Microsoft Research

Videos from Microsoft Research

Page 3 of 3 • 72 total videos

Fully Homomorphic Encryption over the Integers with Shorter Public Keys
51:31

Fully Homomorphic Encryption over the Integers with Shorter Public Keys

Microsoft Research
1.5K views
Cryptography with Weak, Noisy, Leaky and Tempered Keys
58:24

Cryptography with Weak, Noisy, Leaky and Tempered Keys

Microsoft Research
116 views
Quantum Hamiltonian Complexity
1:02:40

Quantum Hamiltonian Complexity

Microsoft Research
505 views
Lattice-Based Cryptography
1:11:47

Lattice-Based Cryptography

Microsoft Research
8.2K views
Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption
56:42

Cryptanalysis of AES and SHA-2: how far we are from compromising worldwide encryption

Microsoft Research
971 views
A Survey on Ring-LWE Cryptography
1:10:23

A Survey on Ring-LWE Cryptography

Microsoft Research
6.2K views
Some theoretical works on the quantum application, cryptanalysis, and computer system
1:23:10

Some theoretical works on the quantum application, cryptanalysis, and computer system

Microsoft Research
139 views
MSRNE 5th Anniversary Symposium - Mathematics and Theoretical Computer Science
1:04:18

MSRNE 5th Anniversary Symposium - Mathematics and Theoretical Computer Science

Microsoft Research
340 views
The Interdependence of Good Programming and Mathematics
1:16:33

The Interdependence of Good Programming and Mathematics

Microsoft Research
1.8K views
The Mechanical Cryptographer: Tolerant Algebraic Side-Channel Attacks using pseudo-Boolean Solvers
52:55

The Mechanical Cryptographer: Tolerant Algebraic Side-Channel Attacks using pseudo-Boolean Solvers

Microsoft Research
186 views
Practice-Driven Cryptographic Theory
1:13:32

Practice-Driven Cryptographic Theory

Microsoft Research
301 views
Algorithms and Complexity for Quantum Computing
56:44

Algorithms and Complexity for Quantum Computing

Microsoft Research
4.0K views
Who is Afraid of Vectors�Optimizing Cryptography Using SSE, AVX, NEON, and Co.
1:02:37

Who is Afraid of Vectors�Optimizing Cryptography Using SSE, AVX, NEON, and Co.

Microsoft Research
906 views
Next-Generation Secure Cloud Cryptography: Enhancing P2P and Client-Server Systems
1:05:04

Next-Generation Secure Cloud Cryptography: Enhancing P2P and Client-Server Systems

Microsoft Research
377 views
Workshop on Quantum Algorithms and Devices - Part 1
1:27:26

Workshop on Quantum Algorithms and Devices - Part 1

Microsoft Research
1.2K views
Cryptography Primer Session 6: Tools and Applications
1:23:27

Cryptography Primer Session 6: Tools and Applications

Microsoft Research
311 views
Oral Session: End-To-End Memory Networks
22:17

Oral Session: End-To-End Memory Networks

Microsoft Research
3.2K views
Advances in Quantum Algorithms & Devices: Position-based cryptography
43:10

Advances in Quantum Algorithms & Devices: Position-based cryptography

Microsoft Research
249 views
Interdisciplinarity: A View from Theoretical Computer Science
40:19

Interdisciplinarity: A View from Theoretical Computer Science

Microsoft Research
281 views
Cryptography Primer Session 3 – Integral Asymmetric Functions
1:04:22

Cryptography Primer Session 3 – Integral Asymmetric Functions

Microsoft Research
192 views
Cryptography Primer Session 4 Primes, Elliptic Curves, & Lattices
1:01:55

Cryptography Primer Session 4 Primes, Elliptic Curves, & Lattices

Microsoft Research
814 views
Workshop on Quantum Algorithms and Devices - Session 4
1:38:16

Workshop on Quantum Algorithms and Devices - Session 4

Microsoft Research
829 views
Computational Modeling in Medicine: Some Recent Results and Future Perspective
58:44

Computational Modeling in Medicine: Some Recent Results and Future Perspective

Microsoft Research
533 views
Chuck Thacker wins Turing Award
3:42

Chuck Thacker wins Turing Award

Microsoft Research
2.2K views