Home
Search results “Prng in cryptography books”
Random Numbers (How Software Works)
 
08:27
How Software Works is a book and video series explaining the magic behind software encryption, CGI, video game graphics, and a lot more. The book uses plain language and lots of diagrams, so no technical or programming background is required. Come discover what's really happening inside your computer! This episode is about random numbers--why software needs them, why they can't really make them, and why that's okay. Learn more about the book... - At the Amazon page (http://amzn.to/1mZ276M). - At my publisher (http://www.nostarch.com/howsoftwareworks) - At my site (http://www.vantonspraul.com/HSW). If you'd like to contact me visit my site (http://vantonspraul.com), or just leave a comment below. Suggestions for future topics are welcome!
Views: 6902 V. Anton Spraul
Is Anything Truly Random?
 
04:49
In 2012, scientists developed a system to predict what number a rolled die would land on. Is anything truly random or is it all predictable? Can Game Theory Help A Presidential Candidate Win? - http://bit.ly/2bMqILU Sign Up For The Seeker Newsletter Here - http://bit.ly/1UO1PxI Read More: On Fair And Randomness http://www.sciencedirect.com/science/article/pii/S0890540109001369 "We investigate the relation between the behavior of non-deterministic systems under fairness constraints, and the behavior of probabilistic systems. To this end, first a framework based on computable stopping strategies is developed that provides a common foundation for describing both fair and probabilistic behavior. On the basis of stopping strategies it is then shown that fair behavior corresponds in a precise sense to random behavior in the sense of Martin-Löf's definition of randomness." Predicting A Die Throw http://phys.org/news/2012-09-die.html "Vegas, Monte Carlo, and Atlantic City draw people from around the world who are willing to throw the dice and take their chances. Researchers from the Technical University of Lodz, Poland, have spotted something predictable in the seemingly random throw of the dice." HTG Explains: How Computers Generate Random Numbers http://www.howtogeek.com/183051/htg-explains-how-computers-generate-random-numbers/ "Computers generate random number for everything from cryptography to video games and gambling. There are two categories of random numbers - "true" random numbers and pseudorandom numbers - and the difference is important for the security of encryption systems." ____________________ DNews is dedicated to satisfying your curiosity and to bringing you mind-bending stories & perspectives you won't find anywhere else! New videos daily. Watch More DNews on Seeker http://www.seeker.com/show/dnews/ Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel DNews on Twitter http://twitter.com/dnews Trace Dominguez on Twitter https://twitter.com/tracedominguez DNews on Facebook https://facebook.com/DiscoveryNews DNews on Google+ http://gplus.to/dnews Discovery News http://discoverynews.com Sign Up For The Seeker Newsletter Here: http://bit.ly/1UO1PxI Special thanks to Jules Suzdaltsev for hosting DNews! Check Jules out on Twitter: https://twitter.com/jules_su
Views: 176777 Seeker
Public key cryptography - Diffie-Hellman Key Exchange (full version)
 
08:38
The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8
Views: 579028 Art of the Problem
Eriko Hironaka - Lehmer's Problem and Dilatations of Mapping Classes
 
01:15:24
Eriko Hironaka talks at the Worldwide Center of Mathematics "Lehmer's Problem and Dilatations of Mapping Classes"
Attacking the Linux PRNG on Android
 
12:06
Speaker: David Kaplan, Senior Security Researcher, IBM Security Systems "Hack Talks: The Technological Aspects of Cybersecurity" The Yuval Ne'eman Science, Technology & Security Workshop, Tel Aviv University, 15.9.14
Views: 193 TAUVOD
Build a Pseudo Random Number Generator that Follows a Specific Sequence in Ruby
 
13:42
In this coding exercise you'll learn how to build a pseudo random number generator in Ruby that dynamically creates a set of random numbers based on a pre-defined sequence.
Views: 307 edutechional
C# Beginners Tutorial - 54 - Generating Random Numbers
 
05:13
Facebook - https://www.facebook.com/TheNewBoston-464114846956315/ GitHub - https://github.com/buckyroberts Google+ - https://plus.google.com/+BuckyRoberts LinkedIn - https://www.linkedin.com/in/buckyroberts reddit - https://www.reddit.com/r/thenewboston/ Support - https://www.patreon.com/thenewboston thenewboston - https://thenewboston.com/ Twitter - https://twitter.com/bucky_roberts
Views: 50574 thenewboston
Bitcoin - Proof of work
 
10:32
An explanation of cryptographic proof-of-work protocols, which are used in various cryptographic applications and in bitcoin mining. More free lessons at: http://www.khanacademy.org/video?v=9V1bipPkCTU Video by Zulfikar Ramzan. Zulfikar Ramzan is a world-leading expert in computer security and cryptography and is currently the Chief Scientist at Sourcefire. He received his Ph.D. in computer science from MIT.
Views: 176763 Khan Academy
EP-02 Steganography -Most ancient way of secure communication | সবথেকে প্রাচীন এবং সুরক্ষিত পদ্ধতি
 
