Lecture

Zoom Encryption: E2E & Identity Properties

Related lectures (33)
RSA Encryption: Principles and Applications
Explores RSA encryption principles, factorization challenges, and practical applications in data security.
Building End-to-End-Encrypted Systems
Explores challenges in building secure end-to-end-encrypted systems and proposes new cryptographic solutions to enhance data security.
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
RSA: Trapdoor One-Way Functions
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Cryptography Fundamentals
Covers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.