This dissertation is separated into two parts according to the two major distinct research projects. In Part I, the full account of synthetic studies toward C10-functionalized lycopodium alkaloids is described. In Part II, the detailed discussion on the exploration of the Pummerer cyclization methodology and its application to the total...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...