Home
Search results “Quantum public key cryptosystems” for the 2011
McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks
 
16:23
Talk at crypto 2011. Authors: Alexander Russell, Hang Dinh, Cristopher Moore. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23607
Views: 1807 TheIACR
Prime Numbers & Public Key Cryptography
 
02:58
A simple explanation of how prime numbers are used in Public Key Cryptography from ABC1 science program Catalyst
Views: 62609 Simon Pampena
Public Key Schemes - Stacey Jeffery - QCSYS 2011
 
08:00
IQC Masters student Stacey Jeffery lectures on the concepts and applications of public key schemes.
Chapter 9, part 4, Information Security: Principles and Practice
 
14:56
Chapter 9: Simple Authentication Protocols Sections 9.3.2-9.3.3 public key authentication, session key Class Lecture, 2011
Views: 4007 Mark Stamp
Classical Cryptographic Protocols in a Quantum World
 
19:25
Talk at crypto 2011. Authors: Adam Smith, Sean Hallgren, Fang Song. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23587
Views: 431 TheIACR
Encryption Simplified
 
00:42
Animation of encryption For an INDEX to my other YouTube Videos, go to https://simplificationofeverything.blogspot.ch/
Views: 909 Andrew Vecsey
Chapter 2, part 4: Crypto Basics --- VENONA, codebook cipher, Zimmerman telegram
 
14:59
Information Security: Principles and Practice, 2nd edition, by Mark Stamp Chapter 2: Crypto Basics Sections 2.3.6-2.3.7 VENONA, codebook cipher, Zimmerman telegram Class Lecture, 2011
Views: 8034 Mark Stamp
Sending Secrets: Security and Cryptography in a Quantum World
 
01:09:40
Cris Moore, Professor, Santa Fe Institute April 13, 2011 Caesar shifted each letter three places in the alphabet. Much of modern computer science was born in the effort to break the Nazi Enigma code, and Cold War spies used code books that fit inside a walnut. Nowadays, the cryptography we depend on every day — for instance, to send our credit card information when we buy something on the Web — relies in turn on the mathematics of prime numbers. But in 1994, Peter Shor discovered that a future quantum computer could crack our cryptosystems by breaking large numbers into their prime factors. Cris will start by describing how these cryptosystems work, and how a quantum computer could break them. (Nothing beyond high-school math, he promises!) He'll end by giving a personal view about whether quantum computers can be built — and what kinds of cryptography could remain secure even if and when they are built.
Views: 5316 Santa Fe Institute
Bi-Deniable Public-Key Encryption
 
22:42
Talk at crypto 2011. Authors: Chris Peikert, Brent Waters, Adam O'Neill. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23594
Views: 825 TheIACR
Elliptic Curve and Quantum Cryptography - CompTIA Security+ SY0-301: 6.1
 
02:30
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Our modern privacy requires new methods of encrypting and protecting our data. In this video, you'll learn how the emerging technologies of elliptic curve and quantum cryptography are changing the face of encryption.
Views: 13942 Professor Messer
Quantum Cryptography: The Future of Information Security
 
01:22
Gilles Brassard, co-creator of quantum cryptography, discusses whether this new type of encryption will find widespread use "before it's too late." Excerpt from an interview with Brassard at the Institute for Quantum Computing at the University of Waterloo, Canada. www.iqc.ca twitter.com/quantumiqc facebook.com/quantumiqc
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
 
18:27
Talk at crypto 2011. Authors: Mihir Bellare, Sriram Keelveedhi. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23599
Views: 436 TheIACR
Understanding Hardware-based Encryption - CompTIA Security+ SY0-301: 4.3
 
06:36
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We often use hardware to handle the resource-heavy encryption process. In this video, you'll learn about trusted platform modules, hardware security modules, USB encryption, and hardware-based hard drive encryption.
Views: 30326 Professor Messer
Classical Cryptography - Stacey Jeffery - QCSYS 2011
 
57:19
IQC Maters student Stacey Jeffery lectures on the concepts and applications of classical cryptography.
Authentication - Stacey Jeffery - QCSYS 2011
 
25:12
IQC Masters student Stacey Jeffery lectures on the concepts and importance of authentication in crypto systems.
Cryptography
 
02:08
Professor Dan Boneh is offering a free, online class on Cryptography starting January 2012. http://www.crypto-class.org/
Views: 21948 mlClassStaff
Introduction to QKD (Experiment) - Evan Meyer-Scott - QCSYS 2011
 
13:28
IQC masters student Evan Meyer-Scott lectures on the methods of a QKD experiment.
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
 
19:12
Talk at crypto 2011. Authors: Taizo Shirai, Koichi Sakumoto, Harunaga Hiwatari. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23604
Views: 566 TheIACR
quick cryptography overview.avi
 
02:01
2 min description of cryptography mindmap video by GG.
Views: 85 Jgilready
Implementing Public and Private Keys - CompTIA Security+ SY0-301: 6.4
 
