Lecture 1: Introduction to Cryptography by Christof Paar
For slides, a problem set and more on learning cryptography, visit www.cryptotextbook.com. The book chapter "Introduction" for this video is also available for free at the website (click "Sample...
 Introduction to Cryptography by Christof Paar
 Length: 77:25
 Tags:

Cryptography 101  The Basics
In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.
 Pico Cetef
 Length: 8:57
 Tags:

James Lyne: Cryptography and the power of randomness
James Lyne is the Director of Technology Strategy at Sophos, a research firm concerned with cyber security. He works with law enforcement and other defense organizations at the forefront of...
 TEDTalentSearch
 Length: 5:22
 Tags:

Public Key Cryptography  Computerphile
Spies used to meet in the park to exchange code words, now things have moved on  Robert Miles explains the principle of Public/Private Key Cryptography note1: Yes, it should have been 'Obi...
 Computerphile
 Length: 6:20
 Tags:

A Short History of Cryptography  A Brief History of Cryptography
A Short History of Cryptography  A Brief History of Cryptography.
 fb
 Length: 44:55
 Tags:

Public Key Cryptography: DiffieHellman Key Exchange
DiffieHellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete logarithm problem. This test clip will...
 Art of the Problem
 Length: 5:24
 Tags:

Cryptography basics: What is Encryption and Decryption
Networks #3: This tutorial introduces the Cryptography basics. It also explains what is Encryption and Decryption. a) Cryptography basics (00:21):http://youtu.be/BEb_AnPWPwY?t=21s how do...
 Engineering Mentor
 Length: 6:45
 Tags:

CISSP Training  Cryptography
PalaestraTraining.com This video on Cryptography (Part 1 of 3) is part of our CISSP certification Training Series. (ISC)2 CISSP certification is one of the top security certifications you...
 The Geek Academy
 Length: 29:19
 Tags:

Visual Cryptography
Hiding your images in style since 1994. Copyright Protection Scheme for Digital Images Using Visual Cryptography and Sampling Methods ChingSheng Hsu YoungChang Hou July 2005 RIT, ...
 Matt Donato
 Length: 8:27
 Tags:

Intro to Cryptography
The basic idea behind why we need cryptography More free lessons at: http://www.khanacademy.org/video?v=Kf9KjCKmDcU.
 Khan Academy
 Length: 1:31
 Tags:

Cryptography: Unbroken Codes
While cryptography has progressed by leaps and bounds, some codes still haven't been broken. Tune in to learn more about some of history's strangest unbroken codes, from the Voynich manuscript...
 Stuff They Don't Want You To Know  HowStuffWorks
 Length: 3:23
 Tags:

Theory and Practice of Cryptography
Google Tech Talks November, 28 2007 Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice and at Google, Proofs of Security and Security Definitions and A Special...
 GoogleTechTalks
 Length: 54:6
 Tags:

Keeping Secrets: Cryptography In A Connected World  Full Program
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield...
 World Science Festival
 Length: 86:51
 Tags:

Encryption and HUGE numbers  Numberphile
Banks, Facebook, Twitter and Google use epic numbers  based on prime factors  to keep our Internet secrets. This is RSA publickey encryption. This video features Dr James Grime (http://singingb...
 Numberphile
 Length: 9:22
 Tags:

Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar
For slides, a problem set and more on learning cryptography, visit www.cryptotextbook.com.
 Introduction to Cryptography by Christof Paar
 Length: 86:31
 Tags:

A brief history of Cryptography with Akamai Chief Security Officer Andy Ellis
Akamai Chief Security Officer, Andy Ellis, shares a brief history of cryptography. Learn more about how Akamai's highly distributed platform delivers applications consistently while providing...
 Akamai Technologies
 Length: 8:12
 Tags:

Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time complexity. Link...
 Art of the Problem
 Length: 16:31
 Tags:

What is Cryptography  Introduction to Cryptography  Lesson 1
In this video I explain the fundamental concepts of cryptography. Encryption, decryption, plaintext, cipher text, and keys. Donate  http://bit.ly/19AHMvX.
 Learn Math Tutorials
 Length: 4:32
 Tags:

