Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Attack model
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Graph Chatbot
Related lectures (6)
Login to filter by course
Login to filter by course
Reset
Perfect Secrecy: One-time Pad
Explores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Symmetric Encryption: Formalism and Security
Explores the formalism and security aspects of symmetric encryption systems, including block ciphers, variable length encryption, and security definitions.
Cryptanalysis: The Power of Interaction
Explores the power of interaction in cryptographic primitives and conventional cryptanalysis techniques.
Quantum Decision-Making: Neural Network Privacy
Covers the quantum decision-making model and its implications for neural network privacy and image recognition.
Fully Homomorphic Encryption (FHE)
Covers Fully Homomorphic Encryption (FHE) based on Gentry's 2009 scheme, explaining encryption, decryption, and multiplication processes.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Previous
Page 1 of 1
Next