Cryptographic primitives

Black-box obfuscation

In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was impossible to determine anything about it except its input and output behavior. Black-box obfuscation has been proven to be impossible, even in principle. (Wikipedia).

Video thumbnail

Is the nothing of a black hole the same as empty space?

Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us on Facebook: https://www.facebook.com/worldscienceu Follow us on Twitter: https://twitter.com/worldscienceu

From playlist Science Unplugged: Black Holes

Video thumbnail

What are black holes?

If you're not sure what a black hole is, or even if you just need a quick refresher, Brian Greene explains what lies behind these cosmological powerhouses. Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us o

From playlist Science Unplugged: Black Holes

Video thumbnail

Is there a black hole in every galaxy?

Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us on Facebook: https://www.facebook.com/worldscienceu Follow us on Twitter: https://twitter.com/worldscienceu

From playlist Science Unplugged: Black Holes

Video thumbnail

How to Make a White Hole and an Einstein–Rosen Bridge in Real Life

Get your Action Lab Box Now! https://www.theactionlab.com/ In this video I talk about the physics of white holes. I show you what would happen as you approach a white hole and if you were to be ejected from a white hole. Then I show you how to actually make a white hole in your kitchen si

From playlist The Action Lab And The Theory of Relativity

Video thumbnail

Black Holes - Sixty Symbols

Crushing the Earth into a Black Hole and looking into the core of the Milky Way. Featuring Omar Almaini from the University of Nottingham. More Black Hole videos: https://www.youtube.com/playlist?list=PLcUY9vudNKBNnhsKqjZ_pO2Hum73dbJBT Black holes are a favourite of both science fiction

From playlist Black Holes - Sixty Symbols

Video thumbnail

What is inside of a black hole?

Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us on Facebook: https://www.facebook.com/worldscienceu Follow us on Twitter: https://twitter.com/worldscienceu

From playlist Science Unplugged: Black Holes

Video thumbnail

Black Hole Apocalypse — Official Trailer

Join astrophysicist Janna Levin and others as they hunt for clues about the nature of black holes. NOVA’s “Black Hole Apocalypse” premieres January 10 on PBS. NOVA on Facebook: https://www.facebook.com/NOVAonline NOVA on Twitter: @novapbs NOVA on Instagram: @novapbs

From playlist Previews

Video thumbnail

Do black holes "suck" things in?

Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us on Facebook: https://www.facebook.com/worldscienceu Follow us on Twitter: https://twitter.com/worldscienceu

From playlist Science Unplugged: Black Holes

Video thumbnail

CERIAS Security: Obfuscated Databases: Definitions and Constructions 3/6

Clip 3/6 Speaker: Vitaly Shmatikov · University of Texas at Austin I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

CERIAS Security: Obfuscated Databases: Definitions and Constructions 4/6

Clip 4/6 Speaker: Vitaly Shmatikov · University of Texas at Austin I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

CERIAS Security: Obfuscated Databases: Definitions and Constructions 5/6

Clip 5/6 Speaker: Vitaly Shmatikov · University of Texas at Austin I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

DEFCON 19: Hacking .Net Applications: The Black Arts

Speaker: Jon McCoy DigitalbodyGuard This presentation will cover the Black Arts of making Cracks, KeyGens, Malware, and more. The information in this presentation will allow a .NET programmer to do unspeakable things .NET applications. I will cover the life cycle of developing such attack

From playlist DEFCON 19

Video thumbnail

DEFCON 15: Fingerprinting and Cracking Java Obfuscated Code

Speaker: Subere The process of obfuscating intermediate platform independent code, such as Java bytecode or Common Intermediate Language (CIL) code aims to make the source code generated by reverse engineering much less useful to an attacker or competitor. This talk focuses on the examina

From playlist DEFCON 15

Video thumbnail

Black Hat USA 2010: GWT Security: Don't Get Distracted By Bright Shiny Objects 2/4

Speakers: David Byrne, Charles Henderson The Google Web Toolkit (GWT) produces some of the slickest web-based applications out there; it's easy to understand why it has been gathering popularity. But there's obviously more to writing a secure application than making the UI nice and shiny.

From playlist BH USA 2010 - WEB APPS

Video thumbnail

27c3: Code deobfuscation by optimization (en)

Speaker: Branko Spasojevic Optimization algorithms present an effective way for removing most obfuscations that are used today. Much of the compiler theory can be applied in removing obfuscations and building fast and reliable deobfuscation systems. By understanding traditional optimizati

From playlist 27C3: We come in peace

Video thumbnail

CERIAS Security: Obfuscated Databases: Definitions and Constructions 2/6

Clip 2/6 Speaker: Vitaly Shmatikov · University of Texas at Austin I will present some new definitions and constructions for privacy in large databases. In contrast to conventional privacy mechanisms that aim to prevent any access to individual records, our techniques are designed to

From playlist The CERIAS Security Seminars 2005 (1)

Video thumbnail

Black Hat USA 2010: JavaSnoop: How to Hack Anything Written in Java 4/4

Speaker: Arshan Dabirsiaghi Anybody who has assessed anything with a thick Java client has probably been frustrated beyond belief and unhappy with their coverage, but that's only because this tool hasn't been released yet. We created a tool that allows you to easily jump into any JVM on y

From playlist Black Hat USA 2010

Video thumbnail

What's On The Other Side Of A Black Hole? Hint: There Is No Other Side

Picture an entire star collapsed down into a gravitational singularity. An object with so much mass, compressed so tightly, that nothing, not even light itself can escape its grasp. It's no surprise these objects have captured our imagination... and yet, I have a complaint. The name "

From playlist Black Holes

Video thumbnail

How many black holes are there?

Subscribe to our YouTube Channel for all the latest from World Science U. Visit our Website: http://www.worldscienceu.com/ Like us on Facebook: https://www.facebook.com/worldscienceu Follow us on Twitter: https://twitter.com/worldscienceu

From playlist Science Unplugged: Black Holes

Video thumbnail

SOURCE Barcelona 2010: Balancing the Pwn Trade Deficit

Speaker: Val Smith China has become a major player in the security community in recent years.From numerous news articles regarding government, military and commercial spying, to high profile cases such as the recent attack on Google, the tools, research and hacking groups coming out of Ch

From playlist SOURCE Barcelona 2010

Related pages

Indistinguishability obfuscation | Cryptographic primitive | Computational hardness assumption | Digital signature | Obfuscation (software) | Pseudorandom function family | Circuit (computer science) | Cryptographic hash function | Message authentication | Turing machine | TC0 | Algorithm | Cryptography | Random oracle