Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Secure Communication
Showing:
105
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Centrum Fizyki Teoretycznej PAN
Protokół BB84 - Wprowadzenie do Kwantowej Kryptografii
0
rewiews
Poznaj podstawy protokołu BB84 w kryptografii kwantowej, w tym polaryzację światła i bezpieczne przesyłanie klucza kryptograficznego na odległość.
Add to list
1
Lesons
11 minutes
On-Demand
Free-Video
Robert Feranec
Hacking Hardware - Samy Kamkar
0
rewiews
Explore hardware hacking techniques, from credit card manipulation to wireless keyboard emulation, with insights on cryptography, fault injection, and firmware reverse engineering tools.
Add to list
14
Lesons
1 hour 1 minute
On-Demand
Free-Video
Hackaday
Replicating a Secure Telephone Key
0
rewiews
Reverse engineering and replicating a secure telephone key: from mechanical design to electrical reproduction, overcoming manufacturing challenges for the Motorola Sectel 9600.
Add to list
22
Lesons
19 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Self-Sovereign Identity
0
rewiews
Explore self-sovereign identity concepts, workflows, and principles with insights on secure channels, credential issuance, verification, and revocation in digital identity management.
Add to list
13
Lesons
42 minutes
On-Demand
Free-Video
Cooper
Pretty Easy Privacy for Everyone - Hack.lu 2018
0
rewiews
Explore p≡p (Pretty Easy Privacy), a user-friendly encryption solution for secure communication. Learn its features, implementation, and potential impact on digital privacy.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
Alan Turing Institute
Privacy Technologies Masterclass - Professor George Danezis, UCL
0
rewiews
Explore privacy technologies with expert George Danezis, covering anonymous communications, PETs, and traffic analysis. Learn about secure systems, smart grid privacy, and machine learning in security.
Add to list
1
Lesons
1 hour 25 minutes
On-Demand
Free-Video
Mozilla Hacks
Web Security: Why It Matters and Best Practices - Mozilla Developer Roadshow Asia
0
rewiews
Explore web security essentials, privacy concerns, and best practices for safer online interactions with Mozilla TechSpeaker Mijanur Rahman Rayhan.
Add to list
15
Lesons
45 minutes
On-Demand
Free-Video
Sundeep Saradhi Kanthety
X.509 Authentication Service Part 2 - Network Security
0
rewiews
Explore X.509 authentication service in-depth, focusing on its role in network security and information protection protocols.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
LASCON
Building Trust-Based Networks with Dime Data Format
0
rewiews
Explore Dime, a modern data format for building trust networks and enabling secure communication. Learn its advantages over X.509 certificates and its potential for future applications.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
IEEE
Don't Shoot the Messenger - Localization Prevention of Satellite Internet Users
0
rewiews
Explore techniques to prevent localization of satellite internet users, enhancing privacy and security in global communications networks.
Add to list
1
Lesons
15 minutes
On-Demand
Free-Video
ETHTaipei
Secure Interoperability with Zero-Knowledge Proofs
0
rewiews
Dive into zero-knowledge proofs and their role in securing blockchain interoperability, exploring practical applications and implementation strategies for cross-chain communication.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
TheIACR
Messaging and Encryption - Fundamentals and Applications
0
rewiews
Explore messaging and encryption concepts, techniques, and applications in this comprehensive session on secure communication technologies.
Add to list
1
Lesons
1 hour 48 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptography Design Techniques - Session 3
0
rewiews
Explore cutting-edge developments in symmetric cryptography design at this Eurocrypt 2023 session, featuring expert presentations on the latest research and innovations in the field.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptography Design Techniques - Session 2
0
rewiews
Explore cutting-edge developments in symmetric cryptography design at Eurocrypt 2023, featuring expert presentations on the latest research and innovations in the field.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs - Session 1
0
rewiews
Explore cutting-edge research on zero-knowledge proofs and cryptographic protocols in this advanced session from a leading cryptography conference.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Quantum Cryptography - Session 1
0
rewiews
Explore cutting-edge quantum cryptography concepts and advancements presented at Crypto 2023, offering insights into the future of secure communication and data protection.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
TheIACR
Secure Updatable Encryption with Adaptive Security - AC 2023
0
rewiews
Explore cutting-edge techniques in updatable encryption with adaptive security, focusing on CCA-1 security in modern cryptographic systems.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
TheIACR
Threshold Cryptography and Distributed Broadcast - AC 2023 Session
0
rewiews
Explore cutting-edge advancements in threshold cryptography and distributed broadcast systems in this comprehensive session from AC 2023, featuring expert insights and discussions.
