Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Zoom Encryption: E2E & Identity Properties
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Privacy-preserving authentication
Explores privacy-preserving authentication, covering credential issuance, cryptographic signatures, and revocation mechanisms.
Diffie-Hellman Key Exchange and ElGamal Cryptosystem
Explores Diffie-Hellman key exchange and ElGamal cryptosystem, discussing their security aspects and applications in RSA, emphasizing the Chinese Remainder Theorem's role in speeding up decryption and proving RSA correctness.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Noise Protocol Framework: Building Secure Crypto Protocols
Covers the Noise Protocol Framework for designing secure channel protocols and its applications in real-world cryptography.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.