Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
ElGamal encryption
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (29)
Login to filter by course
Login to filter by course
Reset
Cryptographic Security Models
Explores Cryptographic Security Models, including Diffie-Hellman and ElGamal Security, RSA, and practical encryption problems.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Zoom Encryption: E2E & Identity Properties
Explores the implementation of E2E Encryption in Zoom meetings, focusing on key management, identity verification, and real-time security measures.
Diffie-Hellman Cryptography: Key Exchange and ElGamal Encryption
Covers the Diffie-Hellman key exchange protocol and the ElGamal public-key cryptosystem.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Symmetric Encryption: Basics and Techniques
Introduces symmetric encryption basics, covering encryption, decryption, keys, substitution ciphers, DES, AES, ChaCha20, and asymmetric encryption.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Trapdoor One-Way Functions in Cryptography
Explores trapdoor one-way functions in cryptography and how they enable secure communication between Alice and Bob.
Untitled
Cryptographic Primitives: Theory and Practice
Explores fundamental cryptographic primitives, security models, and the relationship between decryption security and key recovery security.
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Diffie-Hellman Cryptography: Key Exchange & ElGamal
Covers Diffie-Hellman key exchange, DDH problem, ElGamal cryptosystem, and security implications.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
RSA Encryption: Setup and Message Sending
Explains RSA encryption setup, message sending, and defense protocols against attacks.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Homomorphic Encryption: Basics and Applications
Covers homomorphic encryption using elliptic curves and its applications in decentralized systems.
Previous
Page 1 of 2
Next