Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Caesar cipher
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Graph Chatbot
Related lectures (15)
Login to filter by course
Login to filter by course
Reset
Perfect Secrecy: One-time Pad
Explores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Linear Applications: Rank and Ciphers
Covers linear applications, rank, and ciphers, emphasizing the importance of understanding the rank of linear transformations.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Introduction to Cryptography: Basic Concepts
Covers the basic concepts of cryptography, including Caesar's and Vigenère's ciphers, privacy, authenticity, and message integrity.
Information Encoding: Compression, Error Correction, Cryptography
Introduces information encoding through compression, error correction, and cryptography, with interactive gameplay on data security and encryption.
Ancient Cryptography: Techniques and Principles
Explores ancient to modern cryptography techniques, including substitution ciphers, frequency analysis, and the Enigma machine.
Communication Theory of Secrecy Systems
Explores C. E. Shannon's theory of secrecy systems, covering various ciphers and the concept of perfect secrecy in communication systems.
Symmetric Encryption: Basics and Techniques
Explores symmetric encryption basics, substitution ciphers, historical machines like Enigma, modern standards like AES, and asymmetric encryption.
Cryptography: Caesar's Cipher
Delves into Caesar's Cipher, brute force decryption, letter permutations, and frequency analysis in cryptography.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Markov Chain Monte Carlo: Sampling High-Dimensional Distributions
Covers Markov Chain Monte Carlo for sampling high-dimensional distributions, discussing challenges, advantages, and applications like the Knapsack Problem and cryptography.
Discrete Log Problem: Index Calculus
Explores the discrete log problem and index calculus method in cryptography.
Modern Cryptography Milestones
Explores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Previous
Page 1 of 1
Next