ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

117 results

The Random Professor
el gamal encryption

For more cryptography, subscribe @TheRandomProfessor.

7:57
el gamal encryption

68,156 views

10 years ago

The Random Professor
The Elgamal Cryptosystem

The Elgamal cryptosystem. For more math, subscribe to my channel: https://www.youtube.com/jeffsuzuki1.

5:51
The Elgamal Cryptosystem

853 views

4 years ago

The Random Professor
Elgamal Digital Signature Example

An example of the Elgamal Digital Signature algorithm. For more math, subscribe to my channel: ...

4:49
Elgamal Digital Signature Example

8,078 views

4 years ago

The Random Professor
Digital Signatures:  The Elgamal Signature scheme

Designing a digital signature scheme, using Elgamal. For more math, subscribe to my channel: ...

8:53
Digital Signatures: The Elgamal Signature scheme

4,076 views

5 years ago

The Random Professor
Inventing a Digital Signature Algorithm

First steps towards making the Elgamal Digital Signature Algorithm practical. For more math, subscribe to my channel: ...

5:34
Inventing a Digital Signature Algorithm

262 views

4 years ago

Syed Matheen Pasha
Elgamal Technique
9:47
Elgamal Technique

26 views

4 years ago

Tanja Lange: Cryptology
DL systems over finite fields I - ElGamal encryption and KEM-DEM framework

This video is part of the course 2MMC10 Cryptology at Eindhoven University of Technology. For more information see the course ...

18:26
DL systems over finite fields I - ElGamal encryption and KEM-DEM framework

393 views

4 years ago

Tanja Lange: Intro to crypto
ElGamal encryption and signature

Part of Introduction to Cryptology https://hyperelliptic.org/tanja/teaching/CS20/ Slides at ...

11:57
ElGamal encryption and signature

658 views

5 years ago

Vu Hung Nguyen (Hưng)
10 Diffie-Hellman & ECC: The Art of Secure Key Exchange #AI #NLP #Tech #Podcast #Learning

Demystifying Public-Key Cryptosystems: Diffie-Hellman, Elgamal & ECC Explained! Overview: Dive deep into other fundamental ...

7:09
10 Diffie-Hellman & ECC: The Art of Secure Key Exchange #AI #NLP #Tech #Podcast #Learning

5 views

3 months ago

Vu Hung Nguyen (Hưng)
13 Digital Signatures: Securing Authenticity & Trust #AI #NLP #Tech #Podcast #Learning

Demystifying Digital Signatures: From ElGamal to DSS Overview: This episode provides a comprehensive look into digital ...

7:20
13 Digital Signatures: Securing Authenticity & Trust #AI #NLP #Tech #Podcast #Learning

1 view

3 months ago

internet-class
What is a trapdoor function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

4:06
What is a trapdoor function?

19,493 views

9 years ago

Ethereum Foundation
Cryptography on the Blockchain

... in solidity) that supports El Gamal Encryption, One out of Two ZKP (i.e. either yes or no is encrypted), Pederson Commitments, ...

15:43
Cryptography on the Blockchain

1,678 views

8 years ago

MOOC de l'IMT
Algorithme de signature et corps finis 🔑 Blockchain : enjeux et mécanismes cryptographiques

Ce mooc est destiné aux personnes souhaitant comprendre les enjeux de la blockchain, les appliquer et les utiliser pour la ...

6:13
Algorithme de signature et corps finis 🔑 Blockchain : enjeux et mécanismes cryptographiques

1,054 views

3 years ago

UTeM MOOC
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

INFORMATION TECHNOLOGY SECURITY_UTEM_MOOC.

6:54
LECTURE 2 - AUTHENTICATION AND BASIC CRYPTOGRAPHY (PART 4)

30 views

9 years ago

PyCon Taiwan
Computation Techniques for Encrypted Data Using Python|Gajendra Deshpande|PyCon TW 2020

PyCon Taiwan 2020|一般演講 Talks 摘要 Abstract The session begins with a discussion on homomorphic properties of ...

12:54
Computation Techniques for Encrypted Data Using Python|Gajendra Deshpande|PyCon TW 2020

100 views

5 years ago

IACR
Trapdoor Functions from the Computational Diffie Hellman Assumption

Paper by Sanjam Garg and Mohammad Hajiabadi, presented at Crypto 2018.

19:16
Trapdoor Functions from the Computational Diffie Hellman Assumption

770 views

7 years ago

The Random Professor
GGH Cryptosystem Example

Orthogonal vectors and that means that we can apply ai's algorithm to find the closest lattice point so she uses her private basis ...

6:57
GGH Cryptosystem Example

3,328 views

10 years ago

CH 30: IIT KHARAGPUR 02: Computer Science & Others
Fully Homomorphic Encryption - Part 3 #CH30SP #swayamprabha

Subject : Computer Science Course Name : Quantum Algorithms and Cryptography Welcome to Swayam Prabha!

16:35
Fully Homomorphic Encryption - Part 3 #CH30SP #swayamprabha

1 view

1 year ago

IACR
Multi Input Inner Product Functional Encryption from Pairings

Paper by Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee presented at Eurocrypt 2017.

18:30
Multi Input Inner Product Functional Encryption from Pairings

505 views

8 years ago

The Random Professor
Digital Signatures:  Breaking the RSA Signature Scheme

You can use RSA for identification, but you can't use it to sign documents. Here's why. For more math, subscribe to my channel: ...

5:55
Digital Signatures: Breaking the RSA Signature Scheme

2,618 views

6 years ago