Mathematical problems | Cryptography | Zero-knowledge protocols

Dining cryptographers problem

In cryptography, the dining cryptographers problem studies how to perform a secure multi-party computation of the boolean-XOR function. David Chaum first proposed this problem in the early 1980s and used it as an illustrative example to show that it was possible to send anonymous messages with unconditional sender and recipient untraceability. Anonymous communication networks based on this problem are often referred to as DC-nets (where DC stands for "dining cryptographers"). Despite the word dining, the dining cryptographers problem is unrelated to the dining philosophers problem. (Wikipedia).

Dining cryptographers problem
Video thumbnail

Challenge Question - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Challenge Question - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Key Exchange Problems - Computerphile

Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in... Public Key Cryptography: https://youtu.be/GSIDS_lvRv4 Elliptic Curve Cryptography: Coming Soon! https://www.facebook.com/computerphile https://twitter.com/compute

From playlist Cryptography on Numberphile and Computerphile

Video thumbnail

Secure Computation Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Math for Liberal Studies - Lecture 3.6.1 Substitution Ciphers

This is the first video lecture for Math for Liberal Studies Section 3.6: An Introduction to Cryptography. In this video, we discuss the general idea of encrypting and decrypting messages to keep unintended recipients from reading them. We then discuss some simple methods for doing this.

From playlist Math for Liberal Studies Lectures

Video thumbnail

Randomness Quiz - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Practical Hacker Crypto 7/7

Speaker:Simple Nomad clip 7/7

From playlist ShmooCon 2008

Video thumbnail

30C3: Security of the IC Backside (DE - translated)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speaker: nedos In the chain of trust of most secure schemes is an electronic chip that holds secret information. These schemes often employ cryptographically secure protocol

From playlist 30C3

Video thumbnail

24C3: Dining Cryptographers, The Protocol

Speaker: Immanuel Scholz Even slower than Tor and JAP together! Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration! Back in 1988, David Chaum proposed a protocol for perfect untracable communication. And it was completly different to t

From playlist 24C3: Full steam ahead

Video thumbnail

26C3: Privacy-Enhanced Event Scheduling 1/6

Clip 1/6 Speaker: Benjamin Kellermann Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This talk distinguishes event scheduling from electronic voting and proposes a privacy-e

From playlist 26C3: Here be dragons day 3

Video thumbnail

Do Not Implement Your Own Crypto Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

28C3: DC+, The Protocol (en)

For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speaker: klobs Technical defense against data retention law The idea of Dining Cryptographers-Networks (DC) offers a much

From playlist 28C3: Behind Enemy Lines

Video thumbnail

Totient Function - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

NOTACON 5: Managing Electronic Identities in an Increasingly Paranoid World

Speaker: Dead Addict The idea of a permanent record is one that lasts throughout your life. As a child I imagined the permanent record available to all sorts of people, almost arbitrarily. The details that were threatened for inclusion, elementary school marks and attendance records were

From playlist Notacon 5

Video thumbnail

PMSP - Computational pseudo-randomness and extractors I - Russell Impagliazzo

Russell Impagliazzo UC San Diego and Institute for Advanced Study June 14, 2010 For more videos, visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

How Companies Lie To You About End-to-End Encryption

This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org. https://github.com/orgs/privacyguides/people#member-realguyman Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Intro

From playlist Talks, interview and podcasts

Video thumbnail

Lilya Budaghyan : On APN and AB power functions

CONFERENCE Recording during the thematic meeting : « ALgebraic and combinatorial methods for COding and CRYPTography» the February 23, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Guillaume Hennenfent Find this video and other talks given b

From playlist Combinatorics

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

DEFCON 17: MetaPhish

Speakers: Valsmith Attack Research, LCC, CEO Colin Ames Security Researcher David Kerb Security Researcher Attackers have been increasingly using the web and client side attacks in order to steal information from victims. The remote exploit paradigm is shifting from the open port to the b

From playlist DEFCON 17

Related pages

Pseudorandom number generator | One-time pad | Elliptic curve | Dining philosophers problem | Anonymous veto network | Shuffling | Complete graph | Zero-knowledge proof | Cryptographic hash function | Public-key cryptography | Diffie–Hellman key exchange | Bit | Schnorr group | Finite group | Secure multi-party computation