Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
ECB Penguin and Hashing
Graph Chatbot
Related lectures (32)
Previous
Page 1 of 4
Next
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
RSA: Trapdoor One-Way Functions
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Building End-to-End-Encrypted Systems
Explores challenges in building secure end-to-end-encrypted systems and proposes new cryptographic solutions to enhance data security.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.