Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Substitution cipher
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Graph Chatbot
Related lectures (27)
Login to filter by course
Login to filter by course
Reset
Cryptography: Caesar's Cipher
Delves into Caesar's Cipher, brute force decryption, letter permutations, and frequency analysis in cryptography.
Semantic Security: Stream Ciphers
Explores semantic security in stream ciphers, emphasizing pseudorandom number generators and computational limitations in cryptography.
Cryptography: Fundamentals and Applications
Introduces the fundamentals of cryptography, covering symmetric and asymmetric encryption, hash functions, key infrastructure, and data integrity.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Cryptography: Ancient Techniques to Modern Systems
Explores ancient cryptography techniques, the Enigma machine, Kirchhoff's principle, scalability in cryptography, Moore's Law, and a thought experiment on breaking a 128-bit key.
Previous
Page 2 of 2
Next