Completed
Shannons Theory (Contd...1)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptography and Network Security
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Overview on Modern Cryptography
- 3 Introduction to Number Theory
- 4 Probability and Information Theory
- 5 Classical Cryptosystems
- 6 Cryptanalysis of Classical Ciphers
- 7 Shannons Theory
- 8 Shannons Theory (Contd...1)
- 9 Shannons Theory (Contd...2)
- 10 Symmetric Key Ciphers
- 11 Block Cipher Standards (DES)
- 12 Block Cipher Standards (AES)
- 13 Block Cipher Standards (AES) (Contd.)
- 14 Linear Cryptanalysis
- 15 Differential Cryptanalysis
- 16 Few other Cryptanalytic Techniques
- 17 Overview on S-Box Design Principles
- 18 Modes of Operation of Block Ciphers
- 19 Stream Ciphers
- 20 Stream Ciphers (Contd...1)
- 21 Stream Ciphers (Contd...2)
- 22 Pseudorandomness
- 23 Cryptographic Hash Functions
- 24 Cryptographic Hash Functions (Contd...1)
- 25 Cryptographic Hash Functions (Contd...2)
- 26 Message Authentication Codes
- 27 More Number Theoretic Results
- 28 The RSA Cryptosystem
- 29 Primality Testing
- 30 Factoring Algorithms
- 31 Some Comments on the Security of RSA
- 32 Discrete Logarithm Problem (DLP)
- 33 The Diffie-Hellman Problem and Security of ElGamal Systems
- 34 An Introduction to Elliptic Curve Cryptography
- 35 Application of Elliptic Curves to Cryptography
- 36 Implementation of Elliptic Curve Cryptography
- 37 Secret Sharing Schemes
- 38 A Tutorial on Network Protocols
- 39 System Security
- 40 Firewalls and Intrusion Detection Systems
- 41 Side Channel Analysis of Cryptographic Implementations