Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Public key infrastructure
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (30)
Login to filter by course
Login to filter by course
Reset
Public Key Infrastructure: Security and Accountability
Covers the relationship between Public Key Infrastructure and provable security, focusing on cryptography, accountability, and certificate management.
Untitled
Overview: Distributed Information Systems
Covers distributed information systems, including key challenges and evaluation of quality, trust, and privacy in information.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Consensus Mechanisms: Bitcoin and Distributed Ledger Technology
Explores permissionless and permissioned consensus in Bitcoin, covering information-based money, public keys, and asynchronous pacing mechanisms.
Anonymous Authorization: Privacy Engineering Toolbox
Covers anonymous authorization, zero-knowledge proofs, attribute-based credentials, and practical issues in anonymous authentication.
Quantum Key Distribution: Security and Applications
By the instructor Nicolas Sangouard explores Quantum Key Distribution, its vulnerabilities to quantum computers, and the importance of secure key distribution protocols.
Public-Key Cryptography: Standards and Applications
Discusses public-key cryptography, focusing on standards like RSA, DSA, and AES, and their applications in secure communications.
Cryptography Basics
Introduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Cryptography: Tools and Techniques
Explores cryptography basics, key exchange protocols, elliptic curve cryptography, and digital signatures for secure data transmission.
Previous
Page 2 of 2
Next