Mathematical problems | Cryptography | Zero-knowledge protocols
In cryptography, the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-XOR function. David Chaum first proposed this problem in the early 1980s and used it as an illustrative example to show that it was possible to send anonymous messages with unconditional sender and recipient untraceability. Anonymous communication networks based on this problem are often referred to as DC-nets (where DC stands for "dining cryptographers"). Despite the word dining, the dining cryptographers problem is unrelated to the dining philosophers problem. (Wikipedia).
Challenge Question - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Challenge Question - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Key Exchange Problems - Computerphile
Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in... Public Key Cryptography: https://youtu.be/GSIDS_lvRv4 Elliptic Curve Cryptography: Coming Soon! https://www.facebook.com/computerphile https://twitter.com/compute
From playlist Cryptography on Numberphile and Computerphile
Secure Computation Solution - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Primality (1 of 2: Fermat's Test)
From playlist Cryptography
Math for Liberal Studies - Lecture 3.6.1 Substitution Ciphers
This is the first video lecture for Math for Liberal Studies Section 3.6: An Introduction to Cryptography. In this video, we discuss the general idea of encrypting and decrypting messages to keep unintended recipients from reading them. We then discuss some simple methods for doing this.
From playlist Math for Liberal Studies Lectures
Randomness Quiz - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
30C3: Security of the IC Backside (DE - translated)
For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: nedos In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocol
From playlist 30C3
24C3: Dining Cryptographers, The Protocol
Speaker: Immanuel Scholz Even slower than Tor and JAP together! Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration! Back in 1988, David Chaum proposed a protocol for perfect untracable communication. And it was completly different to t
From playlist 24C3: Full steam ahead
26C3: Privacy-Enhanced Event Scheduling 1/6
Clip 1/6 Speaker: Benjamin Kellermann Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This talk distinguishes event scheduling from electronic voting and proposes a privacy-e
From playlist 26C3: Here be dragons day 3
Do Not Implement Your Own Crypto Solution - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speaker: klobs Technical defense against data retention law The idea of Dining Cryptographers-Networks (DC) offers a much
From playlist 28C3: Behind Enemy Lines
Totient Function - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
NOTACON 5: Managing Electronic Identities in an Increasingly Paranoid World
Speaker: Dead Addict The idea of a permanent record is one that lasts throughout your life. As a child I imagined the permanent record available to all sorts of people, almost arbitrarily. The details that were threatened for inclusion, elementary school marks and attendance records were
From playlist Notacon 5
PMSP - Computational pseudo-randomness and extractors I - Russell Impagliazzo
Russell Impagliazzo UC San Diego and Institute for Advanced Study June 14, 2010 For more videos, visit http://video.ias.edu
From playlist Mathematics
How Companies Lie To You About End-to-End Encryption
This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org. https://github.com/orgs/privacyguides/people#member-realguyman Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Intro
From playlist Talks, interview and podcasts
Lilya Budaghyan : On APN and AB power functions
CONFERENCE Recording during the thematic meeting : « ALgebraic and combinatorial methods for COding and CRYPTography» the February 23, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Guillaume Hennenfent Find this video and other talks given b
From playlist Combinatorics
Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct
From playlist Blockchain
Speakers: Valsmith Attack Research, LCC, CEO Colin Ames Security Researcher David Kerb Security Researcher Attackers have been increasingly using the web and client side attacks in order to steal information from victims. The remote exploit paradigm is shifting from the open port to the b
From playlist DEFCON 17