Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Secure Communications: Biometric Passport Case Study
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Cryptographic Zoo: Fundamentals
Covers fundamental concepts of cryptography, including primitives, security, encryption, and authentication, exploring symmetric and public-key cryptography, key agreement, commitment schemes, and hash functions.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.