholl The BIU Research Center on Applied Cryptography and Cyber Security 783 views - 4 years ago
59:18 Private Set Intersection – Malicious Security, and Probability Amplification - Benny Pinkas The BIU Research Center on Applied Cryptography and Cyber Security 761 views - 4 years ago
1:01:46 Private Set Intersection–ORPF/Diffie Hellman PSI, and the Apple CSAM Detection System - Benny Pinkas The BIU Research Center on Applied Cryptography and Cyber Security 1.1K views - 4 years ago
1:06:35 Threshold Signatures - Discrete Log Based Schemes (Part 1) - Rosario Gennaro The BIU Research Center on Applied Cryptography and Cyber Security 1.5K views - 4 years ago
1:04:53 Pseudorandom Correlation Generators (Part 2) - Yuval Ishai The BIU Research Center on Applied Cryptography and Cyber Security 706 views - 4 years ago
1:05:52 Pseudorandom Correlation Generators (Part 1) - Yuval Ishai The BIU Research Center on Applied Cryptography and Cyber Security 1.6K views - 4 years ago
57:50 Offline Online Private Information Retrieval Dima The BIU Research Center on Applied Cryptography and Cyber Security 112 views - 4 years ago
58:03 Introduction to Private Information Retrieval - Dima Kogan The BIU Research Center on Applied Cryptography and Cyber Security 3.1K views - 4 years ago
50:59 Oblivious RAM (Part 3) - Gilad Asharov The BIU Research Center on Applied Cryptography and Cyber Security 429 views - 4 years ago
55:29 Vector Oblivious Linear Evaluation (Part 1) - Peter Scholl The BIU Research Center on Applied Cryptography and Cyber Security 2.8K views - 4 years ago
56:44 Vector Oblivious Linear Evaluation (Part 2) - Peter Scholl The BIU Research Center on Applied Cryptography and Cyber Security 1K views - 4 years ago
57:21 Oblivious RAM (Part 2) - Gilad Asharov The BIU Research Center on Applied Cryptography and Cyber Security 663 views - 4 years ago
1:02:13 Private Analytics Techniques and Applications (Part 2) - Henry Corrigan-Gibbs The BIU Research Center on Applied Cryptography and Cyber Security 386 views - 4 years ago
58:14 Private Analytics Techniques and Applications (Part 1) - Henry Corrigan-Gibbs The BIU Research Center on Applied Cryptography and Cyber Security 764 views - 4 years ago
48:53 Oblivious RAM (Part 1) - Gilad Asharov The BIU Research Center on Applied Cryptography and Cyber Security 2.2K views - 4 years ago
1:03:26 FSS Part 3 - Elette Boyle The BIU Research Center on Applied Cryptography and Cyber Security 1.6K views - 4 years ago
1:02:37 FSS Part 1 - Elette Boyle The BIU Research Center on Applied Cryptography and Cyber Security 6.4K views - 4 years ago
57:26 FSS Part 2 - Elette Boyle The BIU Research Center on Applied Cryptography and Cyber Security 3.9K views - 4 years ago
42:06 Uri Stemmer - Adversarial Streaming, Differential Privacy, and Adaptive Data Analysis The BIU Research Center on Applied Cryptography and Cyber Security 289 views - 4 years ago
45:40 Yonatan Karidi - A Tight Lower Bound on Adaptively Secure Full-Information Coin Flip The BIU Research Center on Applied Cryptography and Cyber Security 179 views - 4 years ago
1:04:43 Mark Zhandry - Quantum Random Oracle (Part 3) The BIU Research Center on Applied Cryptography and Cyber Security 744 views - 5 years ago
1:01:31 Mark Zhandry - Quantum Random Oracle (Part 2) The BIU Research Center on Applied Cryptography and Cyber Security 708 views - 5 years ago
1:06:48 Alex Grilo - Quantum ZK+MPC (Part 3) The BIU Research Center on Applied Cryptography and Cyber Security 216 views - 5 years ago
1:03:56 Alex Grilo - Quantum ZK+MPC (Part 2) The BIU Research Center on Applied Cryptography and Cyber Security 262 views - 5 years ago
1:01:27 Alex Grilo - Quantum ZK+MPC (Part 1) The BIU Research Center on Applied Cryptography and Cyber Security 551 views - 5 years ago
52:43 Mark Zhandry: Quantum Random Oracle (Part 1) The BIU Research Center on Applied Cryptography and Cyber Security 2.1K views - 5 years ago
1:01:16 Mark Zhandry - Security Reductions (Part 3) The BIU Research Center on Applied Cryptography and Cyber Security 464 views - 5 years ago
59:40 Thomas Vidick - Delegation of Quantum Computations (Part 3) The BIU Research Center on Applied Cryptography and Cyber Security 222 views - 5 years ago
59:30 Thomas Vidick - Delegation of Quantum Computations (Part 2) The BIU Research Center on Applied Cryptography and Cyber Security 260 views - 5 years ago
1:00:12 Thomas Vidick - Delegation of Quantum Computations (Part 1) The BIU Research Center on Applied Cryptography and Cyber Security 617 views - 5 years ago
1:01:25 Mark Zhandry - Security Reductions (Part 2) The BIU Research Center on Applied Cryptography and Cyber Security 716 views - 5 years ago
1:00:29 Mark Zhandry - Security Reductions (Part 1) The BIU Research Center on Applied Cryptography and Cyber Security 1.5K views - 5 years ago