Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Category
Cryptanalysis
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Graph Chatbot
Related lectures (28)
Perfect Secrecy: One-time Pad
Explores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Introduction to Cryptography: Basic Concepts
Covers the basic concepts of cryptography, including Caesar's and Vigenère's ciphers, privacy, authenticity, and message integrity.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Ancient Cryptography: Techniques and Principles
Explores ancient to modern cryptography techniques, including substitution ciphers, frequency analysis, and the Enigma machine.
Cryptanalysis: The Power of Interaction
Explores the power of interaction in cryptographic primitives and conventional cryptanalysis techniques.
Communication Theory of Secrecy Systems
Explores C. E. Shannon's theory of secrecy systems, covering various ciphers and the concept of perfect secrecy in communication systems.
Linear Applications: Rank and Ciphers
Covers linear applications, rank, and ciphers, emphasizing the importance of understanding the rank of linear transformations.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Modern Cryptography Milestones
Explores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Symmetric Encryption: Basics and Techniques
Explores symmetric encryption basics, substitution ciphers, historical machines like Enigma, modern standards like AES, and asymmetric encryption.
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Discrete Log Problem: Index Calculus
Explores the discrete log problem and index calculus method in cryptography.
Cryptography: Caesar's Cipher
Delves into Caesar's Cipher, brute force decryption, letter permutations, and frequency analysis in cryptography.
Untitled
Symmetric Encryption: Formalism and Security
Explores the formalism and security aspects of symmetric encryption systems, including block ciphers, variable length encryption, and security definitions.
Cryptography Fundamentals
Delves into the core principles of cryptography, emphasizing the challenges of key management and the impact of technology advancement on security.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Information Encoding: Compression, Error Correction, Cryptography
Introduces information encoding through compression, error correction, and cryptography, with interactive gameplay on data security and encryption.
Previous
Page 1 of 2
Next