Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Encryption Algorithms
YouTube
education
Showing:
47
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Python Simplified
Python TDD Workflow - Unit Testing Code Example for Beginners
1
rewiews
Learn Test-Driven Development in Python by implementing Caesar's Cipher. Practice unit testing, follow TDD principles, and participate in a coding challenge to reinforce your new skills.
Add to list
19
Lesons
26 minutes
On-Demand
Free-Video
Great Learning
Encryption
0
rewiews
Learn encryption basics, types, algorithms, and protocols. Understand how encryption works, its differences from cryptography, and protection against brute force attacks.
Add to list
13
Lesons
37 minutes
On-Demand
Free-Video
TheIACR
Statistical Tools for Side-Channel Collision Attacks
0
rewiews
Statistical techniques enhance side-channel collision attacks, improving their effectiveness against cryptographic implementations. Higher-order moments and general forms address practical issues in various scenarios.
Add to list
11
Lesons
23 minutes
On-Demand
Free-Video
OWASP Foundation
HTTPS and TLS Security Practices - Front Line Insights 2016
0
rewiews
Comprehensive overview of modern HTTPS and TLS security practices, covering protocol vulnerabilities, certificate fundamentals, and best practices for implementing strong encryption in web services.
Add to list
1
Lesons
1 hour 1 minute
On-Demand
Free-Video
TheIACR
Blockcipher Cryptanalysis - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge research in blockcipher cryptanalysis, featuring presentations on advanced techniques and vulnerabilities in modern encryption systems.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Simple Snippets
DES Algorithm - Data Encryption Standard, Double and Triple DES
0
rewiews
Comprehensive exploration of DES algorithm, including its variations like Double and Triple DES. Covers key concepts, encryption process, and practical applications in network security.
Add to list
8
Lesons
27 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
The Multi-User Security of GCM, Revisited - Tight Bounds for Nonce Randomization
0
rewiews
Revisiting GCM's multi-user security with new concrete bounds, focusing on nonce re-use across users and re-keying impacts. Provides refined parameterization of adversarial resources for improved security analysis.
Add to list
8
Lesons
21 minutes
On-Demand
Free-Video
White Hat Cal Poly
Secure Storage - Peter Faiman
0
rewiews
Explore data security fundamentals, cryptographic tools, and password protection techniques with White Hat VP Peter Faiman in this comprehensive overview.
Add to list
16
Lesons
36 minutes
On-Demand
Free-Video
The Cyber Academy
Quantum Computing and Impact On Public Key Encryption - Prof Alan Woodward
0
rewiews
Explore quantum computing principles, their impact on encryption, and cutting-edge developments in qubit technology. Gain insights into Shor's algorithm and its implications for cryptography.
Add to list
42
Lesons
55 minutes
On-Demand
Free-Video
Alan Turing Institute
Security and Encoding in Fully Homomorphic Encryption - Rachel Player, Sorbonne Université
0
rewiews
Explore security and encoding in Fully Homomorphic Encryption, covering Ring-LWE parameters, NIST post-quantum standardization, and efficient encoding techniques for higher-depth circuit evaluation.
Add to list
21
Lesons
45 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
Network Security - AES (Advanced Encryption Standard) Algorithm
0
rewiews
Explore AES encryption algorithm's structure, operations, and key components for secure network communication and data protection.
Add to list
11
Lesons
49 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Introduction to Cryptography: Private Key Encryption - Part 1
0
rewiews
Explore private key encryption, key cracking techniques, and cryptography fundamentals. Learn about cipher text conversion, key sizes, and brute force attacks.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
Hussein Nasser
Symmetrical vs Asymmetrical Encryption Pros and Cons by Example
0
rewiews
Explore symmetric and asymmetric encryption methods, their applications, advantages, and limitations. Learn key differences and practical use cases in data security and communication.
Add to list
6
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
Cryptography Research Presentations - Rump Session Part II
0
rewiews
Explore cutting-edge cryptography research and developments in this engaging session from the Crypto 2022 conference, featuring rapid-fire presentations on diverse topics.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptanalysis - Advanced Techniques and Applications
0
rewiews
Explore advanced techniques in symmetric cryptanalysis, examining cutting-edge research and methodologies presented at Crypto 2022 conference.
