Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Applied Cryptography: Symmetric Encryption and Hash Functions
Graph Chatbot
Related lectures (28)
Previous
Page 2 of 3
Next
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Modern Cryptography Milestones
Explores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Applied Cryptography: Basics
Introduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Perfect Secrecy: One-time Pad
Explores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Untitled
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.