A secret decoder ring (or secret decoder) is a device that allows one to decode a simple substitution cipher—or to encrypt a message by working in the opposite direction. As inexpensive toys, secret decoders have often been used as promotional items by retailers, as well as radio and television programs, from the 1930s through to the current day.Decoders, whether badges or rings, are an entertaining way for children to tap into a common fascination with encryption, ciphers, and secret codes, and are used to send hidden messages back and forth to one another. (Wikipedia).
Excel Secret Decoder Ring - 2330
This started as an April Fools joke from Bill Szysz and Mike Girvin, but it brought back memories of Schoolhouse Rock from 1973 and the story of Little Twelve Toes. In today's video, a secret decoder ring in Excel using BASE and DECIMAL. Also: you can now assign fill color and font colors
From playlist New in 2020
Transformers - Part 7 - Decoder (2): masked self-attention
This is the second video on the decoder layer of the transformer. Here we describe the masked self-attention layer in detail. The video is part of a series of videos on the transformer architecture, https://arxiv.org/abs/1706.03762. You can find the complete series and a longer motivation
From playlist A series of videos on the transformer
An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org
From playlist Cryptography
Steganography Tutorial - Hide Messages In Images
Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it
From playlist Ethical Hacking & Penetration Testing - Complete Course
From secret to WIF private key and address
In this video we discuss how to get from the secret private key number (a.k.a. exponent) to the WIF and how to get from the public key to address formats. He's the code: https://gist.github.com/Nikolaj-K/d548a12a45599070ea89ff376803758b
From playlist Programming
Transformer - Part 6 - Decoder (1): testing and training
This is the first out of three videos about the transformer decoder. In this video, we focus on describing how the decoder is used during testing and training since this is helpful in order to understand how the decoder is constructed The video is part of a series of videos on the transfo
From playlist A series of videos on the transformer
Transformer - Part 8 - Decoder (3): Encoder-decoder self-attention
This is the third video about the transformer decoder and the final video introducing the transformer architecture. Here we mainly learn about the encoder-decoder multi-head self-attention layer, used to incorporate information from the encoder into the decoder. It should be noted that thi
From playlist A series of videos on the transformer
Solving The MYSTERY BOX Cryptex Puzzle!!
Today I decided to try my luck and open up the Mystery Box Cryptex Puzzle by Bad Robot and Theory 11. This beautiful box contains a mystery within a mystery! Would you open it or leave it locked forever?! Also.. Secret section at the end...Enjoy! Mystery Box: https://store.theory11.com/pr
From playlist Puzzles!
Introduction to number theory lecture 18. Cryptography
This lecture is part of my Berkeley math 115 course "Introduction to number theory" For the other lectures in the course see https://www.youtube.com/playlist?list=PL8yHsr3EFj53L8sMbzIhhXSAOpuZ1Fov8 We give a brief introduction to the RSA method, an application of number theory to cryotog
From playlist Introduction to number theory (Berkeley Math 115)
Application of Elliptic Curves to Cryptography
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Katherine E. Stange: Ring learning with errors and rounding
CIRM HYBRID EVENT Among the main candidates for post-quantum cryptography are systems based on the Ring Learning with Errors and Ring Learning with Rounding problems. I’ll give an overview of the number theory involved in these problems and try to persuade you to join in cryptanalyzing th
From playlist Number Theory
Chris Peikert - Post Quantum assumptions - IPAM at UCLA
Recorded 27 July 2022. Chris Peikert of the University of Michigan presents "Post Quantum assumptions" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Learn more online at: https://www.ipam.ucla.edu/programs/summer-schools/graduate-summer-school-on-post-quantum-and-
From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography
The Greatest War Machines Of The 20th Century [4K] | Combat Machines Compilation | Spark
During World War II, machines became a huge part of combat, whether on land, at sea, or airborne. Watch to find out more about the variety of machines used by the forces, ranging from motorcycles to tanks. --- This original and wide-ranging 8 part thematic series takes you to the heart of
From playlist Combat Machines
Public key cryptography - Diffie-Hellman Key Exchange (full version)
The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8
From playlist Cryptography, Security
Mathematics of Post-Quantum Cryptograhy - Kristin Lauter
Woman and Mathematics - 2018 More videos on http"//video.ias.edu
From playlist My Collaborators
Casting. Imprecision. Switches. Scope. Strings. Arrays. Cryptography.
From playlist CS50 Lectures 2015
Symmetric Key Cryptography: The Caesar Cipher
This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff
From playlist Cryptography
Speakers: Karsten Nohl, Henryk Plötz, z0ccor This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets. This talk will be about some of the hacking related things (technologica
From playlist 23C3: Who can you trust