Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Electronic signature
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (30)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 3
Next
RSA Encryption: Principles and Applications
Explores RSA encryption principles, factorization challenges, and practical applications in data security.
Privacy-preserving authentication
Explores privacy-preserving authentication, covering credential issuance, cryptographic signatures, and revocation mechanisms.
Applied Cryptography: Hash Functions
Explores hash functions and their crucial role in cryptography, digital signatures, and blockchain technology.
Hashing: Basics and Security
Explores the basics and security aspects of hashing in data representation and verification.
Building Technology: General Introduction
Covers the principles of building technology, including building physics, structures, construction, and technical installations.
Information Security: Integrity and Responsibility
Explores cryptography for integrity and responsibility, emphasizing digital signatures and asymmetric cryptography.
Elliptic Curves and Factoring
Explores elliptic curves, factoring, and their role in cryptography, emphasizing standardization and applications.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Introduction to Security Protocols: Seminar Overview
Introduces the seminar on Security Protocols and Applications, detailing presentation expectations and grading criteria.
ECDSA Ring Signature
Explores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.