Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Cryptographic primitive
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 4
Next
Anonymity in Communication: Tor and Cryptographic Protocols
Explores anonymity in communication, focusing on Tor, cryptographic protocols, and challenges in achieving perfect anonymity.
Zoom Encryption: E2E & Identity Properties
Explores the implementation of E2E Encryption in Zoom meetings, focusing on key management, identity verification, and real-time security measures.
Security Protocols and Applications: Introduction
Introduces a seminar where students present on various security topics and emphasizes the importance of correct cryptographic implementations.
Generator of a Group
Explores checking a generator of a group, the Diffie-Hellman key exchange, and cryptographic algorithms.
Secure Communications: Biometric Passport Case Study
Explores the shift to secure communications through the biometric passport case study, covering RFID, identity examples, MRTD, EAC, and cryptographic protocols.
Hash Functions: Security and Applications
Explores hash functions, their security, common attacks, and applications in data verification and blockchain.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Efficient Set Accumulators: Verifiable Computation Techniques
Covers efficient set accumulators and their role in verifiable computation techniques.
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Discrete Exponentiation Complexity
Explores discrete exponentiation complexity, cyclic groups, and practical cryptography, including popular algorithms like Diffie-Hellman and RSA.