Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Differential cryptanalysis
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (19)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 2
Next
The Enigma Machine: History and Cryptanalysis
Delves into the history and cryptanalysis of the Enigma machine during World War II.
Cryptography and Security
Covers cryptanalysis, security proofs, cryptographic schemes, and foundational concepts in a challenging Advanced Cryptography course.
Cryptographic Security Models: Game Proof Methodology
Explores Cryptographic Security Models through the Game Proof Methodology, RSA Security, Rabin Cryptosystem, and Diffie-Hellman Security.
Raccoon Attack on TLS 1.2
Explores the Raccoon Attack, a timing attack on TLS-DH(E) that exploits most significant bit oracles.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Cryptography: Caesar's Cipher
Delves into Caesar's Cipher, brute force decryption, letter permutations, and frequency analysis in cryptography.
The Power of Interaction: Zero-Knowledge Construction
Explores zero-knowledge construction, setup models, and the power of interaction in cryptographic protocols, including Sigma Protocol and NP Zero-Knowledge Proofs.
Introduction to Cryptography: Basic Concepts
Covers the basic concepts of cryptography, including Caesar's and Vigenère's ciphers, privacy, authenticity, and message integrity.
Applied Cryptography: Basics
Introduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.