Skip to main content

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
Berkeley University of California
Home Home

Main navigation

  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • Participate
    • Apply to Participate
    • Propose a Program
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
    • Chancellor's Professors
  • News & Videos
    • News
    • Videos
  • Support for the Institute
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • For Visitors
    • Visitor Guide
    • Plan Your Visit
    • Location & Directions
    • Accessibility
    • Building Access
    • IT Guide
  • About

Results 1981 - 1990 of 23898

People

Alekh Agarwal

Image
Ambuj Tewari
(University of Michigan)
Image
Saptarshi Chakraborty
(University of Michigan)
Image
Jacob Abernethy
(Georgia Institute of Technology)
Page
|
Sept. 30, 2025

Eleventh Annual Industry Day-Dinner Confirmation

These programs have been sponsored in part by the Quantum Pod.

Quantum Research Pod
Image

Quantum Research Pod

In the wake of the National Quantum Initiative, the Simons Institute’s Research Pod in Quantum Computing brings together researchers from computer...

Explore Quantum Research Pod
Researchers
Image
Image
Arjan Cornelissen
Image
+12
Umesh Vazirani, Arjan Cornelissen, Jiaqi Leng, +12
Explore Quantum Research Pod
Workshop Talk
|
June 9, 2025

Cryptography and Meta-Complexity

Meta-complexity refers to the study of the computational complexity of computing natural complexity measures, such as time-bounded Kolmogorov complexity and the minimal circuit size. Despite decades of interest, important basic questions about these problems remain unresolved.

In this talk I will present few open questions in the field, and their implications on cryptography.

Workshop Talk
|
June 9, 2025

Codes and Extractors Against Bounded Adversaries

Classical results starting with [Lipton92] showed that it is possible to construct better error-correcting codes when assuming that the adversary is computationally bounded. Specifically, it is possible to construct codes with better rates than what is possible information-theoretically (when the adversary is computationally unbounded). In this talk, I will present new results in this area, together with connections to multi-input correlation intractable hash functions.

I will also briefly mention some results in complexity and derandomization. Specifically, I will discuss recent progress on constructing seedless extractors for samplable distributions and their relationship to new notions of hardness in complexity theory.

Workshop Talk
|
June 9, 2025

The Rate of Cryptography

Our society increasingly relies on computations over the Internet. Typically, these follow a centralised paradigm, where clients delegate the computation to a trusted authority, giving it access to the inputs. This inevitably raises security concerns: what happens if the authority’s server were to be taken over by an attacker?

Secure multiparty computation (MPC) studies protocols that avoid this type of single points of failure, ensuring the privacy of the inputs and the correctness of the outputs even if a subset of participants were to be corrupted.
In my research, I investigate the cost of these solutions: given any notion of complexity, what is the maximum ratio between the cost of the insecure protocol and that of the secure solution?

In this talk, I describe how I have tackled this question by studying simpler primitives: distributed samplers, homomorphic secret-sharing, trapdoor hashing and laconic function evaluation. I give a brief discussion of these problems and an overview of open questions I would like to explore.

Pagination

  • Previous page Previous
  • Page 197
  • Page 198
  • Current page 199
  • Page 200
  • Page 201
  • Next page Next
Home
The Simons Institute for the Theory of Computing is the world's leading venue for collaborative research in theoretical computer science.

Footer

  • Programs & Events
  • Participate
  • Workshops & Symposia
  • Contact Us
  • Calendar
  • Accessibility

Footer social media

  • Twitter
  • Facebook
  • Youtube
© 2013–2026 Simons Institute for the Theory of Computing. All Rights Reserved.
link to homepage

Main navigation

  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • Participate
    • Apply to Participate
    • Propose a Program
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
    • Chancellor's Professors
  • News & Videos
    • News
    • Videos
  • Support for the Institute
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • For Visitors
    • Visitor Guide
    • Plan Your Visit
    • Location & Directions
    • Accessibility
    • Building Access
    • IT Guide
  • About

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
link to homepage