t v nagaraju Technical

Videos from t v nagaraju Technical

Page 1 of 2 • 44 total videos

Time and Space Complexity Analysis | Performance Measurement with Examples - Part 7 | DAA #DSA
6:29

Time and Space Complexity Analysis | Performance Measurement with Examples - Part 7 | DAA #DSA

t v nagaraju Technical
449 views
GROUP || RING || FILED || PEOPERTIES ||  MATHEMATICS OF CRYPTOGRAPHY || CNS
22:21

GROUP || RING || FILED || PEOPERTIES || MATHEMATICS OF CRYPTOGRAPHY || CNS

t v nagaraju Technical
1.8K views
NP-Hard, NP-Complete, and NP Class Problems | Turing Machines | DAA
6:27

NP-Hard, NP-Complete, and NP Class Problems | Turing Machines | DAA

t v nagaraju Technical
11.4K views
5.7 CONSTRUCTION OF  TURING MACHINE FOR ADDITION USING UNARY NUMBERS || TOC || FLAT
5:04

5.7 CONSTRUCTION OF TURING MACHINE FOR ADDITION USING UNARY NUMBERS || TOC || FLAT

t v nagaraju Technical
14.9K views
5.6 CONSTRUCT TURING MACHINE THAT ACCEPTS ODD LENGTH PALINDROME || TOC || FLAT
10:05

5.6 CONSTRUCT TURING MACHINE THAT ACCEPTS ODD LENGTH PALINDROME || TOC || FLAT

t v nagaraju Technical
11.1K views
Miller-Rabin Algorithm: Example and Primality Test in Asymmetric Cryptography
8:10

Miller-Rabin Algorithm: Example and Primality Test in Asymmetric Cryptography

t v nagaraju Technical
6.9K views
EXTENDED EUCLIDEAN ALGORITHM || MULTIPLICATIVE INVERSE || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY
13:50

EXTENDED EUCLIDEAN ALGORITHM || MULTIPLICATIVE INVERSE || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY

t v nagaraju Technical
4.5K views
EUCLIDEAN ALGORITHM || GCD||  PROCEDURE || EXAMPLES || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY
10:30

EUCLIDEAN ALGORITHM || GCD|| PROCEDURE || EXAMPLES || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY

t v nagaraju Technical
8.8K views
FERMAT'S THEOREM WITH EXAMPLES  || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY || NETWORK SECURITY
8:22

FERMAT'S THEOREM WITH EXAMPLES || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY || NETWORK SECURITY

t v nagaraju Technical
11.1K views
ADDITIVE INVERSE || MULTIPLICATIVE INVERSE || PROCEDURE ||  MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY
10:40

ADDITIVE INVERSE || MULTIPLICATIVE INVERSE || PROCEDURE || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY

t v nagaraju Technical
6.1K views
PROCEDURE TO CALCULATE PRIMITIVE ROOTS OF A NUMBER  || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY
10:55

PROCEDURE TO CALCULATE PRIMITIVE ROOTS OF A NUMBER || MATHEMATICS OF ASYMMETRIC CRYPTOGRAPHY

t v nagaraju Technical
7.3K views
TRANSPOSITION TECHNIQUES || RAIL FENCE TECHNIQUE || COLUMNAR TRANSPOSITION -- NETWORK SECURITY
12:06

TRANSPOSITION TECHNIQUES || RAIL FENCE TECHNIQUE || COLUMNAR TRANSPOSITION -- NETWORK SECURITY

t v nagaraju Technical
11.8K views
Polyalphabetic Cipher: Vigenère, Vernam, and One-Time Pad | Substitution & Network Security
12:20

Polyalphabetic Cipher: Vigenère, Vernam, and One-Time Pad | Substitution & Network Security

t v nagaraju Technical
17.4K views
A Model for Network Security
7:31

A Model for Network Security

t v nagaraju Technical
14.7K views
5.5 CONSTRUCT TURING MACHINE THAT ACCEPTS EVEN LENGTH PALINDROME || TOC || FLAT
8:41

5.5 CONSTRUCT TURING MACHINE THAT ACCEPTS EVEN LENGTH PALINDROME || TOC || FLAT

t v nagaraju Technical
13.9K views
Constructing a Turing Machine that Accepts the String 'aba'
4:16

Constructing a Turing Machine that Accepts the String 'aba'

t v nagaraju Technical
16.6K views
Constructing a Turing Machine for the Language L = {0^n1^n2^n}
11:03

Constructing a Turing Machine for the Language L = {0^n1^n2^n}

t v nagaraju Technical
47.7K views
5.2 CONSTRUCT TURING MACHINE FOR THE LANGUAGE L= { 0 ^n 1^n }
14:31

5.2 CONSTRUCT TURING MACHINE FOR THE LANGUAGE L= { 0 ^n 1^n }

t v nagaraju Technical
74.4K views
PUBLIC KEY DISTRIBUTION || PUBLIC KEY INFRASTRUCTURE || DIFFERENT WAYS OF DISTRIBUTING PUBLIC KEYS
24:11

PUBLIC KEY DISTRIBUTION || PUBLIC KEY INFRASTRUCTURE || DIFFERENT WAYS OF DISTRIBUTING PUBLIC KEYS

t v nagaraju Technical
28.2K views
4.3 Design of Push Down Automata Examples -Part-2 || PDA || TOC|| FLAT
13:14

4.3 Design of Push Down Automata Examples -Part-2 || PDA || TOC|| FLAT

t v nagaraju Technical
98.0K views
DIGITAL SIGNATURE STANDARD || DIGITAL SIGNATURE ALGORITHM || DSA | DSS || NETWORK SECURITY
24:44

DIGITAL SIGNATURE STANDARD || DIGITAL SIGNATURE ALGORITHM || DSA | DSS || NETWORK SECURITY

t v nagaraju Technical
82.0K views
2.11 Arden’s Theorem for Regular Expressions | Statement, Proof & Applications | TOC
5:56

2.11 Arden’s Theorem for Regular Expressions | Statement, Proof & Applications | TOC

t v nagaraju Technical
12.8K views
SHA-512 ALGORITHM || SECURE HASH ALGORITHM || CRYPTOGRAPHIC HASH FUNCTIONS || NETWORK SECURITY
26:58

SHA-512 ALGORITHM || SECURE HASH ALGORITHM || CRYPTOGRAPHIC HASH FUNCTIONS || NETWORK SECURITY

t v nagaraju Technical
174.9K views
ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE ||ASYMMETRIC KEY CRYPTOGRAPHY
20:02

ELLIPTIC CURVE CRYPTOGRAPHY & DIFFIE HELMAN KEY EXCHANGE ||ASYMMETRIC KEY CRYPTOGRAPHY

t v nagaraju Technical
47.6K views