Steven Gordon

Videos from Steven Gordon

Page 1 of 2 • 32 total videos

Simplified Data Encryption Standard (DES) Example
44:01

Simplified Data Encryption Standard (DES) Example

Steven Gordon
74.5K views
Authentication with Symmetric Key Encryption (CSS441, L16, Y15)
35:06

Authentication with Symmetric Key Encryption (CSS441, L16, Y15)

Steven Gordon
3.0K views
Public Key Cryptography (CSS441, L13, Y15)
1:04:50

Public Key Cryptography (CSS441, L13, Y15)

Steven Gordon
1.0K views
Fermats Theorem, Eulers Theorem and Discrete Logs (CSS441, L11, Y15)
1:08:20

Fermats Theorem, Eulers Theorem and Discrete Logs (CSS441, L11, Y15)

Steven Gordon
3.7K views
Data Encryption Standard (CSS441, L06, Y15)
46:39

Data Encryption Standard (CSS441, L06, Y15)

Steven Gordon
9.5K views
Block Ciphers and DES (CSS441, L05, Y15)
1:29:21

Block Ciphers and DES (CSS441, L05, Y15)

Steven Gordon
13.4K views
Assumptions of Encryption and Authentication (ITS335, L04, Y15)
1:04:18

Assumptions of Encryption and Authentication (ITS335, L04, Y15)

Steven Gordon
1.2K views
Symmetric Key Encryption and Brute Force Attacks (ITS335, L03, Y15)
1:16:17

Symmetric Key Encryption and Brute Force Attacks (ITS335, L03, Y15)

Steven Gordon
2.7K views
Classical Substitution Ciphers (CSS441, L03, Y15)
1:08:56

Classical Substitution Ciphers (CSS441, L03, Y15)

Steven Gordon
5.4K views
Transposition Ciphers and Steganography (CSS441, L04, Y15)
1:09:21

Transposition Ciphers and Steganography (CSS441, L04, Y15)

Steven Gordon
3.0K views
Introduction to Cryptography (ITS335, L02, Y15)
56:46

Introduction to Cryptography (ITS335, L02, Y15)

Steven Gordon
2.2K views
Basics of Encryption (CSS441, L01, Y15)
17:15

Basics of Encryption (CSS441, L01, Y15)

Steven Gordon
4.0K views
Secret Key Distribution with Public Key Crypto (CSS322, L23, Y14)
1:08:40

Secret Key Distribution with Public Key Crypto (CSS322, L23, Y14)

Steven Gordon
6.1K views
Distributing Secret Keys with a Key Distribution Center (KDC) (CSS322, L22, Y14)
1:12:18

Distributing Secret Keys with a Key Distribution Center (KDC) (CSS322, L22, Y14)

Steven Gordon
2.4K views
Cryptography Hash Functions (CSS322, L18, Y14)
39:09

Cryptography Hash Functions (CSS322, L18, Y14)

Steven Gordon
1.1K views
Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)
1:19:10

Authentication with Symmetric Key Crypto and MACs (CSS322, L17, Y14)

Steven Gordon
1.5K views
Block Cipher Modes of Operation (CSS322, L8, Y14)
1:01:07

Block Cipher Modes of Operation (CSS322, L8, Y14)

Steven Gordon
9.3K views
Symmetric Key Encryption and Brute Force Attacks (ITS335, L3, Y14)
1:21:34

Symmetric Key Encryption and Brute Force Attacks (ITS335, L3, Y14)

Steven Gordon
1.1K views
Introduction to Security and Cryptography (CSS322, L1, Y14)
1:10:02

Introduction to Security and Cryptography (CSS322, L1, Y14)

Steven Gordon
8.1K views
Classical Encryption Techniques (CSS322, L3, Y14)
1:18:47

Classical Encryption Techniques (CSS322, L3, Y14)

Steven Gordon
3.4K views
Encryption Techniques (ITS335, L2, Y14)
57:09

Encryption Techniques (ITS335, L2, Y14)

Steven Gordon
831 views
RSA Acoustic Cryptanalysis by Genkin, Shamir and Tomer
1:07:45

RSA Acoustic Cryptanalysis by Genkin, Shamir and Tomer

Steven Gordon
1.7K views
Public Key Cryptography and RSA (CSS322, Lecture 10, 2013)
1:19:54

Public Key Cryptography and RSA (CSS322, Lecture 10, 2013)

Steven Gordon
1.3K views
Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)
1:18:04

Authentication and Public Key Cryptography (ITS335, Lecture 5, 2013)

Steven Gordon
1.3K views