Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#AES
YouTube
education
Showing:
30
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Caleb Curry
Cryptography
1
rewiews
Comprehensive introduction to cryptography covering encryption methods, public key systems, digital signatures, and hashing algorithms with practical examples and code demonstrations.
Add to list
7
Lesons
2 hours 30 minutes
On-Demand
Free-Video
media.ccc.de
Kryptographie-Fails aus der Praxis - Häufige Fehler und Lösungen
0
rewiews
Entdecke häufige Fehler bei der Verschlüsselung und lerne, wie man sie vermeidet. Praxisnahe Beispiele zeigen, worauf es bei sicherer Kryptographie ankommt - ohne mathematische Vorkenntnisse.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
CIMPA UCR
Álgebras de Configuración de Brauer y sus Aplicaciones en Criptografía y Ciencias
0
rewiews
Explora las álgebras de configuración de Brauer, su origen y aplicaciones en criptografía, ecuaciones de Yang-Baxter, teoría de grafos y optimización combinatoria.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
TheIACR
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
0
rewiews
Explore vulnerabilities in CTR_DRBG cryptographic algorithm, focusing on cache attacks and key rotation flaws. Learn about potential risks in TLS handshakes and SGX execution.
Add to list
23
Lesons
29 minutes
On-Demand
Free-Video
SNIAVideo
Accelerating Encryption for Solid State Storage Drives
0
rewiews
Discover how hardware acceleration enhances encryption and decryption in SSD storage systems using RISC-V architecture, improving throughput and power efficiency through configurable design implementations.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
The Retracing Boomerang Attack
0
rewiews
Explore advanced cryptanalysis techniques, focusing on the Retracing Boomerang Attack and its variants. Learn about block ciphers, differential attacks, and applications to AES.
Add to list
13
Lesons
26 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Network Security - AES (Advanced Encryption Standard) Algorithm
0
rewiews
Explore AES encryption algorithm's structure, operations, and key components for secure network communication and data protection.
Add to list
11
Lesons
49 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Software Encryption with ASP.NET - Private Key, Public Key, and Hashing Methods
0
rewiews
Learn ASP.NET encryption techniques including private/public key, hashing, Diffie-Hellman, and role-based security. Gain practical skills for implementing secure software solutions.
Add to list
14
Lesons
1 hour 15 minutes
On-Demand
Free-Video
Hussein Nasser
Symmetrical vs Asymmetrical Encryption Pros and Cons by Example
0
rewiews
Explore symmetric and asymmetric encryption methods, their applications, advantages, and limitations. Learn key differences and practical use cases in data security and communication.
Add to list
6
Lesons
22 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Applied Cryptography and Trust - Symmetric Key
0
rewiews
Explore symmetric key encryption, including AES and 3DES, block/stream modes, padding, and key entropy. Gain practical insights into secure data protection methods.
Add to list
13
Lesons
51 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Rust and Cryptography
0
rewiews
Learn Rust programming for cryptography, covering AES, GCM, RSA, and elliptic curve algorithms. Hands-on demonstrations using Visual Studio Code enhance practical understanding.
Add to list
7
Lesons
37 minutes
On-Demand
Free-Video
Bill Buchanan OBE
E-Security Week 2 - Symmetric Key
0
rewiews
Explore symmetric key cryptography: entropy, generators, methods, modes, and salting. Learn about AES, Twofish, 3DES, RC4, ChaCha20, and their applications in security.
Add to list
20
Lesons
1 hour 33 minutes
On-Demand
Free-Video
Linux Foundation
Using OP-TEE as a Cryptography Engine
0
rewiews
Explore OP-TEE's role as a cryptography engine for secure IoT data storage, covering platform setup, driver implementation, and integration with Linux and OpenSSL.
Add to list
38
Lesons
50 minutes
On-Demand
Free-Video
TheIACR
Block Cipher Cryptanalysis: Techniques and Tradeoffs
0
rewiews
Explore block cipher cryptanalysis techniques, including truncated differentials, AES analysis, and reset attacks, to enhance understanding of cryptographic security.
