Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Proving Security: Random Oracle Model
Graph Chatbot
Related lectures (31)
Previous
Page 3 of 4
Next
Cryptographic Primitives: Theory and Practice
Explores fundamental cryptographic primitives, security models, and the relationship between decryption security and key recovery security.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Cryptography Basics
Introduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.
Cryptography: Introduction
Explores the fundamentals of cryptography, its properties, historical development, and potential challenges from quantum computers.
Asymmetric Cryptography: Signature and Diffie-Hellman
Explores asymmetric cryptography, signature generation, and Diffie-Hellman key exchange using the libnacl library.
Network Security - Transport Layer Security
Discusses the limitations of TCP, the TLS Handshake, and the vulnerabilities in TLS protocols, emphasizing the importance of provable security in TLS 1.3.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.