Cryptography demystified
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/53194 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
MathematicsCryptographyFilm editingField (computer science)Medical imagingMereologyEncryptionDirection (geometry)AreaComputer animationJSONLecture/Conference
00:52
CryptographyTheoryMeta elementCryptographyMedical imagingMathematicsComputer scienceEncryptionResultantLecture/ConferenceComputer animation
01:46
EncryptionAuthenticationChecklistSemiconductor memorySoftware bugNumber theoryInheritance (object-oriented programming)Computer programmingCryptographyCuboidPlanningComputer-assisted translationChecklistEncryptionSeries (mathematics)AuthenticationPublic key certificateLecture/ConferenceComputer animation
02:46
Computer virusEncryptionAuthenticationEncryptionPublic key certificatePoint (geometry)Message passingCryptographyCASE <Informatik>1 (number)Lecture/ConferenceComputer animation
03:50
EncryptionComputer virusMessage passingContent (media)EncryptionProcedural programmingPoint (geometry)Cartesian coordinate systemCryptographyDeciphermentProcess (computing)Descriptive statisticsLecture/ConferenceComputer animation
05:47
EncryptionComputer virusInformation securityEncryptionProcess (computing)Medical imagingCryptographyMessage passingNumbering schemeMultiplication signKey (cryptography)Procedural programmingPublic-key cryptographyComputerOperator (mathematics)NeuroinformatikAsymmetrySymmetric-key algorithmOrder (biology)CuboidMathematicsWordComputer scienceConnected spaceTerm (mathematics)Descriptive statisticsLecture/ConferenceComputer animation
09:22
EncryptionEncryptionKey (cryptography)Public-key cryptographyConnected spaceWindows RegistryMessage passingDescriptive statisticsComputer animationLecture/Conference
10:04
EncryptionComputer virusTelecommunicationMetadataEncryptionPublic-key cryptographyConnected spaceCryptographyNumbering schemeKey (cryptography)Message passingTelecommunicationPrice indexDescriptive statisticsElectronic mailing listContent (media)FrictionPoint (geometry)Computer animation
12:40
Message passingBlock (periodic table)MathematicsTelecommunicationKey (cryptography)MetadataEncryptionEncryptionMessage passingMetadataMathematicsProcess (computing)Key (cryptography)Intercept theoremLecture/ConferenceComputer animation
13:47
EncryptionAuthenticationChecklistWebsiteMereologyEncryptionAuthenticationChecklistMessage passingPublic-key cryptographyMathematicsNumberInformationSelf-organizationTerm (mathematics)Lecture/ConferenceComputer animation
15:30
AuthenticationMessage passingNumberAuthenticationKey (cryptography)Formal verificationLecture/ConferenceComputer animation
16:11
AuthenticationMessage passingAuthenticationPublic-key cryptographyKey (cryptography)Formal verificationNeuroinformatikTerm (mathematics)Electronic signatureNumberComputerLecture/ConferenceComputer animationProgram flowchart
17:24
AuthenticationFormal verificationMathematicsElectronic signatureCASE <Informatik>NumberKey (cryptography)Validity (statistics)AuthenticationMessage passingTerm (mathematics)Exception handlingFormal verificationLecture/ConferenceComputer animationProgram flowchart
18:50
AuthenticationDistribution (mathematics)ChecklistLatent heatException handlingAuthenticationElectronic signatureCodeMessage passingAssociative propertyPublic key certificateNumberAuthorizationPublic-key cryptographyElectronic mailing listProcess (computing)Key (cryptography)Distribution (mathematics)AreaSlide ruleFormal verificationSelf-organizationGame theorySheaf (mathematics)Latent heatMathematicsTerm (mathematics)Lecture/ConferenceComputer animation
23:06
Key (cryptography)Public key certificateDistribution (mathematics)Public-key cryptographyAuthorizationCASE <Informatik>Single-precision floating-point formatUsabilityComputer animationLecture/Conference
24:18
Key (cryptography)Latent heatPublic key certificateAuthorizationIdentity managementCASE <Informatik>Self-organizationReal numberPower (physics)UsabilityKey (cryptography)Numbering schemeDistribution (mathematics)Computer animation
25:01
Key (cryptography)Latent heatAuthorizationPublic key certificatePublic-key cryptographyKey (cryptography)Power (physics)CryptographyIncidence algebraNumberCASE <Informatik>Lecture/ConferenceComputer animation
