Cryptography

Keyring (cryptography)

In cryptography, a keyring stores known encryption keys (and, in some cases, passwords). For example, GNU Privacy Guard makes use of keyrings. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Cryptography For Beginners

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Live CEOing Ep 255: Security-Related Functions in Wolfram Language

Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about Security-Related Functions in the Wolfram Language.

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Kernel Recipes 2017 - Modern Key Management with GPG - Werner Koch

Although GnuPG 2 has been around for nearly 15 years, the old 1.4 version was still in wide use. With Debian and others making 2.1 the default, many interesting things can now be done. In this talk he will explain the advantages of modern key algorithms, like ed25519, and why gpg relaxed s

From playlist Kernel Recipes 2017

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Live CEOing Ep 82: Long-term Design Decisions for Wolfram Language

Watch Stephen Wolfram and teams of developers in a live, working, language design meeting. This episode is about Long-term Design Decisions in the Wolfram Language.

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

Dreambooth Vs Embeddings - who will win?

Stable Diffusion. It has a lot of things going for it, but how do some of these things compare? Dreambooth SD? Textual Inversion? Dreambooth Diffusers? Which is better? What does better even mean anyway? All these questions and more are answered right here, right now... Dreambooth Diffuse

From playlist Popular Videos

Video thumbnail

Garage - Genie Garage Remote Battery Replacement

A Quick Tutorial! Music: http://www.bensound.com/royalty-free-music

From playlist Animal Videos

Video thumbnail

Kernel Recipes 2018 - TPM enabling the Crypto Ecosystem for enhanced Security - James Bottomley

For decades, all laptops have come with a TPM. Now with Microsoft forcing the transition to the next generation, Linux faces a challenge in that all the previous TPM 1.2 tools don’t work with 2.0. Having to create new tools for TPM 2.0 also provides the opportunity to integrate the TPM

From playlist Kernel Recipes 2018

Video thumbnail

Inspiring science books of 2017 with Brian Cox

Join Professor Brian Cox as we look at the best science writing of 2017, and announce this year’s winning book. Explore the shortlist from the Royal Society Insight Investment Science Book Prize and discover the most inspirational popular science books and authors of the year. Selected

From playlist Latest talks and lectures

Video thumbnail

DEFCON 18: Black Ops Of Fundamental Defense: Web Edition 4/4

Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all th

From playlist DEFCON 18-1

Video thumbnail

Black Hat USA 2010: Black Ops of Fundamental Defense: Web Edition 5/6

Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all thei

From playlist BH USA 2010 - INFRASTRUCTURE

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

22C3: Breaking Down the Web of Trust

Speaker: Seth Hardy Even with tutorials on the WoT and good trust policies the concept of "trust" can still be hard to grasp. Here we'll look at trust metrics, ways of using current trust systems better, and some non-crypto applications of trust. For more information visit: http://bit.ly

From playlist 22C3: Private Investigations

Related pages

Java KeyStore | Cryptography | GNU Privacy Guard