Bill Buchanan OBE

Videos from Bill Buchanan OBE

Page 2 of 3 • 64 total videos

Applied Cryptography and Trust: 1. Cipher Fundamentals
44:53

Applied Cryptography and Trust: 1. Cipher Fundamentals

Bill Buchanan OBE
1.6K views
Introduction to CSN11131 (Applied Cryptography and Trust)
41:05

Introduction to CSN11131 (Applied Cryptography and Trust)

Bill Buchanan OBE
1.0K views
Golang and Cryptography: Part 1
1:06:57

Golang and Cryptography: Part 1

Bill Buchanan OBE
2.9K views
Authenticated Encryption using ElGamal and Elliptic Curve Cryptography
25:53

Authenticated Encryption using ElGamal and Elliptic Curve Cryptography

Bill Buchanan OBE
1.3K views
Post-Quantum Cryptography: Lattice-Based Methods
18:54

Post-Quantum Cryptography: Lattice-Based Methods

Bill Buchanan OBE
10.1K views
Introduction to Public Key Encryption
31:20

Introduction to Public Key Encryption

Bill Buchanan OBE
5.0K views
ECC and Discrete Logs Calculations
15:06

ECC and Discrete Logs Calculations

Bill Buchanan OBE
766 views
Basics of Elliptic Curve Cryptography (ECC)
12:16

Basics of Elliptic Curve Cryptography (ECC)

Bill Buchanan OBE
6.5K views
ECDSA: Understanding the Nonce and Private Key
14:14

ECDSA: Understanding the Nonce and Private Key

Bill Buchanan OBE
16.7K views
Next Generation Cryptography
1:22:51

Next Generation Cryptography

Bill Buchanan OBE
609 views
ECC - Why Is Public Key Secure? How Do We Determine Public Key? How We Encrypt?
23:19

ECC - Why Is Public Key Secure? How Do We Determine Public Key? How We Encrypt?

Bill Buchanan OBE
1.1K views
e-Security: Next Generation Cryptography
33:48

e-Security: Next Generation Cryptography

Bill Buchanan OBE
693 views
Ciphertext-Policy Attribute-Based Encryption
16:16

Ciphertext-Policy Attribute-Based Encryption

Bill Buchanan OBE
12.4K views
Solving Discrete Logarithms: Pohlig-Hellman's Algorithm
12:16

Solving Discrete Logarithms: Pohlig-Hellman's Algorithm

Bill Buchanan OBE
7.6K views
Introduction to Elliptic Curve Cryptography
21:40

Introduction to Elliptic Curve Cryptography

Bill Buchanan OBE
2.2K views
Python and Crypto: One-TIme Hashed-based Signatures: HORS
9:56

Python and Crypto: One-TIme Hashed-based Signatures: HORS

Bill Buchanan OBE
886 views
Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST
12:37

Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST

Bill Buchanan OBE
8.3K views
Elliptic Curve Diffie-Hellman (ECDH) with secp256k1
8:12

Elliptic Curve Diffie-Hellman (ECDH) with secp256k1

Bill Buchanan OBE
17.7K views
Cryptography: Public Key
8:40

Cryptography: Public Key

Bill Buchanan OBE
947 views
Homomorphic Encryption
6:47

Homomorphic Encryption

Bill Buchanan OBE
7.8K views
Light-weight Cryptography: Exploring Asymmetric Encryption (ELLI)
7:50

Light-weight Cryptography: Exploring Asymmetric Encryption (ELLI)

Bill Buchanan OBE
4.3K views
Chosen Ciphertext Attack on RSA
8:10

Chosen Ciphertext Attack on RSA

Bill Buchanan OBE
18.4K views
Introduction to RSA
7:56

Introduction to RSA

Bill Buchanan OBE
4.5K views
Eve The Magician - Chosen Cipher Attack
8:53

Eve The Magician - Chosen Cipher Attack

Bill Buchanan OBE
842 views