Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Applied Cryptography: Symmetric Encryption and Hash Functions
Graph Chatbot
Related lectures (28)
Previous
Page 3 of 3
Next
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Noise Protocol Framework: Building Secure Crypto Protocols
Covers the Noise Protocol Framework for designing secure channel protocols and its applications in real-world cryptography.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Applied Cryptography: Symmetric Confidentiality
Explores symmetric cryptography for confidentiality, covering stream ciphers, block ciphers, and their modes of operation.
Cryptography Basics
Introduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Cryptography Basics
Covers authentication, authorization, encryption techniques, vulnerabilities, and the impact of quantum computing on cryptography.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.