Key moments
What is the problem?
What is the problem?
1:01
What is the problem?
1:01
What we have done
What we have done
4:15
What we have done
4:15
The story
The story
4:54
The story
4:54
Down the rabbit hole - MPC with Secret Sharing
Down the rabbit hole - MPC with Secret Sharing
5:36
MPC Preprocessing Phase
MPC Preprocessing Phase
6:01
MPC Online Phase
MPC Online Phase
6:43
MPC Online Phase
6:43
MPC Circut Evaluation
MPC Circut Evaluation
7:03
How to compute PMAC
How to compute PMAC
9:41
How to compute PMAC
9:41
Other competitive modes
Other competitive modes
13:22
Other competitive modes
13:22
Some open problems
Some open problems
14:18
Some open problems
14:18
FSE 2018 SPONSORS
FSE 2018 SPONSORS
15:19
FSE 2018 SPONSORS
15:19
Sync to video time
Description
1Likes
81Views
2018Mar 9
Transcript
Follow along using the transcript.
Show transcript
COSIC - Computer Security and Industrial Cryptography
2.88K subscribers
Transcript
NaN / NaN
Show more