Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Decrypt Your Avatar
Graph Chatbot
Related lectures (32)
Previous
Page 2 of 4
Next
Decentralized Systems Engineering
Explores decentralized systems engineering, covering database initialization, reliable messaging, consensus algorithms, and encryption protocols.
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
Privacy Technologies: End-to-End Encryption and Metadata Protection
Explores end-to-end encryption, metadata sensitivity, and the role of traffic analysis in intelligence gathering.
Internet Network: Opportunities and Dangers
Explores the opportunities and dangers of the internet network, including Enigma, TLS, DES, ChaCha20, AES, and known attacks.
ECB Penguin and Hashing
Explores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Internet Capsules: Security and Privacy
Covers internet security, privacy, TLS, blocking, filtering, surveillance, and espionage.
Encryption Key Usage
Covers the usage of encryption keys in the context of image encryption using Scratch.
Time-Lock Encryption: Practical Applications and Algorithms
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
The Enigma Machine: History and Cryptanalysis
Delves into the history and cryptanalysis of the Enigma machine during World War II.
Exercise: Choosing Capsules
Covers a series of exercises related to encryption functions, starting with basic ones and progressing to modern encryption methods.