Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Homomorphic Encryption: Applications and Implementations
Graph Chatbot
Related lectures (30)
Previous
Page 1 of 3
Next
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Asymmetric Cryptography: Basics and Applications
Explores asymmetric cryptography basics, including encryption, signatures, and Diffie-Hellman, along with advanced topics like RSA and quantum computing implications.
Cryptography: Tools and Techniques
Explores cryptography basics, key exchange protocols, elliptic curve cryptography, and digital signatures for secure data transmission.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.