05:38
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The generation of digital certificates is a staple of any PKI. In this video, you'll learn how to build a set of public and private keys in GPG.
Views: 10110 Professor Messer
Public and Private Keys - CompTIA Security+ SY0-301: 6.3
 
04:13
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Asymmetric encryption technology has redefined our use of encryption with today's technology. In this video, you'll learn how this pair of keys allows use to encrypt, authenticate, manage non-repudiation, and validate our data.
Views: 13831 Professor Messer
Asymmetric Encryption with PGP and GPG - CompTIA Security+ SY0-301: 6.2
 
12:37
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - One of the most popular asymmetric encryption applications of all time is Pretty Good Privacy, and the OpenPGP compliant Gnu Privacy Guard is a commonly used implementation. In this video, you'll learn about both
Views: 19458 Professor Messer
HTTPS and TLS/SSL - CompTIA Security+ SY0-301: 1.4
 
02:26
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We rely on encryption to protect our data across the network. In this video, you'll learn about HTTPS and how we use TLS/SSL to encrypt our network traffic.
Views: 29120 Professor Messer
Make Your Own Encryption Program
 
03:51
📖📕 GET THE NEW TINKERNUT BOOK: http://bit.ly/Tinkernutbook 📕📖 This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script. See if you can decrypt this text: wkjlue#vnrro#huxwxi#uxr\ You can find all the code for this program as well as an alternative for Apple computers at the project page: http://www.tinkernut.com/archives/4193
Views: 100377 Tinkernut
Symmetric vs. Asymmetric Encryption - CompTIA Security+ SY0-301: 6.1
 
04:20
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The two most common encryption methods are symmetric and asymmetric encryption. In this video, you'll learn the differences and when you might to see these two methods employed to protect your data.
Views: 35283 Professor Messer
Cryptographic Hash Functions - CompTIA Security+ SY0-301: 6.2
 
06:57
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Cryptographic hashes provide us with features such as authentication, integrity, confidentiality, and non-repudiation. In this video, you'll learn about some of the most popular hashing ciphers.
Views: 20743 Professor Messer
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem.
 
21:30
Talk at pkc 2010. Authors: Jean-Charles Faugère, Pierre-Jean Spaenlehauer. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23421
Views: 310 TheIACR
Elliptic Curve Cryptography Video 2
 
08:18
Advance Cyber Security. Finding the coordinates of P_1+P_2 Point addition. Based on a Cubic curve with one real component
Views: 11655 Israel Reyes
The Ethics of Cryptography
 
11:33
Final for TCH301
Views: 363 George Steketee
Implementing Certificate Authorities - CompTIA Security+ SY0-301: 6.4
 
03:16
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Implementing a certificate authority can include both commercial and private certificate authorities. In this video, you'll learn the differences and similarities between a commercial and private CA.
Views: 10095 Professor Messer
Fully Homomoorphic Encryption - Shai Halevi
 
01:27:49
Shai Halevi, IBM Research: Fully homomoorphic encryption. http://www1.biu.ac.il/indexE.php
Views: 3490 barilanuniversity
Tutorial on Homomorphic Encryption (part 1)
 
42:38
Tutorial on homomorphic encryption by Shai Halevi, presented at Crypto 2011 in Santa Barbara, CA. Part 1 of 2. Presentation materials available at http://people.csail.mit.edu/shaih/presentations.html
Views: 12511 TheIACR
RADIUS and TACACS - CompTIA Security+ SY0-301: 5.1
 
05:35
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Centralized authentication requires a standard method of providing access from any location and any system. In this video, you'll learn about RADIUS, TACACS, XTACACS, and TACACS+.
Views: 33349 Professor Messer
Intro Cryptography Tutorial: Introduction
 
08:39
An overview of cryptography
Views: 22112 Crazy PC Dudes
Implementing Key Recovery - CompTIA Security+ SY0-301: 6.4
 
02:30
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The key recovery is a critical aspect of any PKI. In this video, you'll learn how to create a Key Recovery Agent certificate to use in a Microsoft Active Domain environment.
Views: 8412 Professor Messer
Associative Law Elliptic Curve Cryptography
 
04:24
(P1+P2)+P3=P1+(P2+P3)
Views: 3019 Israel Reyes
One-Time Pads - CompTIA Security+ SY0-301: 6.2
 
04:55
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The one-time pad is a powerful symmetric encryption mechanism. In this video, you'll learn the history of one-time pads and how you can use a one-time pad to encrypt your secret messages.
Views: 16140 Professor Messer
Overview of Data Encryption - CompTIA Security+ SY0-301: 4.3
 
05:34
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - A popular method of protecting data is storing and using it in an encrypted form. In this video, you'll learn about encrypting entire hard drives, databases, individual files, and removable media.
Views: 10454 Professor Messer
Cryptographic Concepts Part 3.mp4
 
