Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Cryptographic nonce
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (15)
Login to filter by course
Login to filter by course
Reset
ROS Attack: Security Analysis
Explores the (in)security of ROS, k-sum problems, blind signatures, and Schnorr's Blind Signature.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Nonce-Based Cryptography
Explores nonce-based cryptography, emphasizing security in cryptographic schemes when randomness fails.
Mixnet based on Paillier
Explores a mixnet based on a secure verifiable shuffle system and its applications.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Hashing: Basics and Applications
Explores hashing fundamentals, applications in security, and common attacks on hash functions.
ECB Penguin and Hashing
Explores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Distributed Ledger Technology: Overview and Applications
Explores Distributed Ledger Technology, blockchains, decentralization, transparency, and challenges in current systems.
Cryptography: Ancient Techniques to Modern Systems
Explores ancient cryptography techniques, the Enigma machine, Kirchhoff's principle, scalability in cryptography, Moore's Law, and a thought experiment on breaking a 128-bit key.
Modern Cryptography Milestones
Explores the evolution of modern cryptography milestones and the limitations of information theory in practical applications.
Ancient Cryptography: Security and Information Theory
Explores ancient cryptography, key security, perfect secrecy, and the Shannon encryption model.
Cryptography and Information Theory
Explores cryptography, perfect secrecy, group theory, and modern cryptographic milestones, emphasizing the trade-off between security and cost.
Introduction to Cryptography: One-Time Pad and Public-Key Systems
Introduces cryptography, focusing on the one-time pad and public-key systems, emphasizing privacy and authenticity in information security.
Blockchain: Introduction and Evolution
Covers the introduction and evolution of blockchains, including decentralization, trusted third parties, and the history of blockchain technology.
Public-Key Cryptography: ECDSA and BLS
Explores ECDSA and BLS signature schemes, NFC credit card payment, and breaking RSA and DH cryptography.
Previous
Page 1 of 1
Next