Add to list
1
Lesons
1 hour 57 minutes
On-Demand
Free-Video
Association for Computing Machinery (ACM)
Compressing Vector OLE
0
rewiews
Explore secure two-party protocols for vector oblivious linear evaluation, its applications, and improvements in pseudorandom correlations and sparse vector-OLE generation.
Add to list
13
Lesons
28 minutes
On-Demand
Free-Video
TheIACR
Oblivious Structures, Key-Exchange and Group Messaging
0
rewiews
Explore oblivious structures, key-exchange protocols, and secure group messaging techniques. Gain insights into cryptographic concepts and their practical applications in communication systems.
Add to list
18
Lesons
1 hour 17 minutes
On-Demand
Free-Video
TheIACR
Cryptographic Protocols and Secure Computation I
0
rewiews
Explore cryptographic protocols, secure computation, and their applications in communication. Delve into PRFs, gap assumptions, and two-party computation concepts.
Add to list
12
Lesons
1 hour 7 minutes
On-Demand
Free-Video
USENIX Enigma Conference
Building End-to-End Encryption and User Identity for Video Conferencing - Zoom's Approach
0
rewiews
Exploring Zoom's approach to end-to-end encryption and user identity in video conferencing, focusing on security, trust, and user-friendly implementation in a remote-first world.
Add to list
1
Lesons
20 minutes
On-Demand
Free-Video
IEEE
Perfect Zero Knowledge for Quantum Multiprover Interactive Proofs
0
rewiews
Explore quantum multiprover interactive proofs and perfect zero knowledge in this concise IEEE presentation by leading researchers in the field.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
TheIACR
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography - Session 2
0
rewiews
Explore the Generalized Montgomery Coordinate as a novel computational tool for advancing isogeny-based cryptography in this insightful conference session.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Symmetric Crypto with Public-Key Applications
0
rewiews
Explore cutting-edge research on symmetric cryptography with public-key applications, presented by leading experts at the prestigious Crypto 2023 conference.
Add to list
1
Lesons
1 hour 13 minutes
On-Demand
Free-Video
TheIACR
Lattice-Based Public Key Cryptography - Session 1
0
rewiews
Explore cutting-edge developments in lattice-based public key cryptography at this Crypto 2023 session, chaired by Shuichi Katsumata.
Add to list
1
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Functional and Witness Encryption - Asiacrypt 2022 Session
0
rewiews
Explore cutting-edge cryptographic techniques in functional and witness encryption, advancing knowledge in secure data sharing and access control mechanisms.
Add to list
1
Lesons
1 hour 29 minutes
On-Demand
Free-Video
TheIACR
Oblivious Transfer, Private Information Retrieval, and Secret Sharing - TCC 2022 Session
0
rewiews
Explore cutting-edge cryptographic techniques including Oblivious Transfer, Private Information Retrieval, and Secret Sharing in this advanced session from TCC 2022.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
TheIACR
Protocols, Key Agreement, and Commitments - TCC 2022 Session
0
rewiews
Explore cutting-edge research on cryptographic protocols, key agreement mechanisms, and commitment schemes in this IACR conference session.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
Quantum Cryptography Advances - TCC 2022 Session
0
rewiews
Explore cutting-edge developments in quantum cryptography and its implications for secure communication in this expert-led session from TCC 2022.
Add to list
1
Lesons
46 minutes
On-Demand
Free-Video
TheIACR
Public Key Cryptography - Encryption I
0
rewiews
Explore cutting-edge advancements in encryption technology and cryptographic protocols in this comprehensive session from PKC 2023.
Add to list
1
Lesons
58 minutes
On-Demand
Free-Video
TheIACR
Authenticated Key Exchange - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge research on authenticated key exchange protocols, their security proofs, and practical applications in cryptography and network security.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
TheIACR
Symmetric Cryptography Design Techniques - Session 1
0
rewiews
Explore cutting-edge developments in symmetric cryptography design, featuring presentations on innovative techniques and algorithms from leading researchers in the field.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
Information Theoretic Security - From Classical to Quantum
0
rewiews
Explore classical and quantum information theoretic security with Prof. El Gamal, covering key concepts and advancements in cybersecurity and digital trust.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
Paul G. Allen School
Practical Aspects of Modern Cryptography - Lecture 1
0
rewiews
Explore practical aspects of modern cryptography, covering essential concepts and real-world applications in information security and data protection.
