Public-key cryptography

Attribute-based encryption

Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which they live, or the kind of subscription they have). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. A crucial security aspect of attribute-based encryption is collusion-resistance: An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. (Wikipedia).

Video thumbnail

Random Oracle - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Voter Identity Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Summary - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Biased Generator - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Correctness Of RSA - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

CERIAS Security: Hidden Access Control Policies with Hidden Credentials 3/5

Clip 3/5 Speaker: Keith Frikken · Purdue University In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credenti

From playlist The CERIAS Security Seminars 2005 (2)

Video thumbnail

Picking E And D Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Blackmatter Ransomware - Livestream Lunch and Learn: Reverse Engineering and Binary Attribution

Join us for a look into Blackmatter Ransomware. We will examine how it operates, and how it was attributed to the developers of Darkside Ransomware. Expand for more... ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs OALABS GITHUB https:/

From playlist Open Analysis Live!

Video thumbnail

DEFCON 14: Advanced File System Hiding and Detection

Speakers: Irby Thompson, Senior Security Engineer, Advanced Technology Laboratories, Lockheed Martin Mathew Monroe, Senior Security Engineer, Advanced Technology Laboratories, Lockheed Martin Abstract: The ability to both conceal and detect hidden data on the hard drive of a compromised

From playlist DEFCON 14

Video thumbnail

Nexus Trimester - Kobbi Nissim (CRCS at Harvard and Ben-Gurion University)

Accessing Data while Preserving Privacy Kobbi Nissim (CRCS at Harvard and Ben-Gurion University) March 31, 2016

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Hacking Livestream #53: The ZIP file format

Re-doing my talk from Technische Hochschule Ingolstadt Slides/etc: http://gynvael.coldwind.pl/?lang=en&id=682 http://gynvael.coldwind.pl/?id=523

From playlist Gynvael's [EN] Talks and Interviews

Video thumbnail

IMT4306 Mobile Research: Privacy and Anonymity

IMT4306 Introduction to Research in Mobile Decentralised systems, privacy, anonymity, privacy techniques.

From playlist 2021 - IMT4306 - Mobile Research

Video thumbnail

RailsConf 2016 - Rails 5 Features You Haven't Heard About by Sean Griffin

Rails 5 Features You Haven't Heard About by Sean Griffin We've all heard about Action Cable, Turbolinks 5, and Rails::API. But Rails 5 was almost a thousand commits! They included dozens of minor features, many of which will be huge quality of life improvements even if you aren't using We

From playlist RailsConf 2016

Video thumbnail

Free CISSP Training Video | CISSP Tutorial Online Part 2

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CCSPTrainingVideo-XghDe7VlVxo&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecur

From playlist CISSP Training Videos [2022 Updated]

Video thumbnail

AWS SQS | AWS Simple Queue Service | How SQS Works | AWS Tutorial | Edureka

🔥Edureka AWS Solution Architect Training: https://www.edureka.co/aws-certification-training This Edureka video on "AWS SQS" will firstly explain what is Amazon Simple Queue Service, followed by its architecture and benefits. We will conclude the session by working on Amazon SQS Queue. The

From playlist AWS Tutorial Videos

Video thumbnail

Tree Indexing in DBMS

A #database #index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure. Indexes are used to quickly locate data without having to search every row in a database

From playlist Database

Video thumbnail

Storing Passwords - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Cooking with AWS - ChefConf 2016

Looking for some ways to spice up your Chef usage on AWS? In this session we'll show you how to leverage services like AWS Lambda, AWS Key Management Service (KMS), Amazon CloudWatch Events, and Amazon EC2 Run Command with Chef. We'll introduce the AWS services and demo how they can be use

From playlist ChefConf 2016

Video thumbnail

Hashing And EKE - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

Broadcast encryption