Microsoft Research
Videos from Microsoft Research
Page 2 of 3 • 72 total videos

41:29
Advancing Secure Computation: Efficient Protocols for Linear Algebra
Microsoft Research
77 views

42:29
Simplifying the Design of Workflows for Large-Scale Data Exploration and Visualization
Microsoft Research
62 views

1:03:47
Cryptography: From Theory to Practice
Microsoft Research
695 views

1:04:59
Deterministic Encryption: Theory and Applications
Microsoft Research
731 views

56:04
The Quest for the Minimal Hardness Assumptions
Microsoft Research
34 views

56:32
New Approaches for Building Cryptographic Hash Functions
Microsoft Research
114 views

1:09:33
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
Microsoft Research
401 views
![The Man Who Knew Too Much: Alan Turing and the Invention of the Computer [1/4]](/image/i.ytimg.com/vi/DfnOdpOzq-A/hqdefault.jpg)
56:16
The Man Who Knew Too Much: Alan Turing and the Invention of the Computer [1/4]
Microsoft Research
1.3K views

55:05
ASM View of Abstract Cryptography
Microsoft Research
329 views

11:34
Cryptography Resilient to Physical Attacks
Microsoft Research
910 views

22:46
A Conversation with Turing Award Winner Leslie Lamport
Microsoft Research
892 views

4:37
Turing Award winner Leslie Lamport
Microsoft Research
1.2K views

1:04:18
Expressive encryption from hard lattice problems
Microsoft Research
624 views

1:07:35
Fast and Accurate Arc Filtering for Dependency Parsing
Microsoft Research
150 views

1:14:08
Algorithms for primes
Microsoft Research
3.5K views

52:10
Exploring ECC Implementation on Resource-Constrained Devices
Microsoft Research
114 views

55:10
Exploring Elliptic Curves in Cryptography and Computation
Microsoft Research
3.3K views

2:26:01
Virtual Machine Reset Vulnerabilities; Subspace LWE; Cryptography Against Continuous Memory Attacks
Microsoft Research
314 views

2:03:15
Predicate Encryption; Structured Encryption and Controlled Disclosure; Cloud Cryptography
Microsoft Research
896 views

1:16:09
Optimal Dynamic Mechanism Design in Multi-Armed Bandit Processes
Microsoft Research
945 views

1:19:22
Enhancing Interface Between Systems and Cryptography
Microsoft Research
74 views

58:36
Side Channels and Clouds: New Challenges in Cryptography
Microsoft Research
459 views

2:11:19
Cryptanalysis Workshop Session 1
Microsoft Research
1.2K views

1:18:37
Geometry and Theoretical Computer Science
Microsoft Research
947 views