Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Cryptography: symmetric crypto
Graph Chatbot
Related lectures (28)
Previous
Page 1 of 3
Next
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Applied Cryptography: Symmetric Confidentiality
Explores symmetric cryptography for confidentiality, covering stream ciphers, block ciphers, and their modes of operation.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.
Block Ciphers: Modes and WiFi Security
Explores block ciphers, stream ciphers, and WiFi security vulnerabilities, emphasizing the importance of encryption in modern communication.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Symmetric Encryption: Basics and Techniques
Explores symmetric encryption basics, substitution ciphers, historical machines like Enigma, modern standards like AES, and asymmetric encryption.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.