Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Pretty Good Privacy
Applied sciences
Computer engineering
Computer security
Public-key cryptography
Graph Chatbot
Related lectures (10)
Login to filter by course
Login to filter by course
Reset
Homomorphic Encryption: Applications and Implementations
Explores homomorphic encryption, its applications, challenges, and comparisons with Trusted Execution Environments, as well as the use of aggregated keys for secure data sharing.
Asymmetric Cryptography and Password-based Authentication
Covers asymmetric cryptography, hybrid encryption, Diffie-Hellman key exchange, authentication challenges, secure password storage, and transfer methods.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Public-Key Cryptography: Post-Quantum and Access Control
Explores public-key cryptography, post-quantum systems, and access control mechanisms in depth.
Applied Cryptography: Assymetric Cryptography
Introduces asymmetric cryptography, digital signatures, and hybrid encryption for secure communication.
Cryptography Fundamentals
Delves into the core principles of cryptography, emphasizing the challenges of key management and the impact of technology advancement on security.
Diffie-Hellman Cryptography: Key Exchange and ElGamal Encryption
Covers the Diffie-Hellman key exchange protocol and the ElGamal public-key cryptosystem.
Building End-to-End-Encrypted Systems
Explores challenges in building secure end-to-end-encrypted systems and proposes new cryptographic solutions to enhance data security.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Cryptography Fundamentals
Covers the basics of cryptography, including key concepts, tools, and protocols used for secure communication and data protection.
Previous
Page 1 of 1
Next