Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Randomness Extraction: Significance and Applications
Graph Chatbot
Related lectures (31)
Previous
Page 2 of 4
Next
Hashing and Sorting Techniques in Database Systems
Provides an overview of hashing and sorting techniques in database management systems, focusing on their implementation and performance optimization.
RSA: Privacy and Signatures
Explores RSA encryption for privacy and digital signatures, covering keys generation, decoding, possible attacks, hash functions, and cryptographic standards.
Hash Functions: Security and Applications
Explores hash functions, their security, common attacks, and applications in data verification and blockchain.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Applied Cryptography: Basics
Introduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Probabilistic Analysis: Hiring & Birthday Paradox
Explores probabilistic analysis in algorithms, covering the hiring problem and the birthday paradox, along with hash tables and functions.
Security Protocols and Applications: Introduction
Introduces a seminar where students present on various security topics and emphasizes the importance of correct cryptographic implementations.