Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Computer security
Applied sciences
Computer engineering
Computer security
Graph Chatbot
Related lectures (30)
Previous
Page 1 of 3
Next
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Untitled
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Untitled
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.