YoVDO

Public Key Encryption and New Methods of Crypto

Offered By: The Cyber Academy via YouTube

Tags

Cryptography Courses RSA Encryption Courses Discrete logarithms Courses

Course Description

Overview

Explore cutting-edge cryptography techniques in this 35-minute lecture from The Cyber Academy. Delve into public key encryption, RSA, discrete logarithms, and the Chinese remainder theorem. Learn about advanced concepts like homomorphic cryptography, cloud-based encryption, and quantum-robust methods. Discover lattice cryptography, differential privacy, and zero-knowledge proofs. Examine the evolution of encryption algorithms, including obsolete methods and Google's prototype. Gain insights into proof of identity and signature schemes, essential for modern cybersecurity.

Syllabus

Intro
MIT
Evil Numbers
Prime Numbers
Remove
RSA Encryption
Discrete logarithms
I broke the internet
Chinese remainder theorem
Homomorphic cryptography
Mathematical calculations
Cloudbased encryption
Quantum Robust Methods
Lattice Cryptography
Unbalanced Algorithm
Differential Privacy
Commerce Stiff Encryption
Zero Knowledge
Obsolete
Quantum Robust
Google Prototype
Proof of Identity
Signature Schemes
Public Key Encryption


Taught by

The Cyber Academy

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera