Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Commitment scheme
Applied sciences
Computer engineering
Computer security
Privacy-enhancing technologies
Graph Chatbot
Related lectures (9)
Login to filter by course
Login to filter by course
Reset
Commitment Scheme: Key Derivation and Hash Function
Explains the commitment scheme, key derivation, and hash function for data security.
Efficient Post-Quantum Commutative Group Action
Explores the CSIDH algorithm, a post-quantum cryptographic scheme based on isogenies, discussing its history, inner workings, and security.
Cryptography and Security
Covers cryptanalysis, security proofs, cryptographic schemes, and foundational concepts in a challenging Advanced Cryptography course.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Proving Security: Random Oracle Model
Explores the Random Oracle Model, Hybrid ElGamal, and the Fujisaki Okamoto Transform in proving security.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Cryptanalysis: The Power of Interaction
Explores the power of interaction in cryptographic primitives and conventional cryptanalysis techniques.
Applied Cryptography: Basics
Introduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Previous
Page 1 of 1
Next