Add to list
18
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Triangulating Rebound Attack on AES-like Hashing
0
rewiews
Explore advanced cryptographic techniques with a focus on triangulating rebound attacks on AES-like hashing, enhancing understanding of cryptanalysis methods.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Linux Foundation
Linux Encryption Performance Improvements and Best Practices
0
rewiews
Explore recent Linux cryptographic stack improvements, covering TLS, dm-crypt, and hardware acceleration. Learn how enhanced encryption performance can bolster data protection across various architectures.
Add to list
14
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptanalysis I - Asiacrypt 2021
0
rewiews
Explore advanced cryptanalysis techniques for symmetric ciphers, including key recovery attacks, algebraic attacks, and quantum rebound attacks on various cryptographic algorithms and hash functions.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
TheIACR
Classification of Designs and Components and AES-like Hashing Cryptanalysis
0
rewiews
Explore cryptographic design classification and AES-like hashing cryptanalysis in this FSE 2024 conference session, featuring expert discussions on cutting-edge research and methodologies.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
John Savill's Technical Training
How Encryption Works - A Comprehensive Guide from Basics to Advanced Techniques
0
rewiews
Explore encryption fundamentals, from symmetric and asymmetric methods to TLS handshakes, Diffie-Hellman exchanges, and AES. Gain insights into secure communication protocols and advanced encryption techniques.
Add to list
48
Lesons
2 hours 38 minutes
On-Demand
Free-Video
Return From The Underworld - The Future Of Red Team Kerberos
0
rewiews
Explore Kerberos authentication, its vulnerabilities, and future developments in red team security through practical demonstrations and in-depth analysis.
Add to list
30
Lesons
43 minutes
On-Demand
Free-Video
Black Hat
Power Analysis Attacks for Cheapskates
0
rewiews
Discover affordable power analysis attack techniques for cryptographic systems using open-source hardware and software. Learn to set up a budget-friendly lab and perform live demonstrations against AES implementations.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
TheIACR
ALE - AES-Based Lightweight Authenticated Encryption
0
rewiews
Explore an innovative AES-based authenticated encryption scheme designed for resource-constrained environments, offering enhanced security and efficiency.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
ACCU Conference
TLS Cryptography for Programmers
0
rewiews
Comprehensive exploration of TLS cryptography, covering secure connections, encryption algorithms, and the intricacies of establishing secure communication between computers and online services.
Add to list
1
Lesons
1 hour 26 minutes
On-Demand
Free-Video
EuroPython Conference
Python Security & Cryptography
0
rewiews
Introducción a la criptografía y seguridad en Python, explorando bibliotecas de encriptación, algoritmos de cifrado, esteganografía y prácticas de codificación segura para desarrolladores.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
NDC Conferences
.NET Data Security - Hope is Not a Strategy
0
rewiews
Learn essential .NET data security techniques including encryption, hashing, and digital signatures to protect sensitive information and ensure data integrity in your applications.
Add to list
17
Lesons
48 minutes
On-Demand
Free-Video
ACM SIGPLAN
The Last Yard: Foundational End-to-End Verification of High-Speed Cryptography
0
rewiews
Explore foundational end-to-end verification of high-speed cryptography, connecting Hacspec, Jasmin, and SSProve tools using Coq. Demonstrates approach with AES implementation proof.
Add to list
1
Lesons
23 minutes
On-Demand
Free-Video
PKI Consortium
Symmetric Key Exchange: Lightweight Alternatives for Post-Quantum IoT
0
rewiews
Explore lightweight symmetric key exchange protocols for IoT devices, ensuring post-quantum security and forward secrecy with efficient key evolution and synchronization methods.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
TheIACR
Quantum Attacks on AES
0
rewiews
Exploration of quantum attacks on AES, discussing potential vulnerabilities and implications for cryptographic security in the era of quantum computing.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Cryptography and Network Security: From Basic Concepts to Advanced Security Protocols
0
rewiews
Master cryptographic algorithms and network security fundamentals, from encryption and authentication to digital signatures, Kerberos, SSL, and key security protocols for robust information protection.
Add to list
24
Lesons
11 hours 44 minutes
On-Demand
Free-Video
NANOG
In-Flight Data Protection in the Quantum Age
0
rewiews
Explore quantum computing threats to network security and discover practical solutions including symmetric ciphers, post-quantum cryptography, and quantum key distribution for future-proof data protection.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
load more...