-
77:25
Lecture 1: Introduction to Cryptography by Christof Paar
Lecture 1: Introduction to Cryptography by Christof Paar
Lecture 1: Introduction to Cryptography by Christof Paar
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The book chapter "Introduction" for this video is also available ...
-
86:31
Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar
Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar
Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.
-
8:57
Cryptography 101 - The Basics
Cryptography 101 - The Basics
Cryptography 101 - The Basics
In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.
-
5:22
James Lyne: Cryptography and the power of randomness
James Lyne: Cryptography and the power of randomness
James Lyne: Cryptography and the power of randomness
James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense o...
-
6:20
Public Key Cryptography - Computerphile
Public Key Cryptography - Computerphile
Public Key Cryptography - Computerphile
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note...
-
44:55
A Short History of Cryptography - A Brief History of Cryptography
A Short History of Cryptography - A Brief History of Cryptography
A Short History of Cryptography - A Brief History of Cryptography
A Short History of Cryptography - A Brief History of Cryptography.
-
5:24
Public Key Cryptography: Diffie-Hellman Key Exchange
Public Key Cryptography: Diffie-Hellman Key Exchange
Public Key Cryptography: Diffie-Hellman Key Exchange
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete log...
-
8:27
Visual Cryptography
Visual Cryptography
Visual Cryptography
Hiding your images in style since 1994. Copyright Protection Scheme for Digital Images Using Visual Cryptography and Sampling Methods Ching-Sheng Hsu Young-C...
-
29:19
CISSP Training - Cryptography
CISSP Training - Cryptography
CISSP Training - Cryptography
PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the t...
-
1:31
Intro to Cryptography
Intro to Cryptography
Intro to Cryptography
The basic idea behind why we need cryptography More free lessons at: http://www.khanacademy.org/video?v=Kf9KjCKmDcU.
-
3:23
Cryptography: Unbroken Codes
Cryptography: Unbroken Codes
Cryptography: Unbroken Codes
While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken...
-
54:06
Theory and Practice of Cryptography
Theory and Practice of Cryptography
Theory and Practice of Cryptography
Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and...
-
86:51
Keeping Secrets: Cryptography In A Connected World - Full Program
Keeping Secrets: Cryptography In A Connected World - Full Program
Keeping Secrets: Cryptography In A Connected World - Full Program
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss the earliest days of communication, clever minds have devised methods for encipheri...
-
16:31
Public Key Cryptography: RSA Encryption Algorithm
Public Key Cryptography: RSA Encryption Algorithm
Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular expone...
-
8:13
A brief history of Cryptography with Akamai Chief Security Officer Andy Ellis
A brief history of Cryptography with Akamai Chief Security Officer Andy Ellis
A brief history of Cryptography with Akamai Chief Security Officer Andy Ellis
Akamai Chief Security Officer, Andy Ellis, shares a brief history of cryptography. Learn more about how Akamai's highly distributed platform delivers applica...
-
9:22
Encryption and HUGE numbers - Numberphile
Encryption and HUGE numbers - Numberphile
Encryption and HUGE numbers - Numberphile
Banks, Facebook, Twitter and Google use epic numbers - based on prime factors - to keep our Internet secrets. This is RSA public-key encryption. This video f...
-
4:32
What is Cryptography - Introduction to Cryptography - Lesson 1
What is Cryptography - Introduction to Cryptography - Lesson 1
What is Cryptography - Introduction to Cryptography - Lesson 1
In this video I explain the fundamental concepts of cryptography. Encryption, decryption, plaintext, cipher text, and keys. Donate - http://bit.ly/19AHMvX.
-
39:16
Cryptography in the Open: History of Crypto and the NSA
Cryptography in the Open: History of Crypto and the NSA
Cryptography in the Open: History of Crypto and the NSA
Henry Corrigan-Gibbs reviews the history of Diffie-Hellman key exchange and how the NSA fought to keep the authors from publishing. He will give a bit of information that was not in his Stanford Magazine article on the topic.
Henry is a Ph.D. student at Stanford working on cryptography under Dan Boneh. His research has included work on Riposte, an anonymous messaging system for millions of users.
Slides of the talk http://www.henrycg.com/files/academic/pres/ethereum15cryptography-slides.pdf
Henry Corrigan-Gibbs' website: http://www.henrycg.com/
Stanford Magazine Article: https://alumni.stanford.edu/get/page/magazine/article/?article_id=7
-
12:43
RSA-Cryptography 2
RSA-Cryptography 2
RSA-Cryptography 2
We construct a small RSA cryptography system using basic number theoretic results, including linear congruences, Euler's function and Euler's Theorem.
-
62:18
STANDFORD UNIVERSITY: Basics Of Quantum Cryptography (2014, 1080p)
STANDFORD UNIVERSITY: Basics Of Quantum Cryptography (2014, 1080p)
STANDFORD UNIVERSITY: Basics Of Quantum Cryptography (2014, 1080p)
-
59:56
Lecture - 32 Basic Cryptographic Concepts Part : I
Lecture - 32 Basic Cryptographic Concepts Part : I
Lecture - 32 Basic Cryptographic Concepts Part : I
Lecture Series on Internet Technologies by Prof.I.Sengupta, Department of Computer Science & Engineering ,IIT Kharagpur. For more details on NPTEL visit http...
-
55:38
ECCHacks - A gentle introduction to elliptic-curve cryptography [31c3]
ECCHacks - A gentle introduction to elliptic-curve cryptography [31c3]
ECCHacks - A gentle introduction to elliptic-curve cryptography [31c3]
ECCHacks
A gentle introduction to elliptic-curve cryptography
This talk will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will highlight pitfalls that must be avoided when implementing elliptic-curve crypto (ECC). The talk will also explain what all the buzz in curve choices for TLS is about. This talk does not require any prior exposure to ECC.
ECC is rapidly becoming the public-key technology of choice for Internet protocols. ECC was introduced in 1985 and has a much stronger security record than RSA. ECC research has found new ways of attacking implementations but has also fou
-
27:09
CISSP SG Cryptography
CISSP SG Cryptography
CISSP SG Cryptography
Slide Deck can be found at: https://www.defensepointsecurity.com/index.php/corporate-info/dps-outreach/cissp-study-group.