Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Secure channel
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (10)
Login to filter by course
Login to filter by course
Reset
Trust Establishment: Cryptography and Security
Explores trust establishment in cryptography and security, covering secure channels, PKI vulnerabilities, and diverse cryptographic models.
Secure Communications: TLS and Security Protocols
Explores TLS, security protocols, synchronization, fair termination, and secure communication applications.
Contact Tracing and Cryptography
Explores contact tracing in public spaces and the role of cryptography in ensuring secure and private data transmission.
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Noise Protocol Framework: Building Secure Crypto Protocols
Covers the Noise Protocol Framework for designing secure channel protocols and its applications in real-world cryptography.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Homomorphic Encryption
Introduces homomorphic encryption, enabling computation on encrypted data without decryption, covering security, applications, and practical aspects.
Privacy-preserving authentication
Explores privacy-preserving authentication methods, zero-knowledge proofs, Schnorr's proof of identification, and their real-world applications.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Previous
Page 1 of 1
Next