Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Key exchange
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 4
Next
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Polymer Behavior: Force-Extension Curve
Delves into the entropic behavior of polymers through force-extension curves.
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Cryptography Basics
Introduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Crafting Successful Research Proposals: Storytelling and Visuals
Emphasizes the importance of storytelling and visuals in crafting successful research proposals.
Cosmic Microwave Background: Observations and Implications
Explores the Cosmic Microwave Background, its anisotropies, and cosmological implications through observations and statistical assessments.
Improving Models of the Ventral Visual Pathway
Explores computational models of the ventral visual system, focusing on optimizing networks for real-world tasks and comparing to brain data.
Cryptography: Secret Key
Introduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.
Diffie-Hellman Cryptography: Key Exchange and ElGamal Encryption
Covers the Diffie-Hellman key exchange protocol and the ElGamal public-key cryptosystem.
Equipment Key Users Module Presentation
Covers the presentation of the equipment key users module and its focus on planning, data loading, and integration tests.