Cryptography lists and comparisons

Comparison of cryptography libraries

The tables below compare cryptography libraries that deal with cryptography algorithms and have API function calls to each of the supported features. (Wikipedia).

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Randomness Quiz - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

28C3: Taking control over the Tor network (en)

For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speakers: Eric Filiol, Seun Omosowon This talk deals with weaknesses identified in the TOR network protocol and cryptography

From playlist 28C3: Behind Enemy Lines

Video thumbnail

SOURCE Boston 2009: Wireless Sensor Networking As An Asset And A Liability

Speaker: Travis Goodspeed Wireless Sensor Networking (WSN) technology, as typified by Zigbee and ISA100, makes use of ultra-low power microcontrollers and LPAN radios to form self-sufficient networks. A battery-powered network can survive for a year with today's technology, with lifetimes

From playlist Latest uploads

Video thumbnail

30C3: The Year in Crypto (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speakers: Nadia Heninger | djb | Tanja Lange This was a busy year for crypto. TLS was broken. And then broken again. Discrete logs were computed. And then computed again.

From playlist 30C3

Video thumbnail

Basic Principle

A brief description of the "Basic Principle" and how it can be used to test for primality.

From playlist Cryptography and Coding Theory

Video thumbnail

The Year in Post-quantum Crypto

The world is finally catching on to the urgency of deploying post-quantum cryptography: cryptography designed to survive attacks by quantum computers. EVENT: media.ccc.de 2018 SPEAKERS: Daniel J. Bernstein and Tanja Lange PUBLICATION PERMISSIONS: Original video was published with the

From playlist Blockchain

Video thumbnail

How to read a protocol's github?

https://github.com/Nikolaj-K

From playlist Programming

Video thumbnail

Totient - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Privacy preserving identity verification using third party cloud services and FHE

Speaker - Dr Srinivas Vivek, Open Consent UK and Global Privacy Rights About the event This hybrid conference brought together prominent academics and key players in the field of digital identity from government and industry sectors. The event focused on the socio-technical infrastructu

From playlist Turing trustworthy digital identity international conference 2022

Video thumbnail

Cryptography in Swift

In this session, Cory discusses the tools for using cryptography in Swift, and introduces a new Apple open source project for working with cryptography on all platforms, Swift Crypto. PUBLICATION PERMISSIONS: Original video was published with the Creative Commons Attribution license (reus

From playlist Blockchain

Video thumbnail

GoRuCo 2013 - Krypt. Semper Pi. by Martin Bosslet

Many people don't like Cryptography. Whenever he falls out of a bar, he carries this strong odor of ivory-towering, bikeshedding and plain, outright arrogance. He seems to be a loner and a smartass, rude, and it's hard to follow his boring, lengthy explanations. But once you get to know hi

From playlist GoRuCo 2013

Video thumbnail

Classical Cryptosystems

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

DEFCON 20: Rapid Blind SQL Injection Exploitation with BBQSQL

Speakers: BEN TOEWS SECURITY CONSULTANT, NEOHAPSIS SCOTT BEHRENS SECURITY CONSULTANT, NEOHAPSIS Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don't you have to write something custom. This is time-consuming and tedious. This tal

From playlist DEFCON 20

Related pages

GOST (block cipher) | Stream cipher | Elliptic-curve Diffie–Hellman | Cryptlib | GOST (hash function) | Twofish | ElGamal encryption | International Data Encryption Algorithm | Libgcrypt | MD5 | Crypto++ | GNU Privacy Guard | NTRU | Curve25519 | Block cipher mode of operation | Panama (cryptography) | SM4 (cipher) | WAKE (cipher) | Blowfish (cipher) | BLAKE (hash function) | ARIA (cipher) | PBKDF2 | RDRAND | RSA Security | Variably Modified Permutation Composition | FIPS 140 | FIPS 140-3 | Block cipher | BLAKE2 | Cryptographic hash function | Digital Signature Algorithm | Diffie–Hellman key exchange | IEEE P1363 | Cryptography | PKCS 1 | RSA (cryptosystem) | Grain (cipher) | SHA-3 | SHA-1 | Streebog | CCM mode | Galois/Counter Mode | ISAAC (cipher) | OCB mode | SHA-2 | Camellia (cipher) | PKCS | Message authentication code | Poly1305 | HC-256 | RC4 | EdDSA | Salsa20 | FIPS 140-2 | HMAC | PKCS 12 | PKCS 8 | SM3 (hash function) | Curve448 | EAX mode | Rabbit (cipher) | SEAL (cipher) | Public-key cryptography | AES instruction set | Advanced Encryption Standard