Channel Avatar

Internetwork Security @UC6gtk6qGqk1fOOwPjxeNw8g@youtube.com

3.7K subscribers - no pronouns :c

More from this channel (soon)


29:02
Pretty Good Privacy
26:32
The Secure Sockets Layer
29:46
Implementation Attacks
30:34
Solving discrete log problem
30:49
Functional Encryption
24:09
Attribute based Encryption (ABE)
29:05
Identity based Encryption (IBE)
26:40
Shamir's secret sharing and BE
28:10
Modern Stream Ciphers
27:56
Cryptanalysis on Stream Cipher
29:51
Linear Cryptanalysis
27:47
More on Differential Cryptanalysis
27:34
Differential Cryptanalysis
26:14
Time- Memory Trade- off Attack
28:46
Cryptanalysis
30:27
More on Key Exchange Protocol
28:37
Digital Signature Standard (DSS)
32:04
SECURE HASH ALGORITHM (SHA)
31:44
Cryptographic Hash Function
32:03
Universal Hashing.
34:17
Hash Function
31:06
Key Exchange
30:09
Key Management.
33:27
Digital Signature.
29:38
Message Authentication.
28:56
Jacobi Symbol (Contd.)
30:00
Legendre and Jacobi Symbol
30:04
Rabin Cryptosystem
31:55
Chinese Remainder Theorem
30:03
Generalised ElGamal Public Key Cryptosystem
31:13
Elliptic curve Modulo a Prime.
27:27
Elliptic Curve over the Reals
28:56
ElGamal Cryptosystem.
30:04
Primarily Testing
30:06
More on RSA
32:45
DATA ENCRYPTION STANDARD (DES)
33:27
RSA Cryptosystem
32:49
Knapsack Cryptosystem.
31:24
Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange.
37:16
Advanced Encryption Standard (AES) (Contd.)
34:18
Advanced Encryption Standard (AES)
33:48
Abstract algebra (contd.)
32:30
Modular Inverse
29:03
Polynomial Arithmetic.
31:38
Eular's theorem, Quadratic Residue
33:32
Fermat's Little Theorem, Eular PhiFunction
31:08
Extended Euclid Algorithm
28:50
Modular Inverse.
29:41
Number Theory
31:28
Mathematical background.
30:23
LFSR BASED STREAM CIPHER
28:24
Pseudorandom Sequence
34:00
Stream Cipher.
31:13
Triple DES and Modes of Operation.
31:24
DES (Contd.).
27:13
Play Fair Cipher.
34:04
Cryptanalysis on Substitution Cipher (Frequency Analysis ).
31:24
Classical Cryptosystem.
30:05
Introduction to Cryptography.
30:37
Block Cipher