CISSP SG Cryptography
Slide Deck can be found at: https://www.defensepointsecurity.com/index.php/corporateinfo/dpsoutreach/cisspstudygroup.
 Defense Point Security
 Length: 27:9
 Tags:

Ehtical Hacking Chapter 5: Cryptography In Hindi /urdu
Ehtical Hacking Chapter 5: Cryptography In Hindi This chapter covers Cryptography Defination,Working & Symmetric Cryptography & It's Algorithem, Asymmetric, or Public Key& It's Algorithem,...
 hacknfun
 Length: 34:11
 Tags:

RSACryptography 2
We construct a small RSA cryptography system using basic number theoretic results, including linear congruences, Euler's function and Euler's Theorem.
 W Conradie
 Length: 12:43
 Tags:

Lecture  32 Basic Cryptographic Concepts Part : I
Lecture Series on Internet Technologies by Prof.I.Sengupta, Department of Computer Science & Engineering ,IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in.
 nptelhrd
 Length: 59:56
 Tags:

What is Modular Arithmetic  Introduction to Modular Arithmetic  Cryptography  Lesson 2
Modular Arithmetic is a fundamental component of cryptography. In this video, I explain the basics of modular arithmetic with a few simple examples. Donate  http://bit.ly/19AHMvX.
 Learn Math Tutorials
 Length: 4:48
 Tags:

ECCHacks  A gentle introduction to ellipticcurve cryptography [31c3]
ECCHacks A gentle introduction to ellipticcurve cryptography This talk will explain how to work with elliptic curves constructively to obtain secure and efficient implementations, and will...
 CCCen
 Length: 55:38
 Tags:

How did the NSA hack our emails?
Professor Edward Frenkel discusses the mathematics behind the NSA Surveillance controversy  see links in full description. More from this interview: http://youtu.be/1O69uBL22nY Professor...
 Numberphile
 Length: 10:59
 Tags:

Ethical Hacking  Symmetric and Asymmetric Cryptography
http://www.trainsignal.com/CertifiedEthicalHacker.aspx?utm_source=YouTube&utm_medium=Social%2BMedia&utm_campaign=CEH.
 TrainSignal is now Pluralsight!
 Length: 7:58
 Tags:

Vinod Vaikuntanathan  Lattices and Cryptography: A Match Made in Heaven
Vinod Vaikuntanathan of the University of Toronto presented a talk titled: Lattices and cryptography: A match made in heaven at the 2014 PQCrypto conference in October, 2014. PQCrypto 2014...
 Institute for Quantum Computing
 Length: 60:58
 Tags:

Secret Codes  Cryptography, Decipherment and the Imitation Game
Hidden messages, and how we uncover them. A quick look at cryptography, cryptanalysis and decipherment. The 2014 film, The Imitation Game, centers on Alan Turing and the cracking of the Enigma...
 NativLang
 Length: 1:56
 Tags:

Cryptography  Breaking the Vigenere Cipher
In this video I go over how to use my Vigenere frequency tool to figure out the keyword used to encrypt a message using the Vigenere Cipher. **This video will not explain why certain columns...
 Brian Veitch
 Length: 4:53
 Tags:

Elliptic Curve Cryptography
Adding two rational points will create a third rational point.
 Israel Reyes
 Length: 2:28
 Tags:

The Fathers of Quantum Cryptography  Charles Bennett
In an interview at the University of Waterloo's Institute for Quantum Computing, Prof. Charles Bennet (IBM Fellow, Thomas J. Watson Research Center) talks about the founders of quantum cryptography.
 Institute for Quantum Computing
 Length: 4:32
 Tags:

6  2  Generic birthday attack CryptographyProfessor Dan Boneh
If you are interest on more free online course info, welcome to: http://opencourseonline.com/ Professor Dan Boneh is offering a free online course on Cryptography starting in March 12, 2012....
 OpenCourseOnline
 Length: 14:38
 Tags:

Sophos conducts live hacking demo using cryptography [Video]
SECURITY FIRM Sophos has showed how hackers could exploit user data from victims' machines using cryptography. Demoing the walkthrough at Infosecurity Europe 2013 conference in London, ...
 theinquirer
 Length: 6:55
 Tags:

