Author thumbnail

Cihangir Tezcan

Applied Cryptology (2022)

3,502 views
51 items
Last updated on Oct 9, 2023
public playlist
Historical Ciphers
22:37
Frequency Analysis
9:04
Playfair Cipher
10:15
Unbreakable Cipher
12:00
Enigma
8:50
Real World Cryptanalysis
8:32
Bletchley Park: Home of the Codebreakers
8:18
Introduction to Block Ciphers
14:54
Block Cipher Design
16:51
Short Cryptographic Keys
14:30
Problems in Block Ciphers
10:05
PRESENT Block Cipher
15:34
Data Encryption Standard/Algorithm (DES/DEA)
42:51
Advanced Encryption Standard (AES)
24:41
Need for Mode of Operations
11:30
Padding for Block Ciphers
14:07
Mode of Operations for Block Ciphers
32:11
Block Cipher Cryptanalysis
57:55
Differential Cryptanalysis of PRESENT Block Cipher
31:46
Success Probability of Cryptanalysis
9:45
Cryptographic Hash Functions
20:28
Hash Function Constructions
13:30
MD4, MD5, SHA1, RIPEMD, SHA2, and SHA3
21:48
Password Cracking
18:12
Password Based Key Derivation Function (PBKDF2)
13:54
Message Authentication Codes: CMAC and HMAC
9:40
Lightweight MAC Standards
8:09
Authenticated Encryption
15:45
CAESAR Competition
7:55
ASCON Authenticated Encryption Scheme
9:21
Implementation of ASCON in C
49:17
Randomness in Cryptography
18:31
Cryptographic Randomness
19:30
Golomb's Randomness Postulates
14:58
Universal Statistical Test
15:58
Lightweight Stream Ciphers
19:33
Synchronization in Stream Ciphers
20:05
RC4 - A Broken Stream Cipher
6:46
A5/1 - A Broken GSM (2G) Stream Cipher
11:05
Cloning Mifare Classic Smart Cards
23:43
ChaCha, Enocoro, and Trivium Stream Ciphers
11:01
Public-key Cryptography
18:59
Knapsack Public-key Cryptosystem
12:15
Algebra for Cryptography
17:08
Discrete Logarithm Problem, Diffie-Hellman, El-Gamal
22:32
Digital Signature Algorithm (Standard) DSA/DSA
15:08
RSA Cryptosystem and Primality Tests
23:39
Pollard's Rho Algorithm for Integer Factorization
8:26
Elliptic Curve Cryptography
23:32
Elliptic Curve Digital Signature Algorithm ECDSA
18:05
Public Key Certificate
15:42