Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Efficient Set Accumulators: Verifiable Computation Techniques
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Security Protocols and Applications: Introduction
Introduces a seminar where students present on various security topics and emphasizes the importance of correct cryptographic implementations.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Quantum Cryptography: Building Security in a Quantum World
Explores quantum computing's impact on cryptography, focusing on vulnerabilities, proof systems, and future research directions.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.