03:42
In this video, we are going to discuss Steganography the most ancient and secure way of communication. Steganography is so much secure that even the containing body can't able to know what is written or what is he carrying. steganography is applied before and now on .its most used before by the king to give secret messages and now in hacking, army and detective organizations. The secrecy has moved up Steganography for a mysterious show. The First written book in steganography was Steganographia. এই ভিডিওতে, আমরা যোগাযোগের সবচেয়ে প্রাচীন এবং সুরক্ষিত উপায় স্টেগানোগ্রাফি নিয়ে আলোচনা করতে যাচ্ছি। স্টেগানোগ্রাফি এত নিরাপদ যে এমনকি বহনকারীও জানতে পারেন না কি লিখা আছে । এটি আগেও ব্যাবহার হয়েছে এখনও হচ্ছে । আগে রাজা বাদশাহ রা স্টেগানোগ্রাফী ব্যাবহার করতেন বার্তা পাঠানোর কাজে এখন ব্যাবহার করা হয় গোয়েন্দা এবং হ্যাকিং এর কাজে । Facebook page link of our channel-https://www.facebook.com/pg/thrillingsecret google+ profile link of our channel-https://plus.google.com/u/1/106033553100926994963 Music materials providing: MusicNoteWorld URL: www.musicnote-world.com
Views: 9 ThriLLinG SeCReT
Chinese Remainder Theorem | PicoCTF 2017 [32] Weird RSA
 
06:14
Hang with our community on Discord! https://discord.gg/Kgtnfw4 If you would like to support me, please like, comment & subscribe, and check me out on Patreon: https://patreon.com/johnhammond010 CYBER SECURITY Humble Bundle: https://www.humblebundle.com/books/cybersecurity-wiley-books?partner=johnhammond PayPal: http://paypal.me/johnhammond010 Site: http://www.johnhammond.org Twitter: https://twitter.com/_johnhammond
Views: 661 John Hammond
Adrien Hauteville - RankSynd a PRNG Based on Rank Metric
 
26:27
Title: RankSynd a PRNG Based on Rank Metric Authors: Philippe Gaborit, Adrien Hauteville, and Jean-Pierre Tillich 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 179 PQCrypto 2016
COMIT Q&A - Cryptographically Secure Off-chain Multi-asset Instant Transaction network
 
01:10:21
COMIT Q&A with Julian Hosp Co-Founder and President and Philipp Hoenisch, Research Lead. At TenX it is our mission to make virtual currencies spendable anytime anywhere. ----------------- New to cryptocurrencies? You might want to read this book first! http://cryptofit.community/cryptobook If you want to keep up with our latest progress please follow us on: Website: http://www.tenx.tech TenX Chat: https://chat.tenx.tech/ Facebook: https://www.facebook.com/tenxwallet/ Twitter: https://twitter.com/tenxwallet Linkedin: https://www.linkedin.com/company/tenxwallet Reddit: https://www.reddit.com/r/TenX/ iTunes Podcast: https://itunes.apple.com/sg/podcast/tenx-cryptoshow-bringing-cryptocurrencies-blockchain/id1323952161
Views: 3593 TenX
Stochastic Supertasks | Infinite Series
 
11:15
We’re now on Patreon! You can lend your support at https://www.patreon.com/pbsinfiniteseries Supertasks allow you to accomplish an infinite number of tasks in a finite amount of time. Find out how these paradoxical feats get even stranger once randomness is introduced. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode The Honeybcomcs of 4-Dimensional Bees https://www.youtube.com/watch?v=X8jOxEGVyPo Vsauce - Supertasks https://www.youtube.com/watch?v=ffUnNaQTfZE Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: http://julio.staff.ipb.ac.id/files/2015/02/Ross_8th_ed_English.pdf -- Pg 46 Special Thanks to John Pike What happens when you try to empty an urn full of infinite balls? It turns out that whether the vase is empty or full at the end of an infinite amount of time depends on what order you try to empty it in. Check out what happens when randomness and the Ross-Littlewood Paradox collide. Comments answered by Kelsey: Lowtech https://www.youtube.com/watch?v=X8jOxEGVyPo&lc=z235h5yquwukfhh2nacdp431mqnc3ul0fvs4cy1tqpdw03c010c Daniel Shapiro https://www.youtube.com/watch?v=X8jOxEGVyPo&lc=z235h5yquwukfhh2nacdp431mqnc3ul0fvs4cy1tqpdw03c010c.1501799589673862 Professor Politics https://www.youtube.com/watch?v=X8jOxEGVyPo&lc=z23xhrzyrzmxeraluacdp43aqfqbpbddfp3g4myyjclw03c010c Alex 24757 https://www.youtube.com/watch?v=X8jOxEGVyPo&lc=z23fvxw5zmq1vzvxa04t1aokgodujwhjcmcr4pmcbu5lbk0h00410
Views: 71600 PBS Infinite Series
Public key cryptography: What is it? | Computer Science | Khan Academy
 
04:32
Why do we need public key cryptography? Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/discrete-logarithm-problem?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/the-fundamental-theorem-of-arithmetic-1?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 126067 Khan Academy Labs
File Encryption Solution - Applied Cryptography
 
02:54
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1251 Udacity
PseudoRandom Sequences
 
22:33
Click on the below link to download the Zip file containing PDF eBook and C source code file https://drive.google.com/open?id=0B_DQ8Hm69NutbElTenVYQ01qbzg
Views: 60 spinningheadmedia
Arrow's Impossibility Theorem | Infinite Series
 
