Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Substitution–permutation network
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (4)
Login to filter by course
Login to filter by course
Reset
Previous
Page 1 of 1
Next
Ancient Cryptography: Techniques and Principles
Explores ancient to modern cryptography techniques, including substitution ciphers, frequency analysis, and the Enigma machine.
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Symmetric Encryption: Basics and Techniques
Explores symmetric encryption basics, substitution ciphers, historical machines like Enigma, modern standards like AES, and asymmetric encryption.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.