Skip to main content
Graph
Search
fr
|
en
Switch to dark mode
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Anonymous Credentials: Binding Identity to Physical Authentication
Graph Chatbot
Related lectures (32)
Previous
Page 3 of 4
Next
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
Time-Lock Encryption: Practical Applications and Algorithms
Provides an overview of time-lock encryption and its practical applications, focusing on threshold time-lock encryption algorithms and their security properties.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Cryptography: Basics and Concepts
Covers advanced cryptography topics and key concepts for safe communication.
Authentication - Tokens
Covers the concept of tokens, how they work, and the implementation of two-factor authentication.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Elliptic Curves and Lattices
Explores Elliptic Curve Discrete Logarithm Problem, lattice-based cryptography, and cryptographic schemes like ECDSA.
Authentication and Best Practices: Challenges and Solutions
Explores authentication, identity theft risks, privacy protection, and ethical data handling.
Privacy Preserving Crypto I: Secure Multi-Party Computation
Explores Secure Multi-Party Computation, cryptographic techniques, threat models, additive secret shares, and real-world applications of privacy-preserving protocols.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.