YoVDO

Public Key Encryption and New Methods of Crypto

Offered By: The Cyber Academy via YouTube

Tags

Cryptography Courses RSA Encryption Courses Discrete logarithms Courses

Course Description

Overview

Explore cutting-edge cryptography techniques in this 35-minute lecture from The Cyber Academy. Delve into public key encryption, RSA, discrete logarithms, and the Chinese remainder theorem. Learn about advanced concepts like homomorphic cryptography, cloud-based encryption, and quantum-robust methods. Discover lattice cryptography, differential privacy, and zero-knowledge proofs. Examine the evolution of encryption algorithms, including obsolete methods and Google's prototype. Gain insights into proof of identity and signature schemes, essential for modern cybersecurity.

Syllabus

Intro
MIT
Evil Numbers
Prime Numbers
Remove
RSA Encryption
Discrete logarithms
I broke the internet
Chinese remainder theorem
Homomorphic cryptography
Mathematical calculations
Cloudbased encryption
Quantum Robust Methods
Lattice Cryptography
Unbalanced Algorithm
Differential Privacy
Commerce Stiff Encryption
Zero Knowledge
Obsolete
Quantum Robust
Google Prototype
Proof of Identity
Signature Schemes
Public Key Encryption


Taught by

The Cyber Academy

Related Courses

Low Weight Discrete Logarithms and Subset Sum in - with Polynomial Memory
TheIACR via YouTube
Marty Hellman on Applied Cryptography and Ethics in Innovation
Bill Buchanan OBE via YouTube
Indices - The Discrete Log - Number Theory
Michael Penn via YouTube
Zero-Knowledge Proofs Based on Discrete Logarithms - Lecture 1
TheIACR via YouTube
Zero-Knowledge Proofs Based on Discrete Logarithms - Part 2
TheIACR via YouTube