Prime Numbers & RSA Encryption Algorithm – Computerphile

RSA is widespread on the Internet, and uses large prime numbers – but how does it work? Dr Tim Muller takes us through the details. Apologies for the poor audio quality of this video which is due to the remote nