Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Probabilistic Analysis: Hiring & Birthday Paradox
Graph Chatbot
Related lectures (31)
Cryptography basics: Quantum Systems
Covers the basics of cryptography, encryption, decryption, error detection, and the impact of quantum computing.
Hashing: Basics and Applications
Explores hashing fundamentals, applications in security, and common attacks on hash functions.
Applied Cryptography: Symmetric Encryption and Hash Functions
Introduces symmetric encryption, hash functions, and their practical applications in cryptography.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Implementation of Sets: Hashing
Covers the implementation of sets using hashing and set operations.
Implementation of Sets (II)
Covers the implementation of sets using a naive approach and discusses the inefficiencies of the S list 7 class.
Implementation of Hash Sets
Covers the implementation details of hash sets and related methods using IntelliJ IDEA.
Two-Phase Construction: Arrays & Hash Tables
Explains two-phase construction for arrays, hash tables, and search trees in parallel.
Untitled
Dictionary Operations
Covers operations and methods related to dictionaries in Python, including creating, updating, and handling key errors.
Commitment Scheme and PRNG
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.
Previous
Page 2 of 2
Next