Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
ROS Attack: Security Analysis
Graph Chatbot
Related lectures (31)
Previous
Page 1 of 4
Next
Technologies for Identity & Anonymity
Explores technologies for identity and anonymity, including e-ID, social media identities, and cryptographic signatures.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Hash Functions: Security and Applications
Explores hash functions, their security, common attacks, and applications in data verification and blockchain.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Proving Security: Random Oracle Model
Explores the Random Oracle Model, Hybrid ElGamal, and the Fujisaki Okamoto Transform in proving security.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Privacy-preserving authentication
Explores privacy-preserving authentication, covering credential issuance, cryptographic signatures, and revocation mechanisms.
Side-Channel Analysis: Isogeny-Based Key Encapsulation
Covers side-channel analysis of isogeny-based key encapsulation mechanisms and hash-based digital signatures, focusing on vulnerabilities and security measures in cryptographic systems.