Add to list
1
Lesons
3 hours 4 minutes
On-Demand
Free-Video
TheIACR
Fault Analysis on Post-Quantum Cryptography - Part 1
0
rewiews
Explore fault analysis techniques in post-quantum cryptography at this CHES 2023 session, chaired by Jean-Jacques Quisquater. Gain insights into cutting-edge research and advancements in cryptographic security.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
TheIACR
Cryptographic Protocols and Tools - Session 14
0
rewiews
Explore cryptographic protocols and tools, enhancing your understanding of secure communication systems and encryption techniques.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
TheIACR
Advanced Encryption and Signatures - Session 17
0
rewiews
Explore cutting-edge encryption techniques and signature schemes in this advanced cryptography session, featuring discussions on flexible pattern matching and adaptive security in attribute-based encryption.
Add to list
1
Lesons
54 minutes
On-Demand
Free-Video
TheIACR
Zero Knowledge Proofs, Oblivious Transfer, and Key Management - Session 20
0
rewiews
Explore zero knowledge proofs, oblivious transfer, and key management techniques in cryptography. Gain insights into advanced security protocols and their applications.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Commitment Schemes in Cryptography - Asiacrypt 2022 Session
0
rewiews
Explore cutting-edge research on cryptographic commitments in this comprehensive session from Asiacrypt 2022, featuring expert presentations and discussions on advanced security protocols.
Add to list
1
Lesons
1 hour 32 minutes
On-Demand
Free-Video
TheIACR
Post-Quantum Cryptography Theory
0
rewiews
Explore cutting-edge developments in post-quantum cryptography theory, examining advanced concepts and potential applications in the evolving landscape of secure communication.
Add to list
1
Lesons
1 hour 42 minutes
On-Demand
Free-Video
TheIACR
Lower Bounds in Cryptography
0
rewiews
Explore cutting-edge research on computational complexity and cryptographic lower bounds in this advanced session from Crypto 2022, featuring expert insights and theoretical discussions.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
TheIACR
Proof Systems in Cryptography
0
rewiews
Explore cutting-edge developments in cryptographic proof systems at this Crypto 2022 session, featuring expert presentations and discussions on advanced theoretical concepts.
Add to list
1
Lesons
1 hour 37 minutes
On-Demand
Free-Video
TheIACR
Public Key Cryptography - Advances and Applications
0
rewiews
Explore cutting-edge developments in public key cryptography through expert presentations and discussions at Crypto 2022, advancing knowledge in this crucial field of information security.
Add to list
1
Lesons
1 hour 40 minutes
On-Demand
Free-Video
TheIACR
Randomness in Cryptography - Session Overview
0
rewiews
Explore cutting-edge research on randomness in cryptography, featuring presentations from leading experts at the prestigious Crypto 2022 conference.
Add to list
1
Lesons
1 hour 35 minutes
On-Demand
Free-Video
TheIACR
Transport Layer Security (TLS) - Session 11
0
rewiews
Explore the intricacies of Transport Layer Security (TLS) protocols, enhancing your understanding of secure communication in modern networks.
Add to list
1
Lesons
1 hour 4 minutes
On-Demand
Free-Video
TheIACR
SNARKs, NIZKs, and Key Exchange - Session 20
0
rewiews
Explore SNARKs, NIZKs, and key exchange protocols in cryptography, focusing on their applications, security properties, and implementation challenges.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
TheIACR
Quantum Cryptography - Eurocrypt 2023 Session
0
rewiews
Explore cutting-edge developments in quantum cryptography, including latest research findings and potential applications in secure communication and data protection.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
Lower Bounds in Cryptography - Sessions 1 and 2
0
rewiews
Explore cutting-edge research on cryptographic lower bounds in this comprehensive session from Eurocrypt 2023, featuring expert presentations and discussions on theoretical advancements.
Add to list
1
Lesons
1 hour 44 minutes
On-Demand
Free-Video
TheIACR
Encryption - Theory of Cryptography Conference 2023
0
rewiews
Explore cutting-edge encryption techniques and research presented at TCC 2023, chaired by Ryo Nishimaki. Gain insights into the latest advancements in cryptographic theory and practice.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
TheIACR
When the Universe Speaks in Quantum Crypto
0
rewiews
Explore quantum cryptography with Zvika Brakerski's talk "When the Universe Speaks in (Quantum) Crypto" at TCC 2023, delving into cutting-edge developments in this fascinating field.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
Kunal Kushwaha
Why You Need to Think About Microservice Security
0
rewiews
Explore microservice security best practices, including intent-based access control, secure communication, and secret management, to enhance your system's protection and efficiency.
