YoVDO

Public Key Encryption and New Methods of Crypto

Offered By: The Cyber Academy via YouTube

Tags

Cryptography Courses RSA Encryption Courses Discrete logarithms Courses

Course Description

Overview

Explore cutting-edge cryptography techniques in this 35-minute lecture from The Cyber Academy. Delve into public key encryption, RSA, discrete logarithms, and the Chinese remainder theorem. Learn about advanced concepts like homomorphic cryptography, cloud-based encryption, and quantum-robust methods. Discover lattice cryptography, differential privacy, and zero-knowledge proofs. Examine the evolution of encryption algorithms, including obsolete methods and Google's prototype. Gain insights into proof of identity and signature schemes, essential for modern cybersecurity.

Syllabus

Intro
MIT
Evil Numbers
Prime Numbers
Remove
RSA Encryption
Discrete logarithms
I broke the internet
Chinese remainder theorem
Homomorphic cryptography
Mathematical calculations
Cloudbased encryption
Quantum Robust Methods
Lattice Cryptography
Unbalanced Algorithm
Differential Privacy
Commerce Stiff Encryption
Zero Knowledge
Obsolete
Quantum Robust
Google Prototype
Proof of Identity
Signature Schemes
Public Key Encryption


Taught by

The Cyber Academy

Related Courses

Advanced Data Structures, RSA and Quantum Algorithms
University of Colorado Boulder via Coursera
Improve Cybersecurity Skills with CTFs - PicoCTF Walkthrough (2018)
freeCodeCamp
Master SAML 2.0 with Okta
Udemy
Babel - An Untyped, Stack-based HLL
Strange Loop Conference via YouTube
Quantum Computation and Information Security
YouTube