Lectures by Shreedarshan K

Videos from Lectures by Shreedarshan K

Page 1 of 2 β€’ 40 total videos

7:35

Substitution watermarking | Digital Watermarking

Lectures by Shreedarshan K
3.2K views
7:34

Digital Watermarking - Classification based on Characteristics

Lectures by Shreedarshan K
4.1K views
7:25

Digital Watermarking Explained: Protect Your Content πŸ”’

Lectures by Shreedarshan K
14.6K views
17:45

Master Elliptic Curve Cryptography: How to Calculate P+Q and 2P πŸ”

Lectures by Shreedarshan K
37.9K views
19:40

Master Elliptic Curve Cryptography (ECC): Secure Encryption & Decryption πŸ”

Lectures by Shreedarshan K
32.3K views
19:03

Master the Chinese Remainder Theorem with Practice Problems in Cryptography πŸ”

Lectures by Shreedarshan K
1.2K views
13:56

S-DES Decryption Explained with Example

Lectures by Shreedarshan K
36.2K views
7:34

Understanding Prime Numbers: Types and Their Role in Number Theory and Cryptography

Lectures by Shreedarshan K
1.9K views
4:21

Understanding Relatively Prime (Coprime) Integers in Cryptography πŸ”

Lectures by Shreedarshan K
1.0K views
11:24

Counting Primitive Roots of a Prime πŸ”’

Lectures by Shreedarshan K
8.9K views
10:48

Understanding Blowfish Algorithm: Simple Guide to Secure Encryption πŸ”

Lectures by Shreedarshan K
5.4K views
13:43

Mastering Elliptic Curve Cryptography: How to Find Points on the Curve πŸ”

Lectures by Shreedarshan K
48.0K views
2:15

Understanding the Avalanche Effect in Cryptography πŸ”

Lectures by Shreedarshan K
4.7K views
7:05

Understanding Double DES & Triple DES: Secure Encryption Methods πŸ”

Lectures by Shreedarshan K
11.8K views
6:30

Steganography vs. Cryptography: Key Differences Explained πŸ”

Lectures by Shreedarshan K
1.7K views
15:12

Master the Four Square Cipher: A Clear Guide with Example πŸ”

Lectures by Shreedarshan K
6.4K views
13:18

Understanding the Feistel Cipher Structure in Cryptography πŸ” | Easy Explanation

Lectures by Shreedarshan K
7.8K views
25:33

Mastering Block Cipher Modes: A Complete Guide to 4 Essential Types πŸ”

Lectures by Shreedarshan K
2.9K views
16:37

Secure Your Messages: Hash Functions for Authentication πŸ”

Lectures by Shreedarshan K
4.3K views
11:49

Secure Your Data with Message Authentication Code (MAC) πŸ” | Cryptography & Network Security

Lectures by Shreedarshan K
2.5K views
8:14

Understanding Network Attacks: Active vs Passive Threats πŸ”

Lectures by Shreedarshan K
391 views
14:46

Understanding RSA Algorithm: A Complete Guide with Example πŸ”

Lectures by Shreedarshan K
1.4K views
53:11

Understanding AES - Advanced Encryption Standard

Lectures by Shreedarshan K
4.6K views
25:27

Master the Hill Cipher: Step-by-Step Encryption & Decryption with Examples πŸ”

Lectures by Shreedarshan K
2.1K views