Add to list
15
Lesons
53 minutes
On-Demand
Free-Video
Linux Foundation
The Bad Guys Just Broke My Crypto - What Do I Do?
0
rewiews
Explore cryptography challenges, quantum computing threats, and solutions for secure communications in this talk by Intel UK's Kris Chaplin.
Add to list
12
Lesons
49 minutes
On-Demand
Free-Video
TheIACR
Quantum Cryptography - Theoretical Foundations and Applications
0
rewiews
Explore quantum cryptography's foundations, challenges, and future prospects in this comprehensive session on cutting-edge security technologies.
Add to list
1
Lesons
1 hour 24 minutes
On-Demand
Free-Video
TheIACR
Zero-Knowledge Proofs, Threshold and Multi-Signatures - Talk 2
0
rewiews
Explore compressed sigma-protocols for bilinear group arithmetic circuits and their application to logarithmic transparent threshold signatures in this advanced cryptography presentation.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Interactive Non-Malleable Codes
0
rewiews
Explore interactive non-malleable codes with Nils Fleischhacker, delving into cryptographic techniques for secure communication and data integrity in interactive settings.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
media.ccc.de
Messaging Layer Security (MLS): Scaling End-to-End Encryption - RFC 9420
0
rewiews
Explore Messaging Layer Security (MLS), a new IETF standard for scalable end-to-end encryption. Learn its benefits, inner workings, and future prospects in group messaging applications.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
TheIACR
Encryption 3 - PKC 2024 Session and Closing Remarks
0
rewiews
Explore advanced encryption techniques and latest research findings in cryptography, followed by concluding insights from the PKC 2024 conference.
Add to list
1
Lesons
1 hour 54 minutes
On-Demand
Free-Video
TheIACR
Provable Symmetric Cryptography
0
rewiews
Explore cutting-edge developments in provable symmetric cryptography at this Eurocrypt 2024 session, chaired by Gilles Van Assche, featuring latest research and advancements in the field.
Add to list
1
Lesons
52 minutes
On-Demand
Free-Video
TheIACR
Tweakable Block Ciphers - FSE 2024 Session
0
rewiews
Explore tweakable block ciphers in cryptography, examining their design, analysis, and applications in modern security systems. Gain insights from experts in the field.
Add to list
1
Lesons
1 hour 22 minutes
On-Demand
Free-Video
TheIACR
Random Generators in Cryptography - FSE 2024 Session
0
rewiews
Explore cutting-edge techniques in random number generation for cryptography and security applications in this expert-led session from FSE 2024.
Add to list
1
Lesons
41 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Surveillance Is Not The Answer; What Is The Question?
0
rewiews
Explores internet-era challenges like misinformation and surveillance, critiquing increased monitoring as a solution. Proposes alternative approaches for hackers and security experts to address these complex issues.
Add to list
29
Lesons
49 minutes
On-Demand
Free-Video
nullcon
Pushing Private Communication Forward - Engineering at Signal
0
rewiews
Explore Signal's engineering journey, focusing on private communication tools, secure calling, encrypted storage, and new feature development for billions of users worldwide.
Add to list
5
Lesons
47 minutes
On-Demand
Free-Video
media.ccc.de
Briar - Deutsche Übersetzung
0
rewiews
Vorstellung von Briar: Eine zensurresistente P2P-Messaging-App für sichere Kommunikation ohne Internet. Funktionsweise, Ziele und technische Herausforderungen werden erläutert.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
SXSW
Protest Tech from Hong Kong to Belarus
0
rewiews
Explore how protesters in Belarus and Hong Kong leverage technology for democracy, from secure messaging to cryptocurrency, building on global experiences in digital activism and civil resistance.
Add to list
12
Lesons
48 minutes
On-Demand
Free-Video
Linux Foundation
WiFi and Secure Socket Offload in Zephyr
0
rewiews
Explore WiFi and secure socket offload in Zephyr OS, focusing on architecture, implementation for TI CC3220SF SoC, and TLS support for secure communication using mbedTLS.
Add to list
10
Lesons
41 minutes
On-Demand
Free-Video
Collision Conference
Personal Privacy vs National Security
0
rewiews
Debate exploring the tension between individual privacy rights and national security needs, discussing encryption, law enforcement, and government access to communications.
