Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Authentication protocol
Applied sciences
Computer engineering
Computer security
Authentication
Graph Chatbot
Related lectures (28)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 3
Next
Postquantum TLS: Key Exchange and Authentication
Explores Post-Quantum TLS implementation without handshake signatures, focusing on key exchange and authentication using KEM.
Formally Secure Compilation: Ensuring Component Security
Explores formally secure compilation, emphasizing the importance of mathematical proofs and compartmentalization in ensuring component security.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Cryptography Fundamentals
Covers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Diffie-Hellman Cryptography: Key Exchange and Attacks
Explores Diffie-Hellman key exchange, DDH problem, active attacks, and cryptographic protocol challenges.