Cryptography for the masses: Nadim Kobeissi at TEDxMontreal
(Soustitres en français bientôt disponibles) Amid today's debate on electronic surveillance and the ongoing Arab Spring protests, this young 22 year old Montreal hacktivist founded Cryptocat,...
 TEDx Talks
 Length: 16:31
 Tags:

1  1  Course Overview CryptographyProfessor Dan Boneh
If you are interest on more free online course info, welcome to: http://opencourseonline.com/ Professor Dan Boneh is offering a free online course on Cryptography starting in March 12, 2012....
 OpenCourseOnline
 Length: 10:35
 Tags:

Information Security—Before & After PublicKey Cryptography
[Recorded Jan 26, 2005] Whitfield Diffie, a key figure in the discovery of publickey cryptography, traces the growth of information security through the 20th century and into the 21st. In...
 ComputerHistory
 Length: 76:27
 Tags:

Daniele Micciancio  Latticebased publickey cryptography
Daniele Micciancio of the University of California, San Diego presented an invited talk on latticebased public key cryptography at the 2014 PQCrypto summer school in October, 2014. PQCrypto...
 Institute for Quantum Computing
 Length: 107:21
 Tags:

Prime Numbers & Public Key Cryptography
A simple explanation of how prime numbers are used in Public Key Cryptography from ABC1 science program Catalyst.
 Simon Pampena
 Length: 2:58
 Tags:

Final Year Projects  Visual Cryptography for Biometric Privacy
Final Year Projects  Visual Cryptography for Biometric Privacy More Details: Visit http://clickmyproject.com/asecureerasurecodebasedcloudstoragesystemwithsecuredataforwardingp128.html...
 ClickMyProject
 Length: 7:59
 Tags:

Cryptography Best Practices
Application architects need to make informed choices to use cryptography well: + Alternative key architectures have their merits and drawbacks. PKIs, in particular, should be contrasted with...
 secappdev org
 Length: 101:25
 Tags:

Cryptography  Caesar Cipher  Theory and Implementation
Subscribe if you liked this, more crypto vids to come. This video talks about the Caesar Cipher (http://en.wikipedia.org/wiki/Caesar_cipher) and how to implement encryption in Python.
 Asib
 Length: 22:57
 Tags:

Theory and Practice of Cryptography
Google Tech Talks December, 12 2007 ABSTRACT Topics include: Introduction to Modern Cryptography, Using Cryptography in Practice, Proofs of Security and Security Definitions and A Special...
 GoogleTechTalks
 Length: 48:48
 Tags:

Quantum Cryptography: A Tale of Secrets Revealed Through the Laws of Physics
Daniel Gottesman  Perimeter Institute for Theoretical Physics Sensitive information can be valuable to others  from your personal credit card numbers to state and military secrets. Throughout...
 universalcosmos
 Length: 75:29
 Tags:

WhiteBox Cryptography [30c3]
WhiteBox Cryptography Survey The goal of whitebox cryptography is to protect cryptographic keys in a public implementation of encryption algorithms, primarily in the context of PayTV and...
 CCCen
 Length: 55:35
 Tags:

Public Key Cryptography: Secrecy in Public │ Professor Raymond Flood │
Public Key Cryptography Secrecy in Public Professor Raymond Flood Public Key Cryptography: Secrecy in Public  Professor Raymond Flood 13:00 Tuesday 22nd October 2013 Museum of London, ...
 ScienceHistory2014
 Length: 65:4
 Tags:

Introduction to Cryptography
A 15min snippet of Christof Paar's 2semester course "Introduction to Cryptography" at U Bochum.
 Christof Paar
 Length: 15:0
 Tags:

Fang Song  A Note on Quantum Security for PostQuantum Cryptography
IQC member Fang Song presented a talk titled: A Note on Quantum Security for PostQuantum Cryptography at the 2014 PQCrypto conference in October, 2014. Abstract: Shor's quantum factoring...
 Institute for Quantum Computing
 Length: 25:55
 Tags:

Page: 1 of 892