Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Key-agreement protocol
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 4
Next
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Secure Multiparty Computation: Danish Sugar Beets Auction
Explores the Danish Sugar Beets Auction, Secure Multiparty Computation, and the design of secure protocols for privacy and correctness.
Probabilistic Analysis: Hiring & Birthday Paradox
Explores probabilistic analysis in algorithms, covering the hiring problem and the birthday paradox, along with hash tables and functions.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Secure Collaborative Systems: Building Efficient Protocols for Linear Models
Explores building efficient protocols for linear models in secure collaborative systems, emphasizing security guarantees and computational efficiency.
Bluetooth Security: Pairing Protocols
Explores Bluetooth security, focusing on pairing protocols, key recovery, and active attacks in Bluetooth 2.0 and the enhanced Bluetooth 2.1 with Secure Simple Pairing (SSP).
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Generator of a Group
Explores checking a generator of a group, the Diffie-Hellman key exchange, and cryptographic algorithms.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Untitled