ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

37 results

Zemedia
The Diffie-Hellman-Merkle Key Exchange

Produced to support Teaching Activity group project for COMP6046, MSc Web Science, Semester 1, 2013/14 - University of ...

2:35
The Diffie-Hellman-Merkle Key Exchange

7,620 views

12 years ago

OCLPhase2
Diffie-Hellman-Merkle Key Exchange

(male narrator) So let's go through the process of the Diffie-Hellman-Merkle key exchange. Uh...so remember, the idea... the really ...

4:57
Diffie-Hellman-Merkle Key Exchange

76,859 views

13 years ago

VaNTAGe
Wouter Castryck, An efficient key recovery attack on supersingular isogeny Diffie-Hellman

VaNTAGe Seminar, October 18, 2022 License: CC-BY-NC-SA Links to some of the papers mentioned in this talk: ...

1:07:32
Wouter Castryck, An efficient key recovery attack on supersingular isogeny Diffie-Hellman

1,150 views

3 years ago

KhanAcademyTurkce
Diffie-Hellman Anahtar Değişimi (Bilgisayar Bilimi / Kriptografiye Yolculuk)

... Khan Academy'nin İngilizce ve diğer dillerdeki dersleri için: http://www.khanacademy.org Diffie-Hellman Key Exchange: ...

2:49
Diffie-Hellman Anahtar Değişimi (Bilgisayar Bilimi / Kriptografiye Yolculuk)

10,507 views

11 years ago

Tom Olzak
Cryptography Part 3: Asymmetric Encryption

In this lesson, I walk through how asymmetric encryption works, how it is managed with PKI, and how it is used. You can download ...

13:06
Cryptography Part 3: Asymmetric Encryption

863 views

4 years ago

Sequoia PGP
Moving forward: Forward Secrecy in OpenPGP

In this presentation, Justus presents ideas on how to realize forward secrecy while still preserving the ability to encrypt data at rest ...

27:48
Moving forward: Forward Secrecy in OpenPGP

615 views

7 years ago

Electromagnetic Field
David Buchanan: Modern Cryptography from Scratch, in Scratch

... encryption with ChaCha20-Poly1305, and X25519 Elliptic-Curve Diffie-Hellman key exchange (both used in modern protocols), ...

28:17
David Buchanan: Modern Cryptography from Scratch, in Scratch

447 views

2 years ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 1)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

8:55
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 1)

240 views

10 years ago

Q-Leap Edu Quantum Communications
9-1 Three phases of cryptographically secure communication

Lesson 9 BB84: Single-photon QKD Step 1: Three phases of cryptographically secure communication We begin this lesson by ...

3:09
9-1 Three phases of cryptographically secure communication

1,877 views

4 years ago

OCLPhase2
Basic RSA

And so the encryption step is this part here-- raising the message to the encryption key: mod 3127. And then, the decryption step ...

2:38
Basic RSA

20,473 views

13 years ago

edyo.ru
Протокол Диффи-Хеллмана для обмена ключами (часть 2)

Четвертая серия из раздела "Современное шифрование" на Академии Хана. Брит Круз рассказывает про использование ...

2:19
Протокол Диффи-Хеллмана для обмена ключами (часть 2)

15,427 views

12 years ago

Lisk
Cryptography Explained: Public-Key vs Symmetric Cryptography

Cryptography Explained for Beginners: This Lisk Academy video breaks down how cryptography works in blockchain and ...

2:12
Cryptography Explained: Public-Key vs Symmetric Cryptography

14,799 views

7 years ago

VaNTAGe
Kristin Lauter,  Supersingular isogeny graphs in cryptography

VaNTAGe Seminar, September 20, 2022 License: CC-BY-NC-SA Some of the papers mentioned in this talk: Charles, Goren, ...

56:02
Kristin Lauter, Supersingular isogeny graphs in cryptography

467 views

3 years ago

Confreaks
RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael  Swieton

RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton Picking an encryption algorithm ...

36:15
RailsConf 2017: The Art & Craft of Secrets: Using the Cryptographic Toolbox by Michael Swieton

1,849 views

8 years ago

wikipedia tts
Post-quantum cryptography | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Post-quantum_cryptography 00:01:45 1 Algorithms ...

28:46
Post-quantum cryptography | Wikipedia audio article

35 views

7 years ago

PaceIT Online
PACE-IT: Security + 6.2 - Cryptographic Methods (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:54
PACE-IT: Security + 6.2 - Cryptographic Methods (part 2)

250 views

10 years ago

edyo.ru
Алгоритм шифрования RSA: шаг первый

Пятая серия из раздела "Современное шифрование" на Академии Хана. Брит Круз рассказывает про идею шифрования с ...

3:56
Алгоритм шифрования RSA: шаг первый

42,331 views

12 years ago

VaNTAGe
Steven Galbraith, Isogeny graphs, computational problems, and applications to cryptography

VaNTAGe Seminar, September 20, 2022 License: CC-BY-NC-SA Some of the papers mentioned in this talk: Ducas, Pierrot 2019: ...

1:02:44
Steven Galbraith, Isogeny graphs, computational problems, and applications to cryptography

456 views

3 years ago

OCLPhase2
Encrypting using a keyword-based transposition cipher

And so this tells us the order in which we are going to read the columns of our encryption key. So we're going to start out by writing ...

2:36
Encrypting using a keyword-based transposition cipher

77,313 views

13 years ago

OCLPhase2
Decrypt using a keyword based transposition cipher
2:46
Decrypt using a keyword based transposition cipher

66,716 views

13 years ago