Add to list
1
Lesons
1 hour 36 minutes
On-Demand
Free-Video
TheIACR
Provably Secure Symmetric Constructions - Session 1
0
rewiews
Explore cutting-edge research in symmetric cryptography, focusing on provably secure constructions presented at Crypto 2023. Gain insights into the latest advancements in the field.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptanalysis 1 - Crypto 2023
0
rewiews
Explore advanced techniques in symmetric cryptanalysis, focusing on cutting-edge research and methodologies presented at the prestigious Crypto 2023 conference.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
Isogenies and Lattices in Cryptography - Session 12
0
rewiews
Explore isogenies and lattices in cryptography, covering twin smooth integers, polynomials, delayed encryption, sealed bid auctions, and lattice-based techniques for enhanced security.
Add to list
26
Lesons
1 hour 2 minutes
On-Demand
Free-Video
TheIACR
Designing, Implementing, Attacking, and Defending Symmetric Crypto
0
rewiews
Explore symmetric cryptography design, implementation, attacks, and defense strategies in this comprehensive overview of modern encryption techniques and security challenges.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
TheIACR
Non-Linear Layers in Cryptography - Session from Fast Software Encryption 2023
0
rewiews
Explore advanced cryptographic techniques focusing on non-linear layers in modern encryption systems. Gain insights into cutting-edge research and developments in the field.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Randomness in Cryptography - Session Overview
0
rewiews
Explore cutting-edge research on randomness in cryptography, featuring presentations from leading experts at the prestigious Crypto 2022 conference.
Add to list
1
Lesons
1 hour 35 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis of Authenticated Encryption Schemes
0
rewiews
Explore cryptanalysis techniques for authenticated encryption schemes, focusing on vulnerabilities and attack methods to enhance security understanding.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
TheIACR
Cryptographic Design Principles for Lightweight Algorithms
0
rewiews
Explore cutting-edge cryptography insights with Christian Rechberger's invited talk, delving into advanced concepts and potential future developments in the field.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
TheIACR
Encryption - Theory of Cryptography Conference 2023
0
rewiews
Explore cutting-edge encryption techniques and research presented at TCC 2023, chaired by Ryo Nishimaki. Gain insights into the latest advancements in cryptographic theory and practice.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Linux Foundation
Speeding up Linux Disk Encryption
0
rewiews
Discover techniques to optimize Linux disk encryption performance, enhancing system security without compromising speed. Learn from Cloudflare expert Ignat Korchagin.
Add to list
1
Lesons
39 minutes
On-Demand
Free-Video
TheIACR
Tools for Symmetric Cryptanalysis - Eurocrypt 2024
0
rewiews
Explore advanced techniques and methodologies for analyzing symmetric cryptographic systems in this Eurocrypt 2024 session, enhancing your understanding of cryptanalysis.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
TheIACR
Advanced Public-Key Encryption
0
rewiews
Explore cutting-edge developments in public-key cryptography at Eurocrypt 2024, featuring innovative research and expert insights on advanced encryption techniques.
Add to list
1
Lesons
1 hour 2 minutes
On-Demand
Free-Video
Devoxx
Asymmetric Cryptography - A Deep Dive
0
rewiews
Explore asymmetric cryptography's foundations, evolution, and future. Uncover RSA and ECDSA algorithms, their limitations, and post-quantum implications in this mathematical journey through digital security.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
WEareTROOPERS
Better Crypto
0
rewiews
Explore advanced cryptography techniques and best practices for enhanced digital security and privacy protection.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Security BSides San Francisco
Prospecting Ransomware Tech
0
rewiews
Análisis detallado de las tecnologías y tendencias de ransomware en 2017, explorando mezclas de técnicas maliciosas, métodos de propagación y algoritmos de cifrado utilizados por diversas familias de malware.
Add to list
1
Lesons
32 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Red Teaming en Entornos Industriales - César Cuadra & Hernán Parodi - Ekoparty Security Conference - 2020
0
rewiews
Técnicas y herramientas de Red Teaming en entornos industriales, incluyendo ataques remotos, phishing y físicos. Análisis de anatomía de ataques y estrategias de cifrado para evaluar la seguridad empresarial.
