Skip to main content
Graph
Search
fr
|
en
Switch to dark mode
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Anonymity in Communication: Tor and Cryptographic Protocols
Graph Chatbot
Related lectures (29)
Previous
Page 1 of 3
Next
E-Voting: Research and Challenges
Explores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Anonymous Communication: Motivations and Approaches
Explores motivations for anonymous communication and various approaches to achieve anonymity.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Privacy Technologies: Some Privacy Technologies (part II)
Explores anonymous communication systems, attribute-based credentials, the Tor network, and other privacy technologies.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Anonymous communications: Quantifying Anonymity
Delves into quantifying anonymity, naive approaches, DC-networks, and resolving collisions.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Digital Voting Systems: Security and Verifiability
Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.