Cryptographic primitives

Functional encryption

Functional encryption (FE) is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the ciphertext is encrypting. (Wikipedia).

Functional encryption
Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Encryption Explained Simply | What Is Encryption? | Cryptography And Network Security | Simplilearn

In today's video on encryption explained simply, we take a look at why cryptography is essential when it comes to protecting our privacy on the internet. We take a look at how what is encryption, how encryption and decryption works with simple step by step explanation, and move onto it's c

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Advanced Encryption Standard (AES)

Fundamental concepts of Advanced Encryption Standard are discussed. Basic structure of AES is presented. AES Decryption is explained. AES Structure AES Round Function AES Key Expansion AES Decryption

From playlist Network Security

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

Cyber Security Week Day - 1 |Cryptography Full Course | Cryptography & Network Security| Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity-bootcamp This video on Cryptography full course will acquaint you with cryptograph

From playlist Simplilearn Live

Video thumbnail

Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CryptographyFCAug17&utm_medium=DescriptionFirstFold&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity

From playlist Simplilearn Live

Video thumbnail

🔥Cryptography And Network Security Full Course 2022 | Cryptography | Network Security | Simplilearn

🔥Free Cyber Security Course With Completion Certificate: https://www.simplilearn.com/learn-cyber-security-basics-skillup?utm_campaign=CryptographyNetworkSecurityFC4Aug22&utm_medium=DescriptionFirstFold&utm_source=youtube This video on the Cryptography and network security full course will

From playlist Simplilearn Live

Video thumbnail

Top Hashing Algorithms In Cryptography | MD5 and SHA 256 Algorithms Explained | Simplilearn

In this video on Top Hashing Algorithms In Cryptography, we will cover the technical aspects of hashing while going through some well-known hash functions and algorithms at the end. We cover the basics of cryptography and its applications. We also have detailed MD5 and SHA265 Explained sec

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Cryptography Tutorial For Beginners | Cybersecurity Training | Edureka | Cybersecurity Live - 2

🔥Edureka Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training This Edureka video on "Cryptography Tutorial" gives an introduction to the Cryptography and talks about its basic concepts. 🔴Subscribe to our channel to get video updates. Hit the subscribe butto

From playlist Edureka Live Classes 2020

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography I" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will serve as a "crash course" in modern cryptography for those with no prior exposure

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

AES and DES Algorithm Explained | Difference between AES and DES | Network Security | Simplilearn

In today's video on AES and DES algorithm explained, we cover a major aspect of network security in encryption standards.The origins and working of both the data encryption standard and advanced encryption standard are covered. We also look into the applications and differences between AES

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Shannon 100 - 26/10/2016 - Anne CANTEAUT

Comment concevoir un algorithme de chiffrement sûr et efficace : l'héritage de Shannon Anne Canteaut (INRIA) Dans son article fondateur publié en 1949 posant les fondements de la cryptographie, Claude Shannon a énoncé deux méthodes de conception visant à éviter les attaques statistiques

From playlist Shannon 100

Video thumbnail

25c3: Vulnerability discovery in encrypted closed source PHP applications

Speaker: Stefan Esser Security audits of PHP applications are usually performed on a source code basis. However sometimes vendors protect their source code by encrypting their applications with runtime (bytecode-)encryptors. When these tools are used source code analysis is no longer poss

From playlist 25C3: Nothing to hide

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

RSA and DSA Encryption Algorithms Explained | Cryptography & Network Security Tutorial | Simplilearn

In today's video on the RSA and DSA encryption algorithms explained, we cover the two most well known symmetric encryption algorithms in our cryptography & network security tutorial. We learn the steps needed to encrypt digital signatures and general data using RSA and DSA algorithms. The

From playlist Cyber Security Playlist [2023 Updated]🔥

Related pages

Ciphertext | Attribute-based encryption | Provable security | Homomorphic encryption