Add to list
12
Lesons
24 minutes
On-Demand
Free-Video
Microsoft
The Latest Innovations with Microsoft Teams
0
rewiews
Discover the latest Microsoft Teams innovations for adaptive meetings, confident presentations, easy webinar hosting, and secure external collaboration.
Add to list
12
Lesons
30 minutes
On-Demand
Free-Video
nullcon
Pretty Easy Privacy - Making Privacy The Default For Everyone
0
rewiews
Explore p≡p's innovative approach to automating digital privacy, making end-to-end encryption and anonymity the default for everyone, regardless of technical expertise.
Add to list
14
Lesons
43 minutes
On-Demand
Free-Video
RSA Conference
When Cybercriminals with Good OpSec Attack
0
rewiews
Explore a decade-long FBI and Symantec investigation into a cybercrime gang with strong operational security, revealing investigative techniques and lessons learned from cracking their defenses.
Add to list
11
Lesons
49 minutes
On-Demand
Free-Video
Cryptography 0 to 128 in 50 Minutes
0
rewiews
Explore cryptography fundamentals, from symmetric and asymmetric methods to hashing and security concerns, in this comprehensive overview for beginners and professionals alike.
Add to list
23
Lesons
58 minutes
On-Demand
Free-Video
Strange Loop Conference
End-to-End Encryption - Behind the Scenes
0
rewiews
Explore end-to-end encryption protocols, their inner workings, and applications beyond messaging. Learn about key exchange, forward secrecy, and authentication in secure communication.
Add to list
17
Lesons
40 minutes
On-Demand
Free-Video
Black Hat
SSL Validation Checking vs. Going to Fail
0
rewiews
Explore SSL certificate validation vulnerabilities in mobile apps using SVF tool. Learn about testing methods, real-world results, and implications for app security.
Add to list
1
Lesons
26 minutes
On-Demand
Free-Video
TheIACR
The End of Crypto
0
rewiews
Explore the future of cryptography and its potential challenges in this thought-provoking talk by Jonathan Zittrain at Crypto 2012, examining the evolving landscape of digital security.
Add to list
1
Lesons
1 hour 6 minutes
On-Demand
Free-Video
DefCamp
How to Implement a Quantum Key Distribution Protocol on IBM's Quantum Computer
0
rewiews
Implementación práctica de protocolo de distribución de claves cuánticas en computadora IBM, explorando aplicaciones en ciberseguridad y criptografía cuántica.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
PHP UK Conference
Security Theatre
0
rewiews
Explore web security threats, vulnerabilities, and best practices. Learn about encryption, authentication, and strategies to protect against hacks and social engineering in this comprehensive talk.
Add to list
32
Lesons
1 hour
On-Demand
Free-Video
Devoxx
SSL - TLS for Mortals
0
rewiews
Demystifying SSL/TLS: Learn secure communication essentials, from public/private keys to practical implementation, empowering you to become the go-to expert for transport-level security in your team.
Add to list
1
Lesons
50 minutes
On-Demand
Free-Video
media.ccc.de
Making the Leaks Flow on a Budget
0
rewiews
Aprenda a criar e operar uma plataforma segura de vazamentos, comunicar-se com fontes e distribuir grandes conjuntos de dados com recursos limitados, usando soluções de código aberto.
Add to list
1
Lesons
25 minutes
On-Demand
Free-Video
PHP UK Conference
The Secrets of Cryptography
0
rewiews
Explore historic codes and modern cryptography, including block and stream ciphers, public key systems, and secure communication techniques in hostile environments.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
GOTO Conferences
SSL - TLS for Mortals
0
rewiews
Demystifying SSL/TLS: Learn about secure communication, public/private keys, certificates, and practical tips for implementing transport-level security in your applications.
Add to list
19
Lesons
44 minutes
On-Demand
Free-Video
IEEE
A Formal Treatment of Accountable Proxying over TLS
0
rewiews
Formal analysis of accountable proxying over TLS, revealing vulnerabilities in mcTLS and proposing a secure alternative with provable security and practical implementation.
Add to list
1
Lesons
21 minutes
On-Demand
Free-Video
media.ccc.de
Schlüsseltechnologie Live: Das Diffie-Hellman-Protokoll
0
rewiews
Erläuterung des Diffie-Hellman-Protokolls für sicheren Schlüsselaustausch über unsichere Kanäle. Grundlagen moderner Kryptographie und deren Bedeutung für vertrauliche Kommunikation.
