All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
hypr.com
How does security Obfuscation work? | Security Encyclopedia
Obfuscation is the process of making information unclear, thereby making it more difficult to alter or copy.
Aug 23, 2022
Indistinguishability Obfuscation Explained
1:11:03
Charles River Crypto Day – Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
Microsoft
Feb 23, 2015
Limits of Obfuscation
Microsoft
Oct 31, 2009
1:11
The Fee Structure Draining Your Business Account Silently
YouTube
Business & Money Secrets
4 views
1 week ago
Top videos
Applications of Obfuscation I
berkeley.edu
May 20, 2015
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Microsoft
Feb 21, 2014
Obfuscation Vs. Encryption (Easily Explained)
cybersynchs.com
Apr 27, 2022
Indistinguishability Obfuscation Applications
47:42
Cryptographic Program Obfuscation: Current Capabilities and Challenges
Microsoft
May 1, 2018
2:25
What is obfuscation and how does it work? | Definition from TechTarget
techtarget.com
Nov 27, 2024
Better Security Through Obfuscation – Communications of the ACM
acm.org
Aug 1, 2021
Applications of Obfuscation I
May 20, 2015
berkeley.edu
Candidate Indistinguishability Obfuscation and Functional Encry
…
Feb 21, 2014
Microsoft
Obfuscation Vs. Encryption (Easily Explained)
Apr 27, 2022
cybersynchs.com
1:11:03
Charles River Crypto Day – Constant-Round Concurrent Zero
…
Feb 23, 2015
Microsoft
Obfuscation
1K views
10 months ago
substack.com
Better Security Through Obfuscation – Communications o
…
Aug 1, 2021
acm.org
0:56
A question of security: What is obfuscation and how does it work?
Aug 10, 2018
zdnet.com
Limits of Obfuscation
Oct 31, 2009
Microsoft
Data Masking, Redaction & Obfuscation: How to Anonymize D
…
7 months ago
bigmarker.com
6:35
How to Beat AI Detectors: The 100-Point Human Score System for Co
…
2 weeks ago
YouTube
CTA Labs
0:30
The Dark Art of Obfuscation: Unmasking Code Secrets!#cybers
…
166 views
2 months ago
YouTube
HackNode
32:28
Every Weird Way Electrons Refuse To Be Individuals Explained
569 views
1 month ago
YouTube
QuantumExplorer
27:15
Every Weird Way All Electrons In The Universe Are Identical Explain
…
167 views
2 weeks ago
YouTube
QuantumExplorer
52:51
A Pure Indistinguishability Obfuscation Approach to Adaptiv
…
4 views
3 weeks ago
bilibili
3cH0_Nu1L
46:11
Running Circuits of Unbounded Depth over Encrypted Data, Secur
…
3 views
3 weeks ago
bilibili
3cH0_Nu1L
0:22
Theee Whole World on Instagram: "The post features a 22-second vi
…
13.8K views
2 months ago
Instagram
theeewholeworld
1:07:21
Indistinguishability Obfuscation via Mathematical Proofs
6 views
3 weeks ago
bilibili
3cH0_Nu1L
1:05:16
Succinct Randomized Encodings from Lattices-1280x720-avc1-mp4a
11 views
3 weeks ago
bilibili
3cH0_Nu1L
48:36
Lower Bounds on the Overhead of Indistinguishability Obfuscation
3 weeks ago
bilibili
3cH0_Nu1L
1:27:23
Laconic Function Evaluation
9 views
3 weeks ago
bilibili
3cH0_Nu1L
40:31
Talk by Elaine Shi (Carnegie Mellon University)
22 views
3 weeks ago
bilibili
3cH0_Nu1L
27:22
V4a The Dilithium Number-Theoretic Transform (NTT) (Kyber and Dilithi
…
6 views
3 weeks ago
bilibili
3cH0_Nu1L
23:23
V3b Dilithium signature scheme (without t compression) (Kyber an
…
6 views
3 weeks ago
bilibili
3cH0_Nu1L
45:51
Indistinguishability Obfuscation from Bilinear Maps and LPN Varia
…
17 views
3 weeks ago
bilibili
3cH0_Nu1L
59:26
Beyond P versus NP Using Complexity Theory in Obfuscatio
…
2 views
3 weeks ago
bilibili
3cH0_Nu1L
11:23
Virtual Machines
350K views
Jun 20, 2018
YouTube
Neso Academy
Indistinguishability Obfuscation iO | Devcon SEA
616 views
Dec 10, 2024
YouTube
Ethereum Foundation
OBFUSCATION EXPLAINED
11.8K views
Apr 5, 2017
YouTube
Saajaadeen Jeffries
All of causal discovery - Frederick Eberhardt
4.1K views
Dec 16, 2013
YouTube
Carnegie Mellon University Department of Philo…
See more videos
More like this
Feedback