The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid. (Wikipedia).
Cryptograph: Substitution Cipher (Caesar Cipher)
This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com
From playlist Cryptography
Symmetric Key Cryptography: The Keyword Cipher
This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene
From playlist Cryptography
An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org
From playlist Cryptography
Pseudorandom Number Generation and Stream Ciphers
Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.
From playlist Network Security
The Story of Chinese Character :圂
圂 is composed of 豕(a pig) stays inside 囗(an enclosure), 圂 is the picture of a pigpen.
From playlist The Story of HanZi (Chinese Characters)
Desmos Holiday Peanuts Dance (Redone)
Added a few more characters (PigPen, Woodstock, & Sally) to this year's #Desmos holiday Peanuts dance. 🙂https://desmos.com/calculator/mmetvkgwm2 #DesmosFun
From playlist Desmos Activities, Illustrations, and How-To's
This video is a brief introduction to linear codes: dimensions, G (generating matrix), H (parity check matrix), their forms. Also gives an example of how to convert between G and H. Here is the formal definition of a Linear Code: A linear code of dimension k and length n over a field
From playlist Cryptography and Coding Theory
How to detect and correct an error using the Hamming Code. Hamming codes are a type of linear code, see link for intro to linear code: https://www.youtube.com/watch?v=oYONDEX2sh8 Questions? Feel free to post them in the comments and I'll do my best to answer!
From playlist Cryptography and Coding Theory
Cryptography: Transposition Cipher
This lesson explains how to encrypt and decrypt a message using a transposition cipher. Site: http://mathispower4u.com
From playlist Cryptography
Mike Rowe meets a chemist with a unique way to keep sharks away.
From playlist Shark Week Archives
Stunning Pitcairn Islands Revealed | Edge of the World
In 2012 National Geographic's Pristine Seas project went on an expedition to the Pitcairn Islands—a legendary and remote archipelago in the middle of the Pacific Ocean—and returned with footage of incredible natural wonders underwater and on land. The expedition led to the historic announc
From playlist National Geographic Explorers
Bjarne Jespersen - Invention of the Paper Gear - G4G12 April 2016
The presentation explains the interests and ideas behind my invention.
From playlist G4G12 Videos
Practice with me! Basic Number Theory :)
Sign up on Brilliant for FREE using the link https://brilliant.org/FlammableMaths/ ! =D First 200 people to sign up get 20% off an annual Premium Subscription! Let us practice some basicx number theory together! =) This video has been sponsored by Brilliant btw! Help me create more fr
From playlist Livestreams
Toy Substitution Cipher 1 - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
Toy Substitution Cipher 2 - Applied Cryptography
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
From playlist Applied Cryptography
A Bitter AI Lesson - Compute Reigns Supreme!
📝 The article "The Bitter Lesson" is available here: http://www.incompleteideas.net/IncIdeas/BitterLesson.html Nice twitter thread on this video: https://twitter.com/karoly_zsolnai/status/1114867598724931585 ❤️ Pick up cool perks on our Patreon page: https://www.patreon.com/TwoMinutePape
From playlist AI and Deep Learning - Two Minute Papers
Are we really attracted to other people through pheromones? How do they work? Turns out it's much more complicated than you might think. Join Hank Green for a fascinating look into the world of human pheromones in this new episode of SciShow! ---------- Dooblydoo thanks go to the followin
From playlist Biology
Follow-up: Barbie electronic typewriter
Here is a copy of the description from the Barbie video: ---- I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett fr
From playlist My Maths Videos
Symmetric Key Cryptography: The Caesar Cipher
This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff
From playlist Cryptography
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security