Lectures by Shreedarshan K
Videos from Lectures by Shreedarshan K
Page 1 of 2 • 39 total videos

7:35
Substitution watermarking | Digital Watermarking
Lectures by Shreedarshan K
3.2K views

7:34
Digital Watermarking - Classification based on Characteristics
Lectures by Shreedarshan K
4.1K views

7:25
Digital Watermarking - Introduction
Lectures by Shreedarshan K
14.6K views

17:45
Elliptic Curve Cryptography |Find points P+Q and 2P |ECC in Cryptography & Security
Lectures by Shreedarshan K
37.9K views

19:40
Elliptic Curve Cryptography |Encryption and Decryption |ECC in Cryptography & Security
Lectures by Shreedarshan K
32.3K views

19:03
Chinese Remainder Theorem - Statement Problems - 1 | Cryptography
Lectures by Shreedarshan K
1.2K views

13:56
S-DES Decryption Explained with Example
Lectures by Shreedarshan K
36.2K views

7:34
Understanding Prime Numbers: Types and Their Role in Number Theory and Cryptography
Lectures by Shreedarshan K
1.9K views

4:21
Relatively Prime or Coprime integers | Cryptography
Lectures by Shreedarshan K
1.0K views

10:48
BLOWFISH ALGORITHM in Cryptography and Network Security | Easy Explanation
Lectures by Shreedarshan K
5.4K views

13:43
Elliptic Curve Cryptography | Find points on the Elliptic Curve |ECC in Cryptography & Security
Lectures by Shreedarshan K
48.0K views

2:15
Avalanche Effect in Cryptography
Lectures by Shreedarshan K
4.7K views

7:05
Double DES and Triple DES - Explanation and its usage
Lectures by Shreedarshan K
11.8K views

6:30
Steganography and Cryptography - Differences
Lectures by Shreedarshan K
1.7K views

15:12
Four Square Cipher - Substitution Cipher with example (Digraph)
Lectures by Shreedarshan K
6.4K views

13:18
Feistel Cipher Structure in Cryptography & Network Security | Easy Explanation
Lectures by Shreedarshan K
7.8K views

25:33
Block Cipher Modes of Operation : Explanation of all 4 types | Cryptography and Network Security
Lectures by Shreedarshan K
2.9K views

16:37
Message Authentication using Hash Functions - Network Security
Lectures by Shreedarshan K
4.3K views

11:49
Network Security - Message Authentication Code (MAC) | Cryptography and Network Security
Lectures by Shreedarshan K
2.5K views

8:14
Network Security - Attacks (Types of attacks - Active and Passive) | Cryptography
Lectures by Shreedarshan K
391 views

14:46
Network Security - RSA Algorithm with example
Lectures by Shreedarshan K
1.4K views

53:11
Understanding AES - Advanced Encryption Standard
Lectures by Shreedarshan K
4.6K views

25:27
Hill Cipher - Encryption and Decryption with Example
Lectures by Shreedarshan K
2.1K views

17:47
GCD of Polynomials | Easy Explanation with examples | Cryptography and Network Security
Lectures by Shreedarshan K
25.4K views