Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Cryptanalysis
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Related lectures (28)
Graph Chatbot
Previous
Page 3 of 3
Next
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Number Theory: Foundations and Applications in Cryptography
Introduces number theory and its essential applications in cryptography.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Internet Network: Opportunities and Dangers
Explores the opportunities and dangers of the internet network, including Enigma, TLS, DES, ChaCha20, AES, and known attacks.
Block Ciphers: Modes and WiFi Security
Explores block ciphers, stream ciphers, and WiFi security vulnerabilities, emphasizing the importance of encryption in modern communication.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Applied Cryptography: Symmetric Confidentiality
Explores symmetric cryptography for confidentiality, covering stream ciphers, block ciphers, and their modes of operation.
Coppersmith's Method: Small Roots of Polynomials Mod N
Covers Coppersmith's method for finding small roots of polynomials modulo N efficiently.