Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Digital signature
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Related lectures (31)
Graph Chatbot
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Cryptographic Security Models
Explores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Cryptography Basics
Introduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Privacy-Preserving Authentication: Mercurial Signatures
Introduces Attribute-Based Credentials and Mercurial Signatures, discussing privacy concerns with authentication and the importance of preserving user privacy.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Cryptanalysis: Public-Key & The Power of Interaction
Explores cryptanalysis in public-key systems and the power of interaction in interactive proofs, covering CO-NP, NP classes, P vs. NP, and more.
Asymmetric Cryptography: Signature and Diffie-Hellman
Explores asymmetric cryptography, signature generation, and Diffie-Hellman key exchange using the libnacl library.
Elliptic Curves and Lattices
Explores Elliptic Curve Discrete Logarithm Problem, lattice-based cryptography, and cryptographic schemes like ECDSA.