Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Factoring Dead - Preparing for the Cryptopocalypse
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why are we here
- 3 New attacks
- 4 MD5 attacks
- 5 Why do we have this disconnect
- 6 Why are we expensive
- 7 Math section
- 8 Asymmetric cryptography
- 9 What is asymmetric cryptography
- 10 What iselliptic curve cryptography
- 11 DiffieHellman key exchange
- 12 Discrete logarithm problem
- 13 The Mathematical Problem
- 14 Elliptic Curve Cryptography
- 15 Discrete logarithm
- 16 NIST recommended key sizes
- 17 Next section
- 18 Discrete logarithm algorithms
- 19 Algorithmic complexity
- 20 Discrete logarithm research
- 21 Discrete logarithm algorithm
- 22 Discrete logarithm progress
- 23 Antwon Joes algorithm
- 24 Current implications
- 25 Linear Algebra
- 26 RSA Public Keys
- 27 Factoring RSA Public Keys
- 28 Factoring Discrete Logs
- 29 Sneakers
- 30 Perfect Forward Sec
- 31 Failure of Trust
- 32 Make a Move
- 33 The ECC is Secure
- 34 Other Trapdoor Functions
- 35 Why arent we using ECC
- 36 Whats Sweetpea
- 37 Sweetpea
- 38 We didnt listen
- 39 RIM
- 40 Blackberry
- 41 Patent trolling
- 42 ECC support
- 43 Android ECC support
- 44 External libraries
- 45 TLS
- 46 Crypto Ecosystem
- 47 DNSSEC
- 48 OpenVPN
- 49 Browsers
- 50 Other software
- 51 Certificates
- 52 Global License
- 53 Use ECC
- 54 Survey your exposure
- 55 Summary