Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Computer security
Applied sciences
Computer engineering
Computer security
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
RSA Encryption: Principles and Applications
Explores RSA encryption principles, factorization challenges, and practical applications in data security.
Cryptanalysis: The Power of Interaction
Explores the power of interaction in cryptographic primitives and conventional cryptanalysis techniques.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Authentication - Tokens
Covers the concept of tokens, how they work, and the implementation of two-factor authentication.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Cryptography: Tools and Techniques
Explores cryptography basics, key exchange protocols, elliptic curve cryptography, and digital signatures for secure data transmission.
RSA: Trapdoor One-Way Functions
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Block Ciphers: Modes and WiFi Security
Explores block ciphers, stream ciphers, and WiFi security vulnerabilities, emphasizing the importance of encryption in modern communication.