15:11
The bizarre Arrow’s Impossibility Theorem, or Arrow’s Paradox, shows a counterintuitive relationship between fair voting procedures and dictatorships. Start your free trial with Squarespace at http://squarespace.com/infiniteseries and enter offer code “infinite” to get 10% off your first purchase. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Voting Systems and the Condorcet Criterion https://www.youtube.com/watch?v=HoAnYQZrNrQ Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) Additional Resources Networks, Crowds and Markets:: https://www.cs.cornell.edu/home/kleinber/networks-book/ Original Paper by Kenneth Arrow:: https://web.archive.org/web/20110720090207/http://gatton.uky.edu/Faculty/hoytw/751/articles/arrow.pdf Different voting systems can produce radically different election results, so it’s important to ensure the voting system we’re using has certain properties - that it fairly represents the opinions of the electorates. The impressively counterintuitive Arrow’s Impossibility Theorem demonstrates that this is much harder than you might think. Thanks: Ben Houston-Edwards and Iian Smythe Comments answered by Kelsey: Johan Richter https://www.youtube.com/watch?v=HoAnYQZrNrQ&lc=z12bt1nabyievh4yg04chlvpdnisxnw5rx00k Nat Tuck https://www.youtube.com/watch?v=HoAnYQZrNrQ&lc=z12tetkx1wzocn2ue23wzdfg5sn2dhhh004
Views: 91846 PBS Infinite Series
Unraveling DNA with Rational Tangles | Infinite Series
 
10:20
When you think about math, what do you think of? Numbers? Equations? Patterns maybe? How about… knots? As in, actual tangles and knots? Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode: How Big are All Infinities Combined? (Cantor’s Paradox) https://www.youtube.com/watch?v=TbeA1rhV0D0 There is a special kind of mathematical tangle called a rational tangle, first defined by mathematician John Conway around 1970 which relates to biology and the study of DNA. Written and Hosted by Tai-Danae Bradley Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Linda Huang Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: Modeling protein-DNA complexes with tangles by Isabel Darcy (the tangle examples in today’s episode can be found here) https://www.sciencedirect.com/science/article/pii/S0898122107005718 Understanding Rational Tangles (Recreational Guide) https://www.mathteacherscircle.org/assets/session-materials/JTantonRationalTangles.pdf The Knot Book by Colin Adams https://www.amazon.com/Knot-Book-Colin-Adams/dp/0821836781 Knot Theory and Its Applications by Kunio Murasugi https://www.amazon.com/Theory-Applications-Modern-Birkh%C3%A4user-Classics/dp/081764718X On the Classification of Rational Tangles by Louis Kauffman and Sofia Lambropoulou https://arxiv.org/pdf/math/0311499.pdf DNA Topology by Andrew Bates and Anthony Maxwell https://www.amazon.com/Topology-Oxford-Biosciences-Andrew-Bates/dp/0198506554 Proof of Conway’s Rational Tangle Theorem http://homepages.math.uic.edu/~kauffman/RTang.pdf The Shape of DNA (video with Mariel Vasquez) https://www.youtube.com/watch?v=AxxnziuL408 How DNA Unties its Own Knots (video on topoisomerase with Mariel Vasquez) https://www.youtube.com/watch?v=UkmQNbvlK8s Knots and Quantum Theory by Edward Witten https://www.ias.edu/ideas/2011/witten-knots-quantum-theory Tangles, Physics, and Category Theory http://math.ucr.edu/home/baez/tangles.html My Favorite Theorem Podcast https://kpknudson.com/my-favorite-theorem/ Topics in Knots and Algebra (Online Course at Bridgewater State University) https://www.youtube.com/watch?v=fpoGoAscqX4&list=PLL0ATV5XYF8BfT8CmmzKnfTlf3V9hQgj9 Special thanks to Roman Pinchuk for supporting us on our Converse level on Patreon. Along with thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco and Andrew Poelstra who is supporting us at the Lemma level!
Views: 29195 PBS Infinite Series
Phishing & Malicious Software ☆ IT Lecture
 
48:10
lll➤ Gratis Crypto-Coins: https://crypto-airdrops.de ) More about malicious software, phishing and anti-virus concepts in this IT Lecture. That´s what you will learn in this lesson. Also have a look at the other parts of the course, and thanks for watching. Phishing is the act of attempting to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. http://en.wikipedia.org/wiki/Phishing Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. http://en.wikipedia.org/wiki/Malicious_software
Zero knowledge, subversion resistance, and concrete attacks | Steven Goldfeder | RWC 2018
 
22:38
Technical talks from the Real World Crypto conference series.
Views: 785 Real World Crypto
The Mathematics of Diffie-Hellman Key Exchange | Infinite Series
 
13:33
Symmetric keys are essential to encrypting messages. How can two people share the same key without someone else getting a hold of it? Upfront asymmetric encryption is one way, but another is Diffie-Hellman key exchange. This is part 3 in our Cryptography 101 series. Check out the playlist here for parts 1 & 2: https://www.youtube.com/watch?v=NOs34_-eREk&list=PLa6IE8XPP_gmVt-Q4ldHi56mYsBuOg2Qw Support us on Patreon at https://www.patreon.com/pbsinfinitese... Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Topology vs. “a” Topology https://www.youtube.com/watch?v=tdOaMOcxY7U&t=13s Symmetric single-key encryption schemes have become the workhorses of secure communication for a good reason. They’re fast and practically bulletproof… once two parties like Alice and Bob have a single shared key in hand. And that’s the challenge -- they can’t use symmetric key encryption to share the original symmetric key, so how do they get started? Written and Hosted by Gabe Perez-Giz Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Meah Denee Barrington Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose, Jason Hise, Thomas Scheer, Marting Sergio H. Faester, CSS, and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 43438 PBS Infinite Series
What was Fermat’s “Marvelous" Proof? | Infinite Series
 
