Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Chosen-plaintext attack
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Related lectures (19)
Graph Chatbot
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 2
Next
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Hashing: Basics and Security
Explores the basics and security aspects of hashing in data representation and verification.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Hash Functions: Security and Applications
Explores hash functions, their security, common attacks, and applications in data verification and blockchain.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Quantum Decision-Making: Neural Network Privacy
Covers the quantum decision-making model and its implications for neural network privacy and image recognition.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
Coppersmith's Method: Small Roots of Polynomials Mod N
Covers Coppersmith's method for finding small roots of polynomials modulo N efficiently.