Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Public-Key Cryptography: Post-Quantum and Access Control
Graph Chatbot
Related lectures (31)
Previous
Page 2 of 4
Next
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Asymmetric Cryptography: RSA, Elliptic Curves, Lattices
Explores RSA, elliptic curves, and lattice-based cryptography for secure communication.
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Untitled
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.
Cryptographic Security Fundamentals
Covers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Cryptography: Tools and Techniques
Explores cryptography basics, key exchange protocols, elliptic curve cryptography, and digital signatures for secure data transmission.
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Quantum Key Distribution: Security and Applications
By the instructor Nicolas Sangouard explores Quantum Key Distribution, its vulnerabilities to quantum computers, and the importance of secure key distribution protocols.