Microsoft Research

Videos from Microsoft Research

Page 2 of 3 • 72 total videos

Advancing Secure Computation: Efficient Protocols for Linear Algebra
41:29

Advancing Secure Computation: Efficient Protocols for Linear Algebra

Microsoft Research
77 views
Simplifying the Design of Workflows for Large-Scale Data Exploration and Visualization
42:29

Simplifying the Design of Workflows for Large-Scale Data Exploration and Visualization

Microsoft Research
62 views
Cryptography: From Theory to Practice
1:03:47

Cryptography: From Theory to Practice

Microsoft Research
695 views
Deterministic Encryption: Theory and Applications
1:04:59

Deterministic Encryption: Theory and Applications

Microsoft Research
731 views
The Quest for the Minimal Hardness Assumptions
56:04

The Quest for the Minimal Hardness Assumptions

Microsoft Research
34 views
New Approaches for Building Cryptographic Hash Functions
56:32

New Approaches for Building Cryptographic Hash Functions

Microsoft Research
114 views
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
1:09:33

Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity

Microsoft Research
401 views
The Man Who Knew Too Much: Alan Turing and the Invention of the Computer [1/4]
56:16

The Man Who Knew Too Much: Alan Turing and the Invention of the Computer [1/4]

Microsoft Research
1.3K views
ASM View of Abstract Cryptography
55:05

ASM View of Abstract Cryptography

Microsoft Research
329 views
Cryptography Resilient to Physical Attacks
11:34

Cryptography Resilient to Physical Attacks

Microsoft Research
910 views
A Conversation with Turing Award Winner Leslie Lamport
22:46

A Conversation with Turing Award Winner Leslie Lamport

Microsoft Research
892 views
Turing Award winner Leslie Lamport
4:37

Turing Award winner Leslie Lamport

Microsoft Research
1.2K views
Expressive encryption from hard lattice problems
1:04:18

Expressive encryption from hard lattice problems

Microsoft Research
624 views
Fast and Accurate Arc Filtering for Dependency Parsing
1:07:35

Fast and Accurate Arc Filtering for Dependency Parsing

Microsoft Research
150 views
Algorithms for primes
1:14:08

Algorithms for primes

Microsoft Research
3.5K views
Exploring ECC Implementation on Resource-Constrained Devices
52:10

Exploring ECC Implementation on Resource-Constrained Devices

Microsoft Research
114 views
Exploring Elliptic Curves in Cryptography and Computation
55:10

Exploring Elliptic Curves in Cryptography and Computation

Microsoft Research
3.3K views
Virtual Machine Reset Vulnerabilities; Subspace LWE; Cryptography Against Continuous Memory Attacks
2:26:01

Virtual Machine Reset Vulnerabilities; Subspace LWE; Cryptography Against Continuous Memory Attacks

Microsoft Research
314 views
Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography
2:03:15

Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography

Microsoft Research
896 views
Optimal Dynamic Mechanism Design in Multi-Armed Bandit Processes
1:16:09

Optimal Dynamic Mechanism Design in Multi-Armed Bandit Processes

Microsoft Research
945 views
Enhancing Interface Between Systems and Cryptography
1:19:22

Enhancing Interface Between Systems and Cryptography

Microsoft Research
74 views
Side Channels and Clouds: New Challenges in Cryptography
58:36

Side Channels and Clouds: New Challenges in Cryptography

Microsoft Research
459 views
Cryptanalysis Workshop Session 1
2:11:19

Cryptanalysis Workshop Session 1

Microsoft Research
1.2K views
Geometry and Theoretical Computer Science
1:18:37

Geometry and Theoretical Computer Science

Microsoft Research
947 views