Unlocking Ancient Egypt: The Mysteries of the Rosetta Stone ποΈ
Discover the fascinating story behind the Rosetta Stone and its role in deciphering ancient Egyptian hieroglyphs, revealing secrets of a lost civilization.

CyberSecurity Summary
34 views β’ Nov 8, 2024

About this video
This summary is talking about the Book "Cryptography Algorithms A guide to algorithms in blockchain quantum".
This text is an excerpt from a book on cryptography algorithms, particularly those used in blockchain and quantum computing. The book discusses the history of cryptography, the basics of symmetric and asymmetric encryption, hash functions, digital signatures, zero-knowledge protocols, and quantum cryptography. It also introduces three algorithms created by the author: MB09, MBXI, and MBXX. These algorithms are based on Fermat's Last Theorem and aim to provide more secure and efficient methods for digital payments and data security. The book concludes with an analysis of the potential impact of quantum computing on cryptography and the future of cryptography in a post-quantum world.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Next-generation-Cryptography-Algorithms-Explained-implementation/dp/1789617138?&linkCode=ll1&tag=cvthunderx-20&linkId=90969a7b7ad355c68d6f550674ece1e7&language=en_US&ref_=as_li_ss_tl
This text is an excerpt from a book on cryptography algorithms, particularly those used in blockchain and quantum computing. The book discusses the history of cryptography, the basics of symmetric and asymmetric encryption, hash functions, digital signatures, zero-knowledge protocols, and quantum cryptography. It also introduces three algorithms created by the author: MB09, MBXI, and MBXX. These algorithms are based on Fermat's Last Theorem and aim to provide more secure and efficient methods for digital payments and data security. The book concludes with an analysis of the potential impact of quantum computing on cryptography and the future of cryptography in a post-quantum world.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Next-generation-Cryptography-Algorithms-Explained-implementation/dp/1789617138?&linkCode=ll1&tag=cvthunderx-20&linkId=90969a7b7ad355c68d6f550674ece1e7&language=en_US&ref_=as_li_ss_tl
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
34
Duration
0:28
Published
Nov 8, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.