Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Efficient Post-Quantum Commutative Group Action
Graph Chatbot
Related lectures (32)
Previous
Page 3 of 4
Next
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Quantum Cryptography: Key Generation Protocol
Explores quantum cryptography, emphasizing key generation using the one-time pad protocol and the role of Eve in intercepting communication.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Secure Collaborative Systems: Building Efficient Protocols for Linear Models
Explores building efficient protocols for linear models in secure collaborative systems, emphasizing security guarantees and computational efficiency.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Proving Security: Random Oracle Model
Explores the Random Oracle Model, Hybrid ElGamal, and the Fujisaki Okamoto Transform in proving security.
Elliptic Curve Cryptography in Practice
Explores the practical applications of elliptic curve cryptography in various real-world scenarios and cryptographic operations.
Cryptography: Introduction
Explores the fundamentals of cryptography, its properties, historical development, and potential challenges from quantum computers.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.