Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Key schedule
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (9)
Login to filter by course
Login to filter by course
Reset
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Chemical Kinetics: Reaction Rates
Covers chemical kinetics, reaction rates, pseudo-first-order method, and key products.
Symmetric Encryption: Block Ciphers and Modes of Operation
Introduces symmetric encryption, block ciphers, and modes of operation, covering DES, AES, key generation, attacks, and encryption standards.
Symmetric Encryption Schemes
Explores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Message Authentication Codes: Formalism
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Symmetric-key Cryptosystems
Introduces symmetric-key cryptosystems and the key concepts for secure communication.
Noise Protocol Framework: Building Secure Crypto Protocols
Covers the Noise Protocol Framework for designing secure channel protocols and its applications in real-world cryptography.
Public Key Cryptography: RSA
Explores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.
Diffie-Hellman Cryptography: Key Exchange and Attacks
Explores Diffie-Hellman key exchange, DDH problem, active attacks, and cryptographic protocol challenges.
Previous
Page 1 of 1
Next