Lecture

Semantic Security: Stream Ciphers

Related lectures (39)
Information Theoretic Cryptography
Explores information-theoretic cryptography, focusing on secret communication and key generation.
Commitment Scheme: Key Derivation and Hash Function
Explains the commitment scheme, key derivation, and hash function for data security.
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Random Number Generators: Modulo Generator
Explores random number generators on computers, focusing on the Modulo generator and the criteria for pseudo random numbers.
Random Number Generators: Basics and Algorithms
Explores random number generators, from true random numbers to pseudo random algorithms, including the modulo generator and advanced techniques.
Random Number Generators: Schrage's Algorithm
Explores Schrage's algorithm for generating random numbers and shift-register generators in computers.
Random Number Generators: Properties and Examples
Covers uniform and pseudo-random number generators, properties, examples, and quality assessment through empirical tests.
Random Number Generators: Algorithms and Generators
Explores portable and non-portable random number generation algorithms and the shift-register generator concept.
Harmonic Response Experiment
Covers the harmonic response experiment using various function generators and oscilloscopes.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.