Lectures by Shreedarshan K
Videos from Lectures by Shreedarshan K
Page 1 of 2 β’ 40 total videos
7:35
Substitution watermarking | Digital Watermarking
Lectures by Shreedarshan K
3.2K views
7:34
Digital Watermarking - Classification based on Characteristics
Lectures by Shreedarshan K
4.1K views
7:25
Digital Watermarking Explained: Protect Your Content π
Lectures by Shreedarshan K
14.6K views
17:45
Master Elliptic Curve Cryptography: How to Calculate P+Q and 2P π
Lectures by Shreedarshan K
37.9K views
19:40
Master Elliptic Curve Cryptography (ECC): Secure Encryption & Decryption π
Lectures by Shreedarshan K
32.3K views
19:03
Master the Chinese Remainder Theorem with Practice Problems in Cryptography π
Lectures by Shreedarshan K
1.2K views
13:56
S-DES Decryption Explained with Example
Lectures by Shreedarshan K
36.2K views
7:34
Understanding Prime Numbers: Types and Their Role in Number Theory and Cryptography
Lectures by Shreedarshan K
1.9K views
4:21
Understanding Relatively Prime (Coprime) Integers in Cryptography π
Lectures by Shreedarshan K
1.0K views
11:24
Counting Primitive Roots of a Prime π’
Lectures by Shreedarshan K
8.9K views
10:48
Understanding Blowfish Algorithm: Simple Guide to Secure Encryption π
Lectures by Shreedarshan K
5.4K views
13:43
Mastering Elliptic Curve Cryptography: How to Find Points on the Curve π
Lectures by Shreedarshan K
48.0K views
2:15
Understanding the Avalanche Effect in Cryptography π
Lectures by Shreedarshan K
4.7K views
7:05
Understanding Double DES & Triple DES: Secure Encryption Methods π
Lectures by Shreedarshan K
11.8K views
6:30
Steganography vs. Cryptography: Key Differences Explained π
Lectures by Shreedarshan K
1.7K views
15:12
Master the Four Square Cipher: A Clear Guide with Example π
Lectures by Shreedarshan K
6.4K views
13:18
Understanding the Feistel Cipher Structure in Cryptography π | Easy Explanation
Lectures by Shreedarshan K
7.8K views
25:33
Mastering Block Cipher Modes: A Complete Guide to 4 Essential Types π
Lectures by Shreedarshan K
2.9K views
16:37
Secure Your Messages: Hash Functions for Authentication π
Lectures by Shreedarshan K
4.3K views
11:49
Secure Your Data with Message Authentication Code (MAC) π | Cryptography & Network Security
Lectures by Shreedarshan K
2.5K views
8:14
Understanding Network Attacks: Active vs Passive Threats π
Lectures by Shreedarshan K
391 views
14:46
Understanding RSA Algorithm: A Complete Guide with Example π
Lectures by Shreedarshan K
1.4K views
53:11
Understanding AES - Advanced Encryption Standard
Lectures by Shreedarshan K
4.6K views
25:27
Master the Hill Cipher: Step-by-Step Encryption & Decryption with Examples π
Lectures by Shreedarshan K
2.1K views