14:40
If Fermat had a little more room in his margin, what proof would he have written there? Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Resources: Contemporary Abstract Algebra by Joseph Gallian https://www.amazon.com/Contemporary-Abstract-Algebra-Joseph-Gallian/dp/1133599702 Standard Definitions in Ring Theory by Keith Conrad http://www.math.uconn.edu/~kconrad/blurbs/ringtheory/ringdefs.pdf Rings and First Examples (online course by Prof. Matthew Salomone) https://www.youtube.com/watch?v=h4UCMd8dyiM Fermat's Enigma by Simon Singh https://www.amazon.com/Fermats-Enigma-Greatest-Mathematical-Problem/dp/0385493622 Who was first to differentiate between prime and irreducible elements? (StackExchange) https://hsm.stackexchange.com/questions/3754/who-was-first-to-differentiate-between-prime-and-irreducible-elements Previous Episodes: What Does It Mean to be a Number? https://www.youtube.com/watch?v=3gBoP8jZ1Is What are Numbers Made of? https://www.youtube.com/watch?v=S4zfmcTC5bM Gabe's references from the comments: Blog post about the Peano axioms and construction of natural numbers by Robert Low: http://robjlow.blogspot.co.uk/2018/01/whats-number-1-naturally.html Recommended by a viewer for connections to formulation of numbers in computer science: https://softwarefoundations.cis.upenn.edu/ In 1637, Pierre de Fermat claimed to have the proof to his famous conjecture, but, as the story goes, it was too large to write in the margin of his book. Yet even after Andrew Wiles’s proof more than 300 years later, we’re still left wondering: what proof did Fermat have in mind? The mystery surrounding Fermat’s last theorem may have to do with the way we understand prime numbers. You all know what prime numbers are. An integer greater than 1 is called prime if it has exactly two factors: 1 and itself. In other words, p is prime if whenever you write p as a product of two integers, then one of those integers turns out to be 1. In fact, this definition works for negative integers, too. We simply incorporate -1. But the prime numbers satisfy another definition that maybe you haven’t thought about: An integer p is prime if, whenever p divides a product of two integers, then p divides at least one of those two integers. Written and Hosted by Tai-Danae Bradley Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow and Linda Huang Made by Kornhaber Brown (www.kornhaberbrown.com) Special thanks to Roman Pinchuk for supporting us on our Converse level on Patreon. Along with thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco who are supporting us at the Lemma level!
Views: 60631 PBS Infinite Series
Solving the Wolverine Problem with Graph Coloring | Infinite Series
 
13:11
At one time, Wolverine served on four different superhero teams. How did he do it? He may have used graph coloring. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Graph coloring may seem simple but the mathematics behind it is surprising difficult and it pops up in a number strange places. Kelsey discusses Sudoku, the Four Color Theorem, the Hadwiger Nelson Problem and how graph coloring can be used to schedule the most effective way to save the planet. Find out how math can defeat the combined might of Thanos, Magneto, Kang, Dormammu, Ultron, Apocalypse and Dr. Doom. Correction: At 3:58, "Four is the maximum number of required colors" Previous Episode - What is a Random Walk? https://www.youtube.com/watch?v=stgYW6M5o4k Links to other resources: Sudoku: http://www.ams.org/notices/200706/tx070600708p.pdf General Applications: http://web.math.princeton.edu/math_alive/5/Notes2.pdf Page on graph colorings: https://webdocs.cs.ualberta.ca/~joe/Coloring/index.html Book on general graph theory: http://diestel-graph-theory.com/ The Four Color Theorem - Numberphile: https://www.youtube.com/watch?v=NgbK43jB4rQ Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) Comments answered by Kelsey: Ofir David https://www.youtube.com/watch?v=stgYW6M5o4k&lc=z12vin2o2vn0dxvn522wsr5j0wexezd0j Bertie Blue https://www.youtube.com/watch?v=stgYW6M5o4k&lc=z22xhfxbgx3qsh2ujacdp4333fssxeq5w1z4avpprddw03c010c ​TehAvenger29 https://www.youtube.com/watch?v=stgYW6M5o4k&lc=z12qtxqgqpyftrzmy22wyxl5gy3ssvcpf04​
Views: 73109 PBS Infinite Series
The Assassin Puzzle | Infinite Series
 
