Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Exponentiation
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Encryption Key Usage
Covers the usage of encryption keys in the context of image encryption using Scratch.
Asymmetric Cryptography: Basics and Applications
Explores asymmetric cryptography basics, including encryption, signatures, and Diffie-Hellman, along with advanced topics like RSA and quantum computing implications.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptographic Primitives: Theory and Practice
Explores fundamental cryptographic primitives, security models, and the relationship between decryption security and key recovery security.
Shor's Factoring Algorithm
Covers Shor's factoring algorithm, which efficiently factors large numbers using quantum computers.
Solving Parity Games in Practice
Explores practical aspects of solving parity games, including winning strategies, algorithms, complexity, determinism, and heuristic approaches.
Number Theory: Modular Exponentiation Examples
Covers examples of modular exponentiation, complexities, Lame's Theorem, Collatz Conjecture, and prime numbers.
Improved Algorithm: Three-Color Parity Games
Introduces an improved algorithm for three-color parity games, focusing on progress measures, acceleration, and practical speed-up.
RSA Cryptosystem: Encryption and Decryption Process
Covers the RSA cryptosystem, encryption, decryption, group theory, Lagrange's theorem, and practical applications in secure communication.
Complex Numbers: Polar Form
Showcases examples of complex numbers in polar form and their operations.