Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Salt (cryptography)
Applied sciences
Computer engineering
Computer security
Password security
Graph Chatbot
Related lectures (12)
Login to filter by course
Login to filter by course
Reset
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Stream Ciphers: Buteforce Inversion Algorithms
Explores stream ciphers, buteforce inversion algorithms, key recovery games, and attacks in cryptography.
Data Security: Hashing, Salting, and Password Storage
Emphasizes the significance of hashing, salting, and secure password storage in data security, highlighting the use of salt to prevent dictionary attacks and memory hard functions to slow down password cracking.
Hashing: Basics and Applications
Explores hashing fundamentals, applications in security, and common attacks on hash functions.
Authentication: Passwords
Covers the importance of passwords in authentication, including secure transfer, storage, and checking techniques.
Homomorphic Encryption
Explores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Distributed Ledger Technology: Overview and Applications
Explores Distributed Ledger Technology, blockchains, decentralization, transparency, and challenges in current systems.
Untitled
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
ECB Penguin and Hashing
Explores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Non-Attributable Email: Forward-Forgeable Signatures
Explores non-attributable email using forward-forgeable signatures and the legal risks faced by security researchers.
Safe Machine Learning: Cryptographic Opportunities
Explores the intersection between machine learning and cryptography, focusing on safe machine learning through cryptographic tools and models.
Previous
Page 1 of 1
Next