09:13
Imagine you have a square-shaped room, and inside there is an assassin and a target. And suppose that any shot that the assassin takes can ricochet off the walls of the room, just like a ball on a billiard table. Is it possible to position a finite number of security guards inside the square so that they block every possible shot from the assassin to the target? Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Solution to the Assassin Puzzle: www.math3ma.com/mathema/2018/5/17/is-the-square-a-secure-polygon Previous Episode: Instant Insanity Puzzle https://www.youtube.com/watch?v=Lw1pF47N-0Q&t=1s Let’s walk through this puzzle a little more precisely. First, instead of thinking of a physical room with actual people inside, I really want you to think of a square in the xy plane. Pick any two points in the square, and let’s call one of those points A for “assassin,” and the other point T for “target.” Now a “shot” from the assassin is really just a ray emanating out of the point A which can, like a ball on a billiard table, bounce back and forth between the sides of the square. But unlike an actual game of pool, let’s assume the trajectory has constant speed and that it can bounce back and forth for forever! Written and Hosted by Tai-Danae Bradley Produced by Eric Brown Graphics by Matt Rankin Assistant Editing and Sound Design by Mike Petrow and Linda Huang Made by Kornhaber Brown (www.kornhaberbrown.com) Special thanks to Roman Pinchuk for supporting us on our Converse level on Patreon. Along with thanks to Matthew O'Connor, Yana Chernobilsky, and John Hoffman who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco and Andrew Poelstra who are supporting us at the Lemma level!
Views: 42443 PBS Infinite Series
Vladimir Soukharev - Post-Quantum Security Models for Authenticated Encryption
 
29:26
Title: Post-Quantum Security Models for Authenticated Encryption Authors: Vladimir Soukharev, David Jao, and Srinath Seshadri 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 202 PQCrypto 2016
Network Mathematics and Rival Factions | Infinite Series
 
12:05
The theory of social networks allows us to mathematically model and analyze the relationships between governments, organizations and even the rival factions warring on Game of Thrones. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Arrow’s Impossibility Theorem https://www.youtube.com/watch?v=AhVR7gFMKNg Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) Resources and Special thanks: Network, Crowds and Markets, by David Easley and John Kleinberg :: https://www.cs.cornell.edu/home/kleinber/networks-book/ Cartwright and Harary :: http://snap.stanford.edu/class/cs224w-readings/cartwright56balance.pdf Antal, Krapivsky, and Redner :: http://physics.bu.edu/~redner/pubs/pdf/dresden.pdf Steven Strogatz Lecture :: https://www.youtube.com/watch?v=P60sWUxluyk Special Thanks: Steven Strogatz Commonly, in the field of social network analysis, one uses a graph - also called a network - where the vertices, or nodes, represent individuals and the edges represent something about the relationships or interactions between individuals. These networks might represent Facebook friendships, or help us understand the spread of disease. This episode focuses on one model of a social network that encodes whether relationships are positive or negative -- in other words, if they’re friendly or hostile -- and the notion of structural balance. Challenge Winners: Cantor’s Cat https://www.youtube.com/watch?v=AhVR7gFMKNg&lc=z13lyxtxmom1tv51y23tzluompyzg5xkw David de Kloet https://www.youtube.com/watch?v=AhVR7gFMKNg&lc=z13lyxtxmom1tv51y23tzluompyzg5xkw.1498299129602777 Comments answered by Kelsey: Edelopo https://www.youtube.com/watch?v=AhVR7gFMKNg&lc=z12ftje5aybuxhro204chdn4tuqovxwjapk0k
Views: 69686 PBS Infinite Series
Ray Perlner - Vulnerabilities of "McEliece in the World of Escher"
 
21:20
Title: Vulnerabilities of "McEliece in the World of Escher" Authors: Dustin Moody and Ray Perlner 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 131 PQCrypto 2016
How Many Humans Have the Same Number of Body Hairs? | Infinite Series | PBS Digital Studios
 
08:36
Do two people on the planet have the exact same number of body hairs? How about more than two? There’s a simple yet powerful mathematical principle that can help you find out the answer. Kelsey Houston-Edwards breaks down the Pigeonhole Principle and explains how it can be used to answer some pretty perplexing questions. Thumbnail Wallpaper: http://imgur.com/a/yLfHU Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com) The Heart of Mathematics http://www.goodreads.com/book/show/1638954.The_Heart_of_Mathematics
Views: 94779 PBS Infinite Series
Symmetric Key Ciphers
 
52:42
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 17173 nptelhrd
Your Brain as Math - Part 1 | Infinite Series
 
07:05
What does your brain look like when it's broken down mathematically? And what can this tell us? This is Part 1 in our Your Brain as Math mini-series. Check out Part 2 here: https://www.youtube.com/watch?v=rlI1KOo1gp4 Check out Part 3 here: https://www.youtube.com/watch?v=akgU8nRNIp0 Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode Stochastic Supertasks https://www.youtube.com/watch?v=Sdp_V0L99sw In order to dive deeper into an exciting topic, we're mixing up the format. Over the next three days, we’ll spend the next three episodes exploring an incredible application of seemingly purely-abstract mathematics: how algebraic topology can help us decode the connections among neurons in our brains, to help us understand their function. Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: Cliques of Neurons Bound into Cavities Provide a Missing Link between Structure and Function http://journal.frontiersin.org/article/10.3389/fncom.2017.00048/full The Blue Brain Project http://bluebrain.epfl.ch/ Barcodes: The Persistent Topology of Data https://www.math.upenn.edu/~ghrist/preprints/barcodes.pdf Network Neuroscience http://www.nature.com/neuro/journal/v20/n3/full/nn.4502.html Algebraic Topology https://www.math.cornell.edu/~hatcher/AT/ATpage.html Special thanks to Kathryn Hess and Florian Frick! Comments answered by Kelsey: Vriskanon https://www.youtube.com/watch?v=Sdp_V0L99sw&lc=z22ic1ehnlqhi3g4g04t1aokgo4wjichzrqe5sqovhw4rk0h00410 Challenge Winner : Florence B Special thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco who is supporting us at the Lemma level!
Views: 108742 PBS Infinite Series
Ingo von Maurich - IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
 
