12:09
Properties of Divisibility | Number Theory | Mathematics
Lectures by Shreedarshan K
7:47
Primitive Root | Lecture 2 | Cryptography | Number Theory
7:35
Substitution watermarking | Digital Watermarking
7:34
Digital Watermarking - Classification based on Characteristics
7:25
Digital Watermarking - Introduction
9:47
Digital Signature - Lecture 1 [ Need for DS , Properties and Requirements]
17:45
Elliptic Curve Cryptography |Find points P+Q and 2P |ECC in Cryptography & Security
19:40
Elliptic Curve Cryptography |Encryption and Decryption |ECC in Cryptography & Security
10:32
Congruences - Problem | Cryptography | Number Theory
Chinese Remainder Theorem - Statement Problems - 2 | Cryptography
19:03
Chinese Remainder Theorem - Statement Problems - 1 | Cryptography
13:56
S - DES Decryption || Simplified data encryption standard(S-DES) || Explanation with example
Prime Numbers - Types | Number Theory | Cryptography
17:51
Chinese Remainder Theorem | Explanation with example | Cryptography
4:21
Relatively Prime or Coprime integers | Cryptography
11:24
To find number of Primitive Roots of a prime number | Cryptography
7:09
Meet in the Middle attack | Double DES | Easy Explanation
10:48
BLOWFISH ALGORITHM in Cryptography and Network Security | Easy Explanation
13:43
Elliptic Curve Cryptography | Find points on the Elliptic Curve |ECC in Cryptography & Security
Brute force attack in Cryptography and methods to defend brute force attack| Cryptography
2:15
Avalanche Effect in Cryptography
7:05
Double DES and Triple DES - Explanation and its usage
6:30
Steganography and Cryptography - Differences
15:12
Four Square Cipher - Substitution Cipher with example (Digraph)
7:15
Route Cipher - Transposition Cipher - Explanation with example
13:18
Feistel Cipher Structure in Cryptography & Network Security | Easy Explanation
25:33
Block Cipher Modes of Operation : Explanation of all 4 types | Cryptography and Network Security
16:37
Message Authentication using Hash Functions - Network Security
11:49
Network Security - Message Authentication Code (MAC) | Cryptography and Network Security
8:14
Network Security - Attacks (Types of attacks - Active and Passive) | Cryptography
16:20
Network Security - Authentication using Message Encryption | Cryptography
14:46
Network Security - RSA Algorithm with example
53:11
Network Security - AES - Advanced Encryption Standard - Encryption Explained
25:27
Hill Cipher - Encryption and Decryption with Example
17:47
GCD of Polynomials | Easy Explanation with examples | Cryptography and Network Security
13:34
Categories of Cryptographic Systems - Types
21:55
Network Security - Diffie Hellman Key Exchange | Easy Explanation
6:31
Fermat's Theorem - Explanation with example
8:28
Euler's Totient Function [Euler's Phi Function] with examples
8:16
Data Encryption Standard - DES | Cryptography and Network Security
20:58
S-DES Encryption || Simplified data encryption standard(S-DES) || - Encryption & Decryption
16:49
Secret Key Distribution using Public Key Cryptosystem
3:22
Differences between s-DES and DES
16:27
Public Key Distribution - Public Key Authority and Public Key Certificate
7:08
Public Key Distribution [ Public Announcement and Public Available Directory]
16:03
S-DES Encryption || Simplified data encryption standard(S-DES) || - Key Generation
11:56
Public Key Cryptosystems - Advantages over Symmetric Ciphers
10:18
Primitive Root - Cryptography | Number Theory
8:33
Vigenere Cipher - Cryptography
19:42
Affine Cipher Encryption - Cryptography | Explanation with example
LIVE
[Private video]
25:08
Congruences - Cryptography | Explanation with examples
10:16
Transposition Cipher | Cryptography and Network Security [Secure transmission of message]
11:28
Extended Euclidean Algorithm for Modular Inverse - [ Cryptography ] | Explanation with Example
12:00
Euclidean Algorithm to find GCD | Explanation with example | Cryptography
15:21
Cryptography - Playfair Cipher explained with example | Cryptography
8:18
Cryptography - Caesar Cipher | Cryptography