Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Mobile Telephony Security
Graph Chatbot
Related lectures (32)
Previous
Page 2 of 4
Next
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Symmetric Encryption: Physical Limits
Explores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Modern Cryptography Milestones
Explores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Block Ciphers: Modes and WiFi Security
Explores block ciphers, stream ciphers, and WiFi security vulnerabilities, emphasizing the importance of encryption in modern communication.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Cryptography: General Framework
Explores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Post-Quantum Cryptography: Formalism and Access Control
Covers the formalism of post-quantum cryptography and access control mechanisms.