Classical ciphers

Thomas Brierley grave cipher

The gravestone of Thomas Brierley (1785 – 1854 or -55) in Mellor, Greater Manchester, is one of the only ones in the United Kingdom known to incorporate masonic pigpen cypher in its inscription. Another is the gravestone of John Jennings within the St Peter and All Hallows Churchyard, West Huntspill. Still, another is the chest tomb of the Astles family, at St Laurence's Church, Frodsham, Cheshire. (See https://www.mysticmasque.com/history-mystery/masonic-cipher-grave-frodsham-church-cheshire). (Wikipedia).

Thomas Brierley grave cipher
Video thumbnail

C44 Example problem solving a Cauchy Euler equation

Getting more example problems done! Solving Cauchy-Euler equations is easy and fun.

From playlist Differential Equations

Video thumbnail

C43 Example problem solving a Cauchy Euler equation

Another Cauchy-Euler equation example problem solved.

From playlist Differential Equations

Video thumbnail

Abel formula

This is one of my all-time favorite differential equation videos!!! :D Here I'm actually using the Wronskian to actually find a nontrivial solution to a second-order differential equation. This is amazing because it brings the concept of the Wronskian back to life! And as they say, you won

From playlist Differential equations

Video thumbnail

C35 The Cauchy Euler Equation

I continue the look at higher-order, linear, ordinary differential equations. This time, though, they have variable coefficients and of a very special kind.

From playlist Differential Equations

Video thumbnail

C47 Example problem solving a Cauchy Euler equation

The last problem solved in this section, before we move on to another technique for linear differential equations.

From playlist Differential Equations

Video thumbnail

OWASP AppSec EU 2013: Recipes for enabling HTTPS

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Nelis Boucké | Thomas Herlea | Johan Peeters Securely enabling HTTPS turns out to be tricky and time consuming. There is the considerable acc

From playlist OWASP AppSec EU 2013

Video thumbnail

Strata 2012: Jonathan Gluck, "Winner of the Second Heritage Health Progress Prize"

Strata 2012: Jonathan Gluck, "Winner of the Second Heritage Health Progress Prize"

From playlist Strata SC 2012

Video thumbnail

C45 Example problem solving a Cauchy Euler equation

Solving problems is the ONLY way get to learn these techniques. Another Cauchy-Euler equation solved.

From playlist Differential Equations

Video thumbnail

Wales and Forgotten History: A History Guy Travelogue

The History Guy explores Wales in a special series originally created for The History Guy patrons on Patreon. If you would like exclusive content and interaction with The History Guy, consider becoming a patron at https://www.patreon.com/TheHistoryGuy This is original content based on res

From playlist Great Britain

Video thumbnail

25c3: Messing Around with Garage Doors

Speakers: Timo Kasper, Thomas Eisenbarth Breaking Remote Keyless Entry Systems with Power Analysis We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system. KeeLoq rem

From playlist 25C3: Nothing to hide

Video thumbnail

C37 Example problem solving a Cauchy Euler equation

Example problem solving a homogeneous Cauchy-Euler equation.

From playlist Differential Equations

Video thumbnail

Solving the Bernoulli Differential Equation x^2(dy/dx) + y^2 = xy

Please Subscribe here, thank you!!! https://goo.gl/JQ8Nys How to solve a Bernoulli Differential Equation

From playlist Differential Equations

Video thumbnail

DEFCON 20: Into the Droid: Gaining Access to Android User Data

Speaker: THOMAS CANNON DIRECTOR OF RESEARCH AND DEVELOPMENT, VIAFORENSICS This talk details a selection of techniques for getting the data out of an Android device in order to perform forensic analysis. It covers cracking lockscreen passwords, creating custom forensic ramdisks, bypassing

From playlist DEFCON 20

Video thumbnail

MATH3411 Problem 11

MATH3411 Information, Codes and Ciphers This easy problem encodes an 8-character message using the 9-character 8-bit even parity ASCII code. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Australia

From playlist MATH3411 Information, Codes and Ciphers

Video thumbnail

MATH3411 Problem 14

MATH3411 Information, Codes and Ciphers This problem decodes, corrects, and decodes using the binary (7,4) Hamming code. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Australia

From playlist MATH3411 Information, Codes and Ciphers

Video thumbnail

Francis Walsingham - Elizabethan Spymaster - Extra History

With pop culture staples like James Bond & Fletchly Park, there's a strong association of England and spies. But the tradition and association is older and deeper than we might expect. Enter Francis Walsingham, spy master for Queen Elizabeth I and he is determined to get rid of her enemy,

From playlist Extra History (ALL EPISODES)

Video thumbnail

MATH3411 Problem 19

MATH3411 Information, Codes and Ciphers This problem asks us to prove that the minimal weight w(C) and the minimal distance d(C) of a linear code are equal, and that they are also equal to the minimal size of a set of linearly dependent columns of any parity check matrix H for C. Present

From playlist MATH3411 Information, Codes and Ciphers

Video thumbnail

MATH3411 Problem 37

MATH3411 Information, Codes and Ciphers In this problem, we are asked to construct the Huffman codes for a Markov source and use them to encode a message. We see that this gives nice compression. Presented by Thomas Britz, School of Mathematics and Statistics, Faculty of Science, UNSW Au

From playlist MATH3411 Information, Codes and Ciphers

Video thumbnail

A09 The Hamiltonian

Moving on from Lagrange's equation, I show you how to derive Hamilton's equation.

From playlist Physics ONE

Related pages

Pigpen cipher