32:05
Title: IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter Authors: Ingo von Maurich, Lukas Heberle, and Tim Güneysu 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 309 PQCrypto 2016
The Multiplication Multiverse | Infinite Series
 
07:55
What happens if you multiply things that aren’t numbers? And what happens if that multiplication is not associative? Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode The Heat Equation + Special Announcement | Infinite Series https://www.youtube.com/watch?v=NHucpzbD600 Multiplication of numbers is an associative property and we can make sense of “multiplication” between things that aren’t numbers but that’s not considered as associativity. And since we’re talking about associativity, you might wonder about that other property of real numbers: You know: when multiplying two numbers, swapping their order doesn’t change the answer. This property is called commutativity. But keep in mind: it’s a very special property to have! Not everything in life is commutative. For example, getting dressed in the morning... putting on your socks and then your shoes is NOT the same as first putting on your shoes and then your socks. Link to Resources: The Fundamental Group: ‘Loop concatenation’ http://www.math.uchicago.edu/~may/VIGRE/VIGRE2009/REUPapers/Landau.pdf Written and Hosted by Tai-Danae Bradley Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 88530 PBS Infinite Series
Higher-Dimensional Tic-Tac-Toe | Infinite Series
 
12:24
Regular tic-tac-toe can get a bit boring -- if both players are playing optimally, it always ends in a draw. But what happens if you increase the width of the board? Or increase the dimension of the board? Or increase both? Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode How the Axiom of Choice Gives Sizeless Sets | Infinite Series https://www.youtube.com/watch?v=hcRZadc5KpI The standard game of tic-tac-toe is too easy. How can we, as mathematicians, play with the combinatorics of tic-tac-toe? There are (at least) three easy ways to modify the game of tic-tac-toe: increase the width of the board - like *this* 5x5 board - increase the dimension of the board - like *this* 3x3x3 board - or increase both, like this 4x4x4 board. Challenge Winner of the How the Axiom of Choice Gives Sizeless Sets: For Your Math Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: Hales/Jewett paper: http://www.ams.org/journals/tran/1963-106-02/S0002-9947-1963-0143712-1/S0002-9947-1963-0143712-1.pdf Golomb/Hales paper: http://library.msri.org/books/Book42/files/golomb.pdf https://www.youtube.com/watch?v=p1YzYLzRwtk http://www.austms.org.au/Gazette/2005/Jul05/mathellaneous.pdf Special Thanks: Benjamin Houston-Edwards and Nathan Kaplan Mathologer Video: https://www.youtube.com/watch?v=aDOP0XynAzA Special thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Mauricio Pacheco and Nicholas Rose who are supporting us on Patreon at the Lemma level!
Views: 94300 PBS Infinite Series
Cliptography: Post-Snowden Cryptography by Qiang Tang
 
33:21
Qiang Tang from the New Jersey Institute of Technology presents his talk for the DIMACS/Northeast Big Data Hub Workshop on Privacy and Security for Big Data April 24 - 25, 2017 DIMACS Center, CoRE Building, Rutgers University Organizing Committee: René Bastón, Columbia University Joseph Lorenzo Hall, The Center for Democracy and Technology Adam Smith, Pennsylvania State University Sean Smith, Dartmouth College Rebecca Wright, Rutgers University Moti Yung, Snapchat Presented under the auspices of the DIMACS Big Data Initiative on Privacy and Security, the DIMACS Special Focus on Cybersecurity and in collaboration with the Northeast Big Data Innovation Hub. http://dimacs.rutgers.edu/Workshops/BigDataHub/program.html
Views: 140 Rutgers
How Many Cops to Catch a Robber? | Infinite Series
 
09:46
Last episode, we used graph theory to figure out how a cop could catch a robber. But what happens when we introduce multiple cops? What happens if you have "lazy" cops or "drunk" robbers? Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode The Cops and Robbers Theorem | Infinite Series https://www.youtube.com/watch?v=9mJEu-j1KT0 Cops and Robbers is played on a finite and connected graph - meaning that any two vertices are joined by a path of edges. The game begins by placing a cop and a robber each on a single vertex; we say it “occupies” that vertex. They alternate moving along the edges, from a vertex to neighboring vertex. Or, on any given turn, the player can choose to not move -- to stay where they are. We’ll assume that the cop always goes first. If, eventually, the cop lands on the robber’s vertex, the game is over -- we say that the game is a “win” for the cop. But, if the robber can avoid the cop indefinitely, we say that the game is a win for the robber. Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Resources: M. Aigner and M. Fromme -- A Game of Cops and Robbers: https://www.math.ucdavis.edu/~erikslivken/classes/2016_spring_180/aigner%20fromme.pdf What is Cop Number? -Anthony Bonato http://www.math.ryerson.ca/~abonato/papers/whatis_copnumber_new.pdf The Game of Cops and Robbers on Graph - Anthony Bonato and Richard Nowakowski Anthony Bonato -- "What is... Cops and Robbers" http://www.ams.org/notices/201208/rtx120801100p.pdf Special Thanks to Anthony Bonato and Brendan Sullivan Big thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 60665 PBS Infinite Series
Today in Bitcoin (2018-04-11) - SecureRandom Update - European Blockchain Partnership - Bittrex
 
