Cryptography

YAK (cryptography)

The YAK is a public-key authenticated key-agreement protocol, proposed by Feng Hao in 2010. It is claimed to be the simplest authenticated key exchange protocol among the related schemes, including MQV, HMQV, Station-to-Station protocol, SSL/TLS etc. The authentication is based on public key pairs. As with other protocols, YAK normally requires a Public Key Infrastructure to distribute authentic public keys to the communicating parties. The security of YAK is disputed (see below and the talk page). (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

What is Cryptography?

When you hear the word "cryptography" your brain probably jumps to someone sitting in a dark room staring at lines of code. You might also think of highly trained software engineers protecting endless amounts of data to keep it safe in a digital infrastructure. Cryptography is all of that

From playlist Concerning Education

Video thumbnail

Cross Site Scripting Tutorial | Penetration Testing Tutorial | Web Application Security | Edureka

đŸ””Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN đŸ”„Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl In this Edureka live, we will go over one of the most rampant vulnerability of web-based applications i.e. Cross-Site Scripting. The following topics wi

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

Symmetric Key Cryptography: The XOR Cipher

This is the fourth in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers the XOR logical operation, that is the exclusive OR operation, explaining how it can be used to encrypt and decrypt a sequence of binary digits. XOR is an im

From playlist Cryptography

Video thumbnail

Executable Grammars: Seeking the minimal extensible self-compiling compiler

(March 4, 2009) Bill McKeeman talks about the smallest extendable self-compiling compiler. Stanford University: http://www.stanford.edu/ Stanford School of Engineering: http://engineering.stanford.edu/ EE380: Computer Systems Colloquium: http://ee380.stanford.edu/ Stanford Center for P

From playlist Engineering

Video thumbnail

DevOpsDays Chicago 2019 - Jason Yee - Ignite: How to shave a yak

Jason Yee - Ignite: How to shave a yak In the IT world, we often talk about “Yak Shaving” - term to describe a chain of tasks that seem unrelated, but which are required in order to accomplish your primary goal. When I mentioned this term to a group of well-seasoned knitters, they all ex

From playlist DevOpsDays Chicago 2019

Video thumbnail

What Happened to the Soviet Supersonic Jump Jets?

https://brilliant.org/CuriousDroid Back on the 70's and 80's the Soviet Union developed a series of VTOL (Vertical Takeoff and Landing) aircraft that culminated in the supersonic Yak-141, something that the west wouldn't achieve until the arrival of the F-35B in 2010 some 20 years later.

From playlist Planes, Trains and Automobiles

Video thumbnail

27c3: Secure communications below the hearing threshold (en)

Speakers: Marcus Nutzinger , Rainer Poisel Improved approaches for auditive steganography Auditive steganography allows for various usage scenarios. In our project we focused on hidden communications in VoIP and GSM in which voice data is typically compressed and transmitted in rea

From playlist 27C3: We come in peace

Video thumbnail

The Dalai Lama's Favorite Breakfast is 2,000 Years Old | Ancient Recipes with Sohla

For over 2,000 years, Sherpas on Mt. Everest have been fueled by a Tibetan porridge called tsampa. Sohla cooks up a traditional version of the dish along with yak butter tea - and learns that cooking with sand is strangely satisfying, in this episode of Ancient Recipes. THE RECIPES For t

From playlist HISTORY EXPLAINED: History Digital Exclusives

Video thumbnail

RustConf 2019 - Tokio-Trace: Scoped, Structured, Async-Aware Diagnostics by Eliza Weisman

RustConf 2019 - Tokio-Trace: Scoped, Structured, Async-Aware Diagnostics by Eliza Weisman tokio-trace is a new set of Rust libraries that provide primitives for recording scoped, structured, and async-aware diagnostics. Unlike traditional logging, tokio-trace emits structured diagnostics

From playlist RustConf 2019

Video thumbnail

Cryptography For Beginners

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Hillsound FreeStep6 Traction System

In this video we take a look at the Hillsound FreeStep6 Traction System. These are sometimes referred to as ‘microspikes’ and are basically mini-crampons. Like snow chains for your shoes, you slip them over your existing footwear and they greatly increase traction in icy and snowy condit

From playlist Reviews and Unboxings

Video thumbnail

We Are What We Eat: Afghanistan | Nat Geo Live

(Part 1 of 7) Join photographer Matthieu Paley in the mountains of Afghanistan where no crops grow, the journey to get flour takes days, and goat eyes are on the menu. ➡ Subscribe: http://bit.ly/NatGeoSubscribe ➡ Get More Nat Geo Live: http://bit.ly/MoreNatGeoLive #NationalGeographic #Afg

From playlist We Are What We Eat | National Geographic

Video thumbnail

Symmetric Key Cryptography: Cryptographic Techniques

This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation step

From playlist Cryptography

Video thumbnail

Theory of Computation Recitation 3

Theory of Computation Recitation 3 aduni

From playlist [Shai Simonson]Theory of Computation

Related pages

Station-to-Station protocol | Key-agreement protocol | Non-interactive zero-knowledge proof | Forward secrecy | MQV | Zero-knowledge proof | Cryptographic hash function | Schnorr group