12:41
Basic Cryptographic Concepts & Encrypting Algorithms - Part 3 1. DIT/09/C1/0002 -- Sharmila P 2. DIT/09/C1/0022 -- C.W. Hemachandra 3. DIT/09/C1/0036 -- A.S.R. Fernando 4. DIT/09/C1/0057 -- L.S.R.A. De Silva 5. DIT/09/C1/0106 -- P.T.C. Peiris 6. DIT/09/C1/0111 -- W.S.V.P.Perera Programming Language & Design Concepts -- Assignment 2011 Sri Lanka Institute of Information Technology
Views: 150 wsvperera
Certificate Authorities - CompTIA Security+ SY0-301: 6.3
 
05:37
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We rely on Certificate Authorities to provide a key component of our Public Key Infrastructures. In this video, you'll learn the role of the CA and policies that build additional trust in your certificates.
Views: 15141 Professor Messer
Symmetric Encryption Ciphers - CompTIA Security+ SY0-301: 6.2
 
06:49
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Symmetric encryption is a fundamental method of protecting data. In this video, you'll learn about symmetric ciphers such as RC4, DES, 3DES, AES, Blowfish, and Twofish.
Views: 16555 Professor Messer
Mitigating Multiple Account Issues - CompTIA Security+ SY0-301: 5.3
 
03:54
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We are constantly faced with security concerns associated with the massive number of accounts that we have to manage professionally and personally. In this video, you'll learn about managing identities across multiple sites and how you can mitigate the issues that arise from an individual owning so many different accounts.
Views: 10071 Professor Messer
Trust Models - CompTIA Security+ SY0-301: 6.3
 
03:41
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Different PKIs are subject to different types of trust models. In this video, you'll learn the many ways to implement trust models in different PKI infrastructures.
Views: 9537 Professor Messer
Whole Disk Encryption - CompTIA Security+ SY0-301: 6.2
 
05:19
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Whole disk encryption takes the idea of data protection to an entirely different level. In this video, you'll learn about whole disk encryption technologies and how they can be used to provide the ultimate level of data protection on your devices.
Views: 10707 Professor Messer
Secure Network Coding over the Integers.
 
29:58
Talk at pkc 2010. Authors: Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23403
Views: 231 TheIACR
Lab Matters - Anatomy of the RSA targeted attack
 
09:46
Another edition of "Lab Matters" with a special guest Uri Rivner, Head of New Technologies, Identity Protection and Verification, RSA Security, where he describes what happened when RSA was hacked with a zero-day vulnerability.
Views: 2882 Securelist
Implementing Digital Certificates - CompTIA Security+ SY0-301: 6.4
 
02:57
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The implementation of digital certificates can vary depending on the environment, but the overall process is relatively similar. In this video, you'll see how Microsoft Certificate Services can be used to manage a PKI implementation.
Views: 8579 Professor Messer
Understanding Single-Factor Authentication - CompTIA Security+ SY0-301: 5.2
 
04:38
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Authentication factors are many and varied, and the most common authentications usually involve a single factor. In this video, you'll learn about authentication factor types and how single factor provides advantages and disadvantages to the authentication process.
Views: 11658 Professor Messer
Cryptography with Tamperable and Leaky Memory (Crypto 2011)
 
20:36
Yael Tauman Kalai, Bhavana Kanukurthi, and Amit Sahai Microsoft Research; Boston University; and University of California (UCLA) Abstract. A large and growing body of research has sought to secure cryptographic systems against physical attacks. Motivated by a large variety of real-world physical attacks on memory, an important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan [AGV09] where security is sought under the assumptions that: (1) all memory is leaky, and (2) leakage can be an arbitrarily chosen (efficient) function of the memory. However, physical attacks on memory are not limited to leakage through side-channels, but can also include active tampering attacks through a variety of physical attacks, including heat and EM radiation. Nevertheless, protection against the analogous model for tampering — where (1) all memory is tamperable, and (2) where the tampering can be an arbitrarily chosen (efficient) function applied to the memory — has remained an elusive target, despite significant effort on tampering-related questions. In this work, we tackle this question by considering a model where we assume that both of these pairs of statements are true — that all memory is both leaky and (arbitrarily) tamperable. Furthermore, we assume that this leakage and tampering can happen repeatedly and continually (extending the model of [DHLW, BKKV10] in the context of leakage). We construct a signature scheme and an encryption scheme that are provably secure against such attacks, assuming that memory can be updated in a randomized fashion between episodes of tampering and leakage. In both schemes we rely on the linear assumption over bilinear groups. We also separately consider a model where only continual and repeated tampering (but only bounded leakage) is allowed, and we are able to obtain positive results assuming only that "self-destruct" is possible, without the need for memory updates. Our results also improve previous results in the continual leakage regime without tampering [DHLW, BKKV10]. Whereas previous schemes secure against continual leakage (of arbitrary bounded functions of the secret key), could tolerate only 1/2-ε leakage-rate between key updates under the linear assumption over bilinear groups, our schemes can tolerate 1-ε leakage-rate between key updates, under the same assumption.
Views: 493 TheIACR