Mechanical puzzles

Secret decoder ring

A secret decoder ring (or secret decoder) is a device that allows one to decode a simple substitution cipher—or to encrypt a message by working in the opposite direction. As inexpensive toys, secret decoders have often been used as promotional items by retailers, as well as radio and television programs, from the 1930s through to the current day.Decoders, whether badges or rings, are an entertaining way for children to tap into a common fascination with encryption, ciphers, and secret codes, and are used to send hidden messages back and forth to one another. (Wikipedia).

Secret decoder ring
Video thumbnail

Excel Secret Decoder Ring - 2330

This started as an April Fools joke from Bill Szysz and Mike Girvin, but it brought back memories of Schoolhouse Rock from 1973 and the story of Little Twelve Toes. In today's video, a secret decoder ring in Excel using BASE and DECIMAL. Also: you can now assign fill color and font colors

From playlist New in 2020

Video thumbnail

Transformers - Part 7 - Decoder (2): masked self-attention

This is the second video on the decoder layer of the transformer. Here we describe the masked self-attention layer in detail. The video is part of a series of videos on the transformer architecture, https://arxiv.org/abs/1706.03762. You can find the complete series and a longer motivation

From playlist A series of videos on the transformer

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

From secret to WIF private key and address

In this video we discuss how to get from the secret private key number (a.k.a. exponent) to the WIF and how to get from the public key to address formats. He's the code: https://gist.github.com/Nikolaj-K/d548a12a45599070ea89ff376803758b

From playlist Programming

Video thumbnail

Transformer - Part 6 - Decoder (1): testing and training

This is the first out of three videos about the transformer decoder. In this video, we focus on describing how the decoder is used during testing and training since this is helpful in order to understand how the decoder is constructed The video is part of a series of videos on the transfo

From playlist A series of videos on the transformer

Video thumbnail

Transformer - Part 8 - Decoder (3): Encoder-decoder self-attention

This is the third video about the transformer decoder and the final video introducing the transformer architecture. Here we mainly learn about the encoder-decoder multi-head self-attention layer, used to incorporate information from the encoder into the decoder. It should be noted that thi

From playlist A series of videos on the transformer

Video thumbnail

Solving The MYSTERY BOX Cryptex Puzzle!!

Today I decided to try my luck and open up the Mystery Box Cryptex Puzzle by Bad Robot and Theory 11. This beautiful box contains a mystery within a mystery! Would you open it or leave it locked forever?! Also.. Secret section at the end...Enjoy! Mystery Box: https://store.theory11.com/pr

From playlist Puzzles!

Video thumbnail

Introduction to number theory lecture 18. Cryptography

This lecture is part of my Berkeley math 115 course "Introduction to number theory" For the other lectures in the course see https://www.youtube.com/playlist?list=PL8yHsr3EFj53L8sMbzIhhXSAOpuZ1Fov8 We give a brief introduction to the RSA method, an application of number theory to cryotog

From playlist Introduction to number theory (Berkeley Math 115)

Video thumbnail

Application of Elliptic Curves to Cryptography

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Katherine E. Stange: Ring learning with errors and rounding

CIRM HYBRID EVENT Among the main candidates for post-quantum cryptography are systems based on the Ring Learning with Errors and Ring Learning with Rounding problems. I’ll give an overview of the number theory involved in these problems and try to persuade you to join in cryptanalyzing th

From playlist Number Theory

Video thumbnail

Chris Peikert - Post Quantum assumptions - IPAM at UCLA

Recorded 27 July 2022. Chris Peikert of the University of Michigan presents "Post Quantum assumptions" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Learn more online at: https://www.ipam.ucla.edu/programs/summer-schools/graduate-summer-school-on-post-quantum-and-

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

The Greatest War Machines Of The 20th Century [4K] | Combat Machines Compilation | Spark

During World War II, machines became a huge part of combat, whether on land, at sea, or airborne. Watch to find out more about the variety of machines used by the forces, ranging from motorcycles to tanks. --- This original and wide-ranging 8 part thematic series takes you to the heart of

From playlist Combat Machines

Video thumbnail

Public key cryptography - Diffie-Hellman Key Exchange (full version)

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8

From playlist Cryptography, Security

Video thumbnail

Mathematics of Post-Quantum Cryptograhy - Kristin Lauter

Woman and Mathematics - 2018 More videos on http"//video.ias.edu

From playlist My Collaborators

Video thumbnail

CS50 2015 - Week 2, continued

Casting. Imprecision. Switches. Scope. Strings. Arrays. Cryptography.

From playlist CS50 Lectures 2015

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

23C3: RFID hacking

Speakers: Karsten Nohl, Henryk Plötz, z0ccor This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets. This talk will be about some of the hacking related things (technologica

From playlist 23C3: Who can you trust

Related pages

Encryption | Alberti cipher | Cipher | Substitution cipher | Caesar cipher | Cryptography