Channel Avatar

Tanja Lange: Cryptology @UCtn5gh5LSZiNg7_2LnizUyA@youtube.com

454 subscribers - no pronouns :c

This is the channel for the course 2MMC10 - Cryptology at Ei


17:50
DL systems over finite fields IV- Example for index calculus attack
00:37
Pitch for Cryptology course
22:31
Post-quantum cryptography - Overview
12:36
Paillier's cryptosystem - Addtive homomorphic encryption
11:06
Elliptic-curve cryptography XIII - Security requirements
21:02
Pairings III - Supersingular curves
18:05
Pairings II - Pairing based protocols
11:58
Pairings I- Impact on security
14:50
Elliptic-curve cryptography XII - Speedups to Pollard rho for ECC
16:01
DL systems over finite fields III - Key sizes and DSA
21:57
DL systems over finite fields II - Index calculus attacks
18:26
DL systems over finite fields I - ElGamal encryption and KEM-DEM framework
30:44
RSA XI - LLL, Coppersmith/Howgrave-Graham, and stereotyped messages
14:35
RSA X - Coppersmith method
15:51
RSA IX - Bad randomness
18:21
RSA VIII - Number-field sieve
18:06
RSA VII - Q-sieve
28:26
RSA VI - Square roots mod n and Dixon's method of random squares
32:56
RSA V - p - 1, p + 1 methods and ECM
20:24
RSA IV - Factorization overview and Pollard rho
25:25
RSA III - Primality tests & primality proofs
12:31
RSA II - RSA signature, use in PGP, and RSA CRT
21:30
RSA I - Security notions and schoolbook RSA
28:39
Symmetric-key cryptography VII - Message authentication codes (MACs)
21:53
Symmetric-key cryptography VI - Example of cryptanalysis of block ciphers
16:17
Symmetric-key cryptography V - Example of block cipher
27:20
Elliptic-curve cryptography XI - Identification schemes and signatures
09:46
Elliptic-curve cryptography X - Signatures: definitions and properties
15:19
Cryptographic hash functions V - Sponge functions
22:28
Cryptographic hash functions IV - Proofs by reduction
18:29
Cryptographic hash functions III - Formal security notions
17:25
Cryptographic hash functions II - Pollard rho for collision search
17:17
Cryptographic hash functions I - Practical aspects and generic hardness
26:11
Short intro to Sage
18:18
Discrete logarithm problem VIII - Summary of DL systems
20:19
Discrete logarithm problem VII - Pohlig-Hellman attack
17:31
Discrete logarithm problem VI - Building up to Pohlig-Hellman attack
16:04
Discrete logarithm problem V - Paralel collision search
25:07
Discrete logarithm problem IV - Pollard's rho method
16:41
Discrete logarithm problem III - Random walks and cycle nding
24:13
Discrete logarithm problem II - Brute-force seach and BSGS
20:22
Discrete logarithm problem I - Hardness assumptions and usage
27:21
Elliptic-curve cryptography IX - Explicit formulas
20:16
Elliptic-curve cryptography VIII - Constant-time scalar multiplication
19:33
Elliptic-curve cryptography VII - Timing attacks and scalar multiplication
19:49
Elliptic-curve cryptography VI - Montgomery curves and birational equivalence
21:48
Elliptic-curve cryptography V - Weierstrass curves
20:52
Elliptic-curve cryptography IV - Edwards curves and twisted Edwards curves
15:59
Elliptic-curve cryptography III - Edwards curves
15:56
Elliptic-curve cryptography II -- Clocks over finite fields
17:27
Elliptic-curve cryptography I - Diffie-Hellman and clocks
12:17
Introduction - How all the pieces fit together