Add to list
1
Lesons
53 minutes
On-Demand
Free-Video
Building a Cantenna
0
rewiews
Learn to build a high-gain directional Wi-Fi antenna using a can, enhancing your wireless network range and security testing capabilities.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Securing Trust - Defending Against Next Generation Attacks
0
rewiews
Explore next-gen cybersecurity threats and defense strategies, focusing on digital certificates, SSH, and foundational security measures to protect against evolving attacks.
Add to list
27
Lesons
37 minutes
On-Demand
Free-Video
TheIACR
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines
0
rewiews
Explore secure communication on corrupted machines through reverse firewalls, addressing algorithm substitution attacks and perandomizable hybrid encryption for enhanced message transmission protocols.
Add to list
18
Lesons
21 minutes
On-Demand
Free-Video
TheIACR
Efficient Public Key Distance Bounding Protocol
0
rewiews
Learn about an efficient public key distance bounding protocol, its implementation, and security implications in cryptography and network communications.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
TheIACR
Multiparty Protocols, Secure Computation and Related Primitives
0
rewiews
Explore advanced cryptographic concepts including multiparty protocols and secure computation, delving into cutting-edge techniques for protecting sensitive data in collaborative environments.
Add to list
1
Lesons
56 minutes
On-Demand
Free-Video
TheIACR
Real-World Crypto
0
rewiews
Explore practical applications of cryptography in real-world scenarios, focusing on implementation challenges and security considerations.
Add to list
1
Lesons
59 minutes
On-Demand
Free-Video
TheIACR
Message Authentication Codes
0
rewiews
Explore message authentication codes, their applications in cryptography, and techniques for ensuring data integrity and authenticity in secure communications.
Add to list
1
Lesons
1 hour 10 minutes
On-Demand
Free-Video
TheIACR
Quantum Cryptography 1
0
rewiews
Explore quantum cryptography fundamentals, including key distribution protocols and security principles in quantum information systems.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
linux.conf.au
Lightning Talks
0
rewiews
A series of rapid-fire presentations on diverse tech topics, from hiring practices to security protocols, showcasing innovative ideas and sparking discussions in the open-source community.
Add to list
15
Lesons
48 minutes
On-Demand
Free-Video
EuroPython Conference
PGP - GPG Keysigning
0
rewiews
Learn about PGP/GPG keysigning, a crucial process for verifying digital identities and enhancing secure communication in the cryptographic world.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
EuroPython Conference
Towards a More Effective, Decentralized Web
0
rewiews
Explore the future of decentralized web technologies, immutable state concepts, and hash-based data structures challenging traditional client/server paradigms for a more secure and efficient internet.
Add to list
16
Lesons
1 hour 4 minutes
On-Demand
Free-Video
Gopher Academy
PKI for Gophers
0
rewiews
Explore Go primitives for PKI, including certificate hierarchies, mTLS, hardware-backed keys, and public infrastructure. Dive into automated issuance, revocation, and custom PKI implementation.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
NDC Conferences
How to Hack Your Own Mobile App
0
rewiews
Learn techniques to identify and mitigate security vulnerabilities in Xamarin-based mobile apps, focusing on OWASP Mobile Top 10 threats and practical defense strategies.
Add to list
10
Lesons
49 minutes
On-Demand
Free-Video
NDC Conferences
I Just Hacked Your App
0
rewiews
Explore Android app vulnerabilities and learn effective security measures to protect sensitive information, prevent attacks, and ensure secure external communications.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
NDC Conferences
Just What Is a "Service Mesh", and If I Get One Will It Make Everything OK?
0
rewiews
Explore service mesh technology with Istio, understanding its features, benefits, and potential complexities in distributed applications, from microservices to legacy monoliths.
Add to list
1
Lesons
1 hour 3 minutes
On-Demand
Free-Video
Devoxx
I Just Hacked Your App
0
rewiews
Explore Android app vulnerabilities and learn effective security measures to protect sensitive information, prevent attacks, and ensure secure communication in mobile applications.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
RSA Conference
Trust Unearned? Evaluating CA Trustworthiness Across 5 Billion Certificates
0
rewiews
Explore insights from 5 billion TLS certificates to assess CA trustworthiness, revealing key factors and practical strategies for enhancing organizational security.
Add to list
1
Lesons
35 minutes
On-Demand
Free-Video
Circuit Dojo
Zephyr 101 - Introduction to HTTPS in Zephyr Projects
0
rewiews
Learn to create a Zephyr project from scratch, focusing on HTTPS implementation. Explore timers, sample code, and modem tracing for effective IoT development with the nRF9160 Feather.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
load more...