Lectures by Shreedarshan K

Videos from Lectures by Shreedarshan K

Page 1 of 2 • 39 total videos

Substitution watermarking | Digital Watermarking
7:35

Substitution watermarking | Digital Watermarking

Lectures by Shreedarshan K
3.2K views
Digital Watermarking - Classification based on Characteristics
7:34

Digital Watermarking - Classification based on Characteristics

Lectures by Shreedarshan K
4.1K views
Digital Watermarking  - Introduction
7:25

Digital Watermarking - Introduction

Lectures by Shreedarshan K
14.6K views
Elliptic Curve Cryptography |Find points P+Q and 2P |ECC in Cryptography & Security
17:45

Elliptic Curve Cryptography |Find points P+Q and 2P |ECC in Cryptography & Security

Lectures by Shreedarshan K
37.9K views
Elliptic Curve Cryptography |Encryption and Decryption |ECC in Cryptography & Security
19:40

Elliptic Curve Cryptography |Encryption and Decryption |ECC in Cryptography & Security

Lectures by Shreedarshan K
32.3K views
Chinese Remainder Theorem - Statement Problems - 1 | Cryptography
19:03

Chinese Remainder Theorem - Statement Problems - 1 | Cryptography

Lectures by Shreedarshan K
1.2K views
S-DES Decryption Explained with Example
13:56

S-DES Decryption Explained with Example

Lectures by Shreedarshan K
36.2K views
Understanding Prime Numbers: Types and Their Role in Number Theory and Cryptography
7:34

Understanding Prime Numbers: Types and Their Role in Number Theory and Cryptography

Lectures by Shreedarshan K
1.9K views
Relatively Prime or Coprime integers | Cryptography
4:21

Relatively Prime or Coprime integers | Cryptography

Lectures by Shreedarshan K
1.0K views
BLOWFISH ALGORITHM in Cryptography and Network Security | Easy Explanation
10:48

BLOWFISH ALGORITHM in Cryptography and Network Security | Easy Explanation

Lectures by Shreedarshan K
5.4K views
Elliptic Curve Cryptography | Find points on the Elliptic Curve |ECC in Cryptography & Security
13:43

Elliptic Curve Cryptography | Find points on the Elliptic Curve |ECC in Cryptography & Security

Lectures by Shreedarshan K
48.0K views
Avalanche Effect in Cryptography
2:15

Avalanche Effect in Cryptography

Lectures by Shreedarshan K
4.7K views
Double DES and  Triple DES - Explanation and its usage
7:05

Double DES and Triple DES - Explanation and its usage

Lectures by Shreedarshan K
11.8K views
Steganography and Cryptography - Differences
6:30

Steganography and Cryptography - Differences

Lectures by Shreedarshan K
1.7K views
Four Square Cipher - Substitution Cipher with example (Digraph)
15:12

Four Square Cipher - Substitution Cipher with example (Digraph)

Lectures by Shreedarshan K
6.4K views
Feistel Cipher Structure in Cryptography & Network Security |  Easy Explanation
13:18

Feistel Cipher Structure in Cryptography & Network Security | Easy Explanation

Lectures by Shreedarshan K
7.8K views
Block Cipher Modes of Operation : Explanation of all 4 types | Cryptography and Network Security
25:33

Block Cipher Modes of Operation : Explanation of all 4 types | Cryptography and Network Security

Lectures by Shreedarshan K
2.9K views
Message Authentication using Hash Functions -  Network Security
16:37

Message Authentication using Hash Functions - Network Security

Lectures by Shreedarshan K
4.3K views
Network Security - Message Authentication Code (MAC) | Cryptography and Network Security
11:49

Network Security - Message Authentication Code (MAC) | Cryptography and Network Security

Lectures by Shreedarshan K
2.5K views
Network Security - Attacks (Types of attacks - Active and Passive) | Cryptography
8:14

Network Security - Attacks (Types of attacks - Active and Passive) | Cryptography

Lectures by Shreedarshan K
391 views
Network Security - RSA Algorithm with example
14:46

Network Security - RSA Algorithm with example

Lectures by Shreedarshan K
1.4K views
Understanding AES - Advanced Encryption Standard
53:11

Understanding AES - Advanced Encryption Standard

Lectures by Shreedarshan K
4.6K views
Hill Cipher - Encryption and Decryption with Example
25:27

Hill Cipher - Encryption and Decryption with Example

Lectures by Shreedarshan K
2.1K views
GCD of Polynomials | Easy Explanation with examples | Cryptography and Network Security
17:47

GCD of Polynomials | Easy Explanation with examples | Cryptography and Network Security

Lectures by Shreedarshan K
25.4K views