44:32
‎6927.40 USD / BTC - Average United States Dollar Bitcoin Price https://bitcoinaverage.com/en/bitcoin-price/btc-to-usd http://www.btcsatoshi.com/ [bitcoin-dev] KETAMINE: Multiple vulnerabilities in SecureRandom(), numerous cryptocurrency products affected. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-April/015873.html Pierre Roberge on Twitter: "A quick grep on my box tells me this will cause a bit of a s|-|1tsh0w as it is in use in a majority of cryptocurrencies wallets. Although, in general, not solely used as random source. Thoughts? cc @waxwing__ @adam3us… https://t.co/wUsaVgXFrp" https://twitter.com/robep00/status/984000403560857600 Mustafa Al-Bassam on Twitter: "This vulnerable random number generator appears to be used by Bitcoin brain wallets: https://t.co/qDsWebFpd1 However, https://t.co/1kmMP0b4Gx isn't vulnerable, because they forked the library before it added a secure PRNG, so they wrote their own: https://t.co/lrxq9lb4Tn" https://twitter.com/musalbas/status/983450939595030528 Pierre Roberge on Twitter: "Nope, @BitAddress is using Arcfour PRNG as well. To be reviewed carefully." https://twitter.com/robep00/status/984008260025028609 Vietnam Investigates ICO Fraud After $660 Million in Losses Reported - CoinDesk https://www.coindesk.com/vietnam-investigates-ico-fraud-660-million-losses-reported/ Bank of America to Stop Financing Makers of Military-Style Guns - The New York Times https://www.nytimes.com/2018/04/10/business/bank-of-america-guns.html 22 European Nations Form New Blockchain Partnership - CoinDesk https://www.coindesk.com/22-european-nations-form-new-blockchain-partnership/ Bitcoin prices could fall, according to a Barclays analysis of infectious disease models — Quartz https://qz.com/1249796/bitcoin-prices-could-fall-according-to-a-barclays-analysis-of-infectious-disease-models/ Bitcoin Price is Going Down, But Large Retail Investors are Seeing Good Opportunity https://www.ccn.com/large-retail-investors-see-an-opportunity-in-bitcoin-despite-price-decline/ Bitcoin is eating Quebec - MIT Technology Review https://www.technologyreview.com/s/610786/bitcoin-is-eating-quebec/ History Repeating? Why Bitcoin's Price Could Rise in Q2 - CoinDesk https://www.coindesk.com/history-repeating-why-bitcoins-price-could-rise-in-q2/ Media Hype Falsely Reports Bitcoin As ‘Greatest Bubble In History’ https://cointelegraph.com/news/media-hype-falsely-reports-bitcoin-as-greatest-bubble-in-history Bittrex on Twitter: "The. Wait. Is. Over. New users can once again register on the @BittrexExchange. Want to sign up? Visit https://t.co/F7hqiiZplX and don’t forget to check out our enhanced website while you’re registering for a #Bittrex account. Learn more at: https://t.co/p9XX6eERqC" https://twitter.com/BittrexExchange/status/983756670663733248 Bittrex on Twitter: "Sorry for the inconvenience. Due to an overwhelming response from new users, registration is temporarily paused. We're working to make the necessary tweaks and reopen signups again shortly." https://twitter.com/BittrexExchange/status/983763043250126848 Bittrex on Twitter: "Thank you for your patience as we work to reopen signups for new users. We’re getting closer to a fix, and we’ll resume new customer registrations as soon as possible." https://twitter.com/BittrexExchange/status/983840411822129152 Ledger on Twitter: "Following an outage, we're working on bringing back our BCH infrastructure. You can get real time update of the operation at https://t.co/oSjVWsIxrU" https://twitter.com/LedgerHQ/status/983803775847665664 Okayplayer on Twitter: "Happy #NationalSiblingsDay! #Zuckerberg… " https://twitter.com/okayplayer/status/983802160025567232 Mashable on Twitter: "Someone Photoshopped Mark Zuckerberg as Data from 'Star Trek' and it's incredible https://t.co/ACAtpoBrTu… " https://twitter.com/mashable/status/984056180053086208 EFF on Twitter: https://twitter.com/EFF/status/983841358405185536 Mark Zuckerberg equivocates when asked about tracking logged-out users https://mashable.com/2018/04/10/mark-zuckerberg-testimony-tracking-users/?utm_cid=mash-com-Tw-main-link#VMpg9PqsJgqD Mad Bitcoins on Twitter: "Discuss...… " https://twitter.com/MadBitcoins/status/983867497118973953 walter kirn on Twitter: "Twitter sells conflict. Instagram sells envy. Facebook sells you." https://twitter.com/walterkirn/status/983338972322652160 Bitcoin EDU on Twitter: "Bitcoin mentioned in my child’s activity book! https://t.co/RGfSRzfwx6… " https://twitter.com/BitcoinEdu/status/984096035344560129 Bitcoin Art Gallery on Twitter: "Blockchain by https://t.co/XJCcXVIuvy… " https://twitter.com/btcArtGallery/status/984098277850152961 OnChainFX on Twitter: https://twitter.com/onchainfx/status/983745380490899456 InfoSec Taylor Swift on Twitter: https://twitter.com/SwiftOnSecurity/status/644261333819527168
Views: 3483 World Crypto Network
Are Prime Numbers Made Up? | Infinite Series | PBS Digital Studios
 
