Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
The Enigma Machine: History and Cryptanalysis
Graph Chatbot
Related lectures (29)
Previous
Page 3 of 3
Next
Cryptographic Zoo: Fundamentals
Covers fundamental concepts of cryptography, including primitives, security, encryption, and authentication, exploring symmetric and public-key cryptography, key agreement, commitment schemes, and hash functions.
Symmetric Encryption: Basics and Techniques
Explores symmetric encryption basics, substitution ciphers, historical machines like Enigma, modern standards like AES, and asymmetric encryption.
Ancient Cryptography: Techniques and Principles
Explores ancient to modern cryptography techniques, including substitution ciphers, frequency analysis, and the Enigma machine.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
SwissCovid and Privacy
Explores SwissCovid encryption, key verification, and privacy challenges in contact tracing.
Decentralized Systems Engineering
Explores decentralized systems engineering, covering database initialization, reliable messaging, consensus algorithms, and encryption protocols.
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
ECB Penguin and Hashing
Explores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Internet Capsules: Security and Privacy
Covers internet security, privacy, TLS, blocking, filtering, surveillance, and espionage.