Channel Avatar

Learning Monkey @UCl8x4Pn9Mnh_C1fue-Yndig@youtube.com

56K subscribers - no pronouns :c

Learning Monkey is a platform where a Computer Science and E


05:15
HMAC Nested MAC Method || Lesson 73 || Cryptography || Learning Monkey||
08:19
MDC and MAC in Cryptography || Lesson 72 || Cryptography || Learning Monkey ||
05:31
Cryptography Hash Function Criteria || Lesson 71 || Cryptography || Learning Monkey||
08:25
Intuition on Cryptography Hash Function || Lesson 70 || Cryptography || Learning Monkey ||
05:25
Message Integrity and Digest || Lesson 69 || Cryptography || Learning Monkey ||
06:00
Attacks on Elgamal Cryptosystem || Lesson 68 || Cryptography || Learning Monkey ||
08:19
Elgamal Cryptosystem Example || Lesson 67 || Cryptography || Learning Monkey ||
11:24
Elgamal Cryptosystem with Proof || Lesson 66 || Cryptography || Learning Monkey ||
05:08
Primitive Roots in a Group || Lesson 65 || Cryptography || Learning Monkey||
06:02
Order of a Group and Element || Lesson 64 || Cryptography || Learning Monkey ||
07:49
63 OAEP Example and Attacks
08:46
Optimal Asymmetric Encryption Padding OAEP || Lesson 62 || Cryptography || Learning Monkey ||
11:49
Attacks on RSA || Lesson 61 || Cryptography || Learning Monkey ||
02:48
RSA Character Example || Lesson 60 || Cryptography || Learning Monkey ||
07:11
Mathematical Proof of RSA || Lesson 59 || Cryptography || Learning Monkey ||
07:15
Understanding RSA with Example || Lesson 58 || Cryptography || Learning Monkey ||
05:16
Trapdoor One way Function Cryptography || Lesson 57 || Cryptography || Learning Monkey||
06:47
Introduction to Asymmetric Key Cryptography || Lesson 56 || Cryptography || Learning Monkey ||
07:33
Exponential and Logarithms for Cryptography || Lesson 55 || Cryptography || Learning Monkey ||
07:12
Finding Eulers Phi Function Value Example || Lesson 54 || Cryptography ||
03:54
Factors and Efficiency || Lesson 53 || Cryptography || Learning Monkey ||
05:37
Primality Test and Efficiency || Lesson 52 || Cryptography || Learning Monkey ||
08:03
Eulers Theorem Proof || Lesson 131.3 || Discrete Mathematics || Learning Monkey ||
09:32
Theorem on Reduced Residue Module || Lesson 131.2 || Discrete Mathematics ||
07:05
Eulers Phi Function and Reduced Residue Modulus || Lesson 131.1 || Discrete Mathematics ||
04:08
GCD Property for Understanding Eulers Theorem || Lesson 125.1 || Discrete Mathematics ||
09:44
Key Expansion in AES || Lesson 51 || Cryptography || Learning Monkey ||
05:52
Add Round Key in AES || Lesson 50 || Cryptography || Learning Monkey ||
07:16
Mix Columns in AES || Lesson 49 || Cryptography || Learning Monkey ||
11:26
Sub Byte Using GF(2^8) in AES || Lesson 48 || Cryptography || Learning Monkey ||
08:19
Sub Byte and Shift Rows in AES || Lesson 47 || Cryptography || Learning Monkey ||
04:08
Each Round in AES || Lesson 46 || Cryptography || Learning Monkey ||
05:02
Introduction to Advanced Encryption Standard (AES) || Lesson 45 || Cryptography ||
04:44
GF(p^n) Inverse Using Euclidean Algorithm || Lesson 44 || Cryptography ||
08:12
GF(p^n) Example || Lesson 43 || Cryptography || Learning Monkey ||
07:25
Galois Field GF(p^n) Multiplication Operation || Lesson 42 || Cryptography ||
08:05
Galois Field GF(p^n) Addition Operation || Lesson 41 || Cryptography || Learning Monkey ||
10:01
Galois Field GF(p) Example || Lesson 40 || Cryptography || Learning Monkey ||
05:21
Understanding Field in Set Theory || Lesson 39 || Cryptography || Learning Monkey ||
05:10
Understanding Triple DES || Lesson 38 || Cryptography || Learning Monkey ||
05:53
Meet in the Middle Attack || Lesson 37 || Cryptography || Learning Monkey ||
05:23
Understanding Double DES || Lesson 36 || Cryptography || Learning Monkey ||
04:03
Cipher Key Weakness in DES || Lesson 35 || Cryptography || Learning Monkey ||
05:10
Key Generation in DES || Lesson 34 || Cryptography || Learning Monkey ||
04:44
Cipher and Reverse Cipher in DES || Lesson 33 || Cryptography || Learning Monkey ||
05:42
S-Box and P-Box in DES Function || Lesson 32 || Cryptography || Learning Monkey ||
07:28
Expansion P-Box in DES Function || Lesson 31 || Cryptography || Learning Monkey ||
07:15
Each Round in DES || Lesson 30 || Cryptography || Learning Monkey ||
05:58
Introduction to Data Encryption Standard DES || Lesson 29 || Cryptography||
12:55
Differential Cryptanalysis || Lesson 28 ||
05:44
Feistel in Modern Block Cipher || Lesson 27 || Cryptography || Learning Monkey ||
09:45
Feistel and Non Feistel Cipher || Lesson 26 || Cryptography || Learning Monkey ||
04:46
Diffusion and Confusion Using Product Cipher || Lesson 25 || Cryptography ||
07:38
Understanding Product Cipher || Lesson 24 || Cryptography || Learning Monkey ||
04:40
Circular Shift and Swap in Modern Block Cipher || Lesson 23 || Cryptography ||
03:53
Xor Operation in Modern Block Cipher || Lesson 22 || Cryptography || Learning Monkey
03:23
Substitution Box (S-Box) || Lesson 21 || Cryptography || Learning Monkey ||
03:26
Compression and Expansion P-Box || Lesson 20 || Cryptography || Learning Monkey ||
06:20
Straight Permutation Box (P-Box) || Lesson 19 || Cryptography || Learning Monkey ||
05:36
Introduction to Modern Block Cipher || Lesson 18 || Cryptography || Learning Monkey ||