25:54
EncryptionAuthenticationChecklistComputer virusGoogolPublic key certificateAuthorizationComa BerenicesDomain nameMessage passingCASE <Informatik>Key (cryptography)AuthenticationCombinational logicInformation securityNumbering schemeDescriptive statisticsSymmetric-key algorithmMathematicsFormal verificationEncryptionNeuroinformatikSystem callProcedural programmingProcess (computing)QuicksortMultiplication signPublic-key cryptographyCodeBuildingLecture/ConferenceEngineering drawing
29:47
EncryptionSymmetric-key algorithmNumbering schemeKey (cryptography)Metric systemSymmetric matrixMessage passingPublic-key cryptographyDescriptive statisticsCryptographyLecture/Conference
30:39
EncryptionTransportschichtHybrid computerSymmetric matrixAuthenticationPublic key certificateMessage passingEncryptionCommunications protocolCombinational logicMaxima and minimaConnected spaceSymmetric matrixElectronic signatureHybrid computerPublic key certificateMessage passingInformation securityAuthenticationCryptographyTransport Layer SecuritySymmetric-key algorithmComputer animation
31:43
SoftwareMessage passingConnected spaceTransport Layer SecuritySource codeLecture/Conference
32:25
TransportschichtEncryptionHybrid computerSymmetric matrixPublic key certificateAuthenticationMessage passingSign (mathematics)Hyperbolic functionEmailServer (computing)EmailConnected spaceCuboidMessage passingCartesian coordinate systemNeuroinformatikComputer animation
33:26
EncryptionSign (mathematics)Hyperbolic functionMessage passingContent (media)AuthenticationMessage passingConnected spaceEmailAuthenticationServer (computing)Public-key cryptographyEncryptionCryptographySoftwareContent (media)Key (cryptography)Multiplication signElectronic mailing listFormal verificationPublic key certificateDistribution (mathematics)Process (computing)Right angle2 (number)Interrupt <Informatik>CuboidMathematicsMetreDescriptive statisticsCASE <Informatik>Interior (topology)Lecture/ConferenceComputer animation
38:41
EncryptionAuthenticationOpen setCommunications protocolMessage passingAddress spaceSlide ruleEmailLecture/Conference
39:25
TwitterCryptographyFeedbackOpen setEmailAddress spaceCryptographyMereologyMessage passingPolygon meshMultiplication signDescriptive statisticsComputer animationLecture/Conference
40:36
EncryptionNumbering schemeNumberCryptographyMathematicsBitMessage passingMultiplication signDescriptive statisticsFigurate numberChainLecture/Conference
42:42
EncryptionMetadataLengthMessage passingIdentity managementGraphics tabletBound stateIdeal (ethics)InternetworkingEmailLecture/Conference
44:17
AdditionEncryptionInternetworkingScaling (geometry)CoprocessorSymmetric-key algorithmTerm (mathematics)Food energySummierbarkeit2 (number)Digital electronicsCryptographyBlock (periodic table)Process (computing)NeuroinformatikNumberLecture/Conference
45:36
Message passingMultiplication signOrder (biology)Heat transferNatural numberLecture/Conference
46:39
EncryptionCryptographyAnalytic setProcess (computing)Elliptic curveSlide ruleEncryptionCurveDescriptive statisticsNeuroinformatikCuboidMathematicsLimit (category theory)Procedural programmingPower (physics)Complex (psychology)Lecture/ConferenceComputer animation
47:45
Process (computing)Limit (category theory)Power (physics)Complex (psychology)EncryptionNumbering scheme1 (number)Vulnerability (computing)NeuroinformatikMoment (mathematics)Information securityState of matterAuthenticationPublic key certificateAuthorizationLecture/Conference
48:35
Public key certificateAuthorizationAuthenticationPower (physics)Computer fileState of matterData loggerGoogolSystem callLecture/Conference
50:21
AuthenticationInternetworkingKey (cryptography)Peer-to-peerCASE <Informatik>EmailData storage deviceCentralizer and normalizerPublic key certificateEndliche ModelltheorieGraph (mathematics)AuthorizationPublic-key cryptographyLecture/Conference
51:44
EmailTransport Layer SecurityConnected spaceEncryptionServer (computing)BuildingEmoticonRoundness (object)Lecture/Conference
52:52
Boom (sailing)Lecture/ConferenceComputer animation
Transcript: Englisch(auto-generated)