Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Sponge function
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (6)
Login to filter by course
Login to filter by course
Reset
Bluetooth Security: Pairing Protocols
Explores Bluetooth security, focusing on pairing protocols, key recovery, and active attacks in Bluetooth 2.0 and the enhanced Bluetooth 2.1 with Secure Simple Pairing (SSP).
Mobile Telephony Security
Explores the security challenges and improvements in mobile telephony, covering encryption algorithms, protocols, and integrity/authentication issues.
Cryptographic Hash Functions and Block Chains
Covers cryptographic hash functions, message authentication codes, and block chains, including bitcoins, proof-of-work, and MAC variants.
Authentication - Tokens
Covers the concept of tokens, how they work, and the implementation of two-factor authentication.
Public-Key Cryptography: Fundamentals and Applications
Explores public-key cryptography, covering key exchange, signature schemes, and real-world applications like the Signal protocol.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Previous
Page 1 of 1
Next