Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Information-theoretic security
Applied sciences
Computer engineering
Computer security
Cryptanalysis
Graph Chatbot
Related lectures (29)
Login to filter by course
Login to filter by course
Reset
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Secure Multiparty Computation: Danish Sugar Beets Auction
Explores the Danish Sugar Beets Auction, Secure Multiparty Computation, and the design of secure protocols for privacy and correctness.
Exercise - Capsules and Group Selection
Covers exercises on capsules creation, group selection, and evaluation criteria.
RSA Encryption: Principles and Applications
Explores RSA encryption principles, factorization challenges, and practical applications in data security.
The Power of Interaction: Zero-Knowledge Construction
Explores zero-knowledge construction, setup models, and the power of interaction in cryptographic protocols, including Sigma Protocol and NP Zero-Knowledge Proofs.
Privacy Preserving Crypto I: Secure Multi-Party Computation
Explores Secure Multi-Party Computation, cryptographic techniques, threat models, additive secret shares, and real-world applications of privacy-preserving protocols.
Homomorphic Encryption: Fermat FHE
Covers fully homomorphic encryption modulo Fermat numbers and its applications.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Quantum Key Distribution: Security and Implementation
Explores Device Independent Quantum Key Distribution (DIQKD) principles, security proofs, and experimental demonstrations against quantum computer threats.
Previous
Page 2 of 2
Next