07:40
Is math real or simply something made up by mathematicians? You can’t physically touch a number yet using numbers we’re able to build skyscrapers and launch rockets into space. Mathematician Kelsey Houston-Edwards explains this perplexing dilemma and discusses the different viewpoints that philosophers and mathematicians have regarding the realism of mathematics. Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Made by Kornhaber Brown (www.kornhaberbrown.com)
Views: 243580 PBS Infinite Series
Decoded ancient Aztec Alien Calendar
 
11:21
How to read the aztec calendar, a new discovery By Michael LaGrow, Erich von Däniken I read your work when I was 12 and "bought"it. Knot difficult to Believe, as it is how WE came to B. This is whalespitindustries research on the subject "Ancient Aliens" *Johannes Trithemius-Steganographia Polygraphiae (1518) -- the first printed book on cryptography
Views: 186 Popular Now
2011 Killian Lecture: Ronald L. Rivest, "The Growth of Cryptography"
 
01:09:19
Lecture title: "The Growth of Cryptography" Ronald L. Rivest, a professor of electrical engineering and computer science who helped develop one of the world's most widely used Internet security systems, was MIT’s James R. Killian, Jr. Faculty Achievement Award winner for 2010–2011. Rivest, the Andrew and Erna Viterbi professor in MIT's Department of Electrical Engineering and Computer Science, is known for his pioneering work in the field of cryptography, computer, and network security. February 8, 2011 Huntington Hall (10-250)
The Dawn of Digital Currency
 
08:56
Digital Currency has arrived. All the structural faults of Bitcoin today, are being quickly and vigorously addressed by smart visionaries leading the digital money revolution. Payment, banking, taxation, accounting will all undergo a profound revolution. Privacy -- long considered dead in America, will be readily restored. New efficiencies, new conveniences, remarkable versatility is about to shape our daily money experience. All the while fraud, waste, and abuse will be greatly curtailed. Here are excerpts from a talk given by Prof. Gideon Samid, (also the CTO of BitMint) at the national payment conference in Orlando Florida. More in his new book "The Dawn of Digital Currency" available on Amazon.
Views: 377 Gideon Samid
Security Analysis of Multilinear Maps over the Integers
 
18:16
Security Analysis of Multilinear Maps over the Integers by Jae Hong Seo, Hyung Tae Lee. Talk at Crypto 2014.
Views: 205 TheIACR
Crisis in the Foundation of Mathematics | Infinite Series
 
12:40
What if the foundation that all of mathematics is built upon isn't as firm as we thought it was? Note: The natural numbers sometimes include zero and sometimes don't -- it depends on how you define it. Within logic, zero is always included as a natural number. Correction - The image shown at 8:15 is of Netwon's Principia and not Russell and Whitehead's Principia Mathematica as was intended. Support us on Patreon at https://www.patreon.com/pbsinfiniteseries Tweet at us! @pbsinfinite Facebook: facebook.com/pbsinfinite series Email us! pbsinfiniteseries [at] gmail [dot] com Previous Episode How to generate Pseudorandom Numbers? | Infinite Series https://www.youtube.com/watch?v=C82JyCmtKWg Mathematics is cumulative -- it builds on itself. That’s part of why you take math courses in a fairly prescribed order. To learn about matrices - big blocks of numbers - and the procedure for multiplying matrices, you need to know about numbers. Matrices are defined in terms of - in other words, constructed from - more fundamental objects: numbers. References:: Probability website mentioned in comments: http://people.ischool.berkeley.edu/~nick/aaronson-oracle/index.html https://plato.stanford.edu/entries/philosophy-mathematics/ https://plato.stanford.edu/entries/logicism/ Ernst Snapper :: https://www.maa.org/sites/default/files/pdf/upload_library/22/Allendoerfer/1980/0025570x.di021111.02p0048m.pdf Philosophy of mathematics (Selected readings) edited by Paul Benacerraf and Hilary Putnam Written and Hosted by Kelsey Houston-Edwards Produced by Rusty Ward Graphics by Ray Lux Assistant Editing and Sound Design by Mike Petrow Made by Kornhaber Brown (www.kornhaberbrown.com) Thanks to Matthew O'Connor and Yana Chernobilsky who are supporting us on Patreon at the Identity level! And thanks to Nicholas Rose and Mauricio Pacheco who are supporting us at the Lemma level!
Views: 433776 PBS Infinite Series
Ilaria Chillotti - An Homomorphic LWE based E-voting Scheme
 
28:21
Title: An Homomorphic LWE based E-voting Scheme Authors: Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabachene 7th International Conference on Post-Quantum Cryptography PQCrypto 2016 https://pqcrypto2016.jp/program/ Proceedings http://www.springer.com/jp/book/9783319293592
Views: 432 PQCrypto 2016
Student Colloquium: An Introduction To Modern Cryptography
 
46:15
A student colloquium I did at the MATH Institute, University of Copenhagen, 10th March 2017. It gives an overview of the definitions of Cryptography as well as an intuition into how and why we do Cryptography. Special thanks to Martin Madsen for the excellent videoing.
Views: 271 cr8zykungpow