Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Applied Cryptography: Symmetric Confidentiality
Graph Chatbot
Related lectures (28)
Previous
Page 3 of 3
Next
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Semantic Security: Stream Ciphers
Explores semantic security in stream ciphers, emphasizing pseudorandom number generators and computational limitations in cryptography.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Linear Applications: Rank and Ciphers
Covers linear applications, rank, and ciphers, emphasizing the importance of understanding the rank of linear transformations.
Symmetric Encryption: Formalism and Security
Explores the formalism and security aspects of symmetric encryption systems, including block ciphers, variable length encryption, and security definitions.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.