Add to list
13
Lesons
50 minutes
On-Demand
Free-Video
0xdade
Un-F*#$ing Cloud Storage Encryption
0
rewiews
Explore secure key rotation for cloud storage encryption, addressing current vulnerabilities and introducing new schemes with improved security and performance trade-offs.
Add to list
15
Lesons
30 minutes
On-Demand
Free-Video
Black Hat
By-Design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms
0
rewiews
Explores mathematical backdoors in encryption algorithms, discussing design, detection, and implications for cryptographic trust and control. Examines historical cases and future challenges in algorithm security.
Add to list
32
Lesons
50 minutes
On-Demand
Free-Video
Black Hat
It Just -Net-works - The Truth About iOS 7's Multipeer Connectivity Framework
0
rewiews
Explore iOS 7's Multipeer Connectivity Framework: network-level analysis, security model, threats, and real-world app implementation. Gain insights into peer-to-peer communication on iOS devices.
Add to list
11
Lesons
30 minutes
On-Demand
Free-Video
The Collision Attack - Attacking CBC and Related Encryptions
0
rewiews
Explore collision attacks on CBC encryption and related methods, uncovering vulnerabilities and understanding their implications for cryptographic security.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
A Tour Through the Magical Wonderful World of Crypto Land
0
rewiews
Explore asymmetric and symmetric cryptography, including Diffie-Hellman, Feistel networks, and encryption algorithms in this comprehensive tour of cryptographic concepts.
Add to list
12
Lesons
40 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis of Round-Reduced LED
0
rewiews
Explore cryptanalysis techniques for round-reduced LED cipher, including differential characteristics, complexity analysis, and advanced attack methods.
Add to list
11
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Security Analysis of PRINCE
0
rewiews
Comprehensive analysis of PRINCE cipher's security, exploring vulnerabilities and strengths in cryptographic design for lightweight applications.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Functional Encryption - Deterministic to Randomized Functions from Simple Assumptions
0
rewiews
Explore functional encryption algorithms, from deterministic to randomized functions, with examples and key concepts like correctness, hiding properties, and encryption algorithms.
Add to list
17
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Post Quantum Cryptography
0
rewiews
Explore post-quantum cryptography and its implications for future security in a rapidly evolving technological landscape.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
S-Boxes
0
rewiews
Explore S-boxes in cryptography: their design, properties, and crucial role in block ciphers. Gain insights into their impact on cipher security and performance.
Add to list
1
Lesons
30 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis of Block Ciphers
0
rewiews
Explore advanced techniques in cryptanalysis of block ciphers, focusing on cutting-edge methods and recent developments in the field of cryptography.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
linux.conf.au
The Dark Side of the ForSSHe
0
rewiews
Explore the world of OpenSSH backdoors, their analysis, and prevention methods. Learn about advanced malware techniques and how to protect Linux servers from sophisticated attacks.
Add to list
27
Lesons
38 minutes
On-Demand
Free-Video
Gopher Academy
Porting Go to the IBM Z Architecture
0
rewiews
Explore porting Go to IBM z Architecture, covering mainframe basics, blockchain applications, and the porting process. Gain insights into optimization techniques and cryptographic implementations.
Add to list
23
Lesons
39 minutes
On-Demand
Free-Video
NDC Conferences
Maths or Magic? End-to-End Encryption Explained Like I'm Five
0
rewiews
Interactive exploration of end-to-end encryption, demystifying its workings and security through a simple, engaging approach. Discover how popular messaging platforms keep communications private and protected.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
TheIACR
Public Key and Advanced Encryption - Crypto 2024
0
rewiews
Explore cutting-edge developments in public key cryptography and advanced encryption techniques at this Crypto 2024 session, chaired by Arka Rai Choudhuri.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
TheIACR
Cryptanalysis - Crypto 2024
0
rewiews
Explore cutting-edge cryptanalysis techniques and research presented at Crypto 2024, chaired by Leonid Reyzin. Gain insights into the latest developments in cryptographic security.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
load more...