Главная
Study mode:
on
1
Intro
2
Why do I need cryptography
3
Confidentiality
4
Symmetric vs Asymmetric
5
Elliptic Curve Cryptography
6
Curve Cryptography
7
Curve Key Exchange
8
Web of Trust
9
Can you trust
10
Hash functions
11
SHA2 family
12
SHA256
13
prescient function
14
Merkle tree
15
Hash tree
16
Merkle hash tree
17
Bitcoin
18
Blockchain
19
How Bitcoin works
20
Why do Bitcoins have value
21
Questions
Description:
Explore advanced cryptography concepts in this PHP UK Conference talk. Delve into hash functions, elliptic curves, and quantum cryptography after a brief refresher on secure communication basics. Examine practical applications, including the trustworthiness of web of trust systems and the appropriate use of blockchain technology. Learn about symmetric vs asymmetric encryption, elliptic curve cryptography, key exchange methods, and the SHA2 family of hash functions. Investigate Merkle trees, Bitcoin's underlying technology, blockchain fundamentals, and the factors contributing to Bitcoin's value. Gain insights into cutting-edge cryptographic techniques and their real-world implementations in this comprehensive presentation.

More Secrets of Cryptography

PHP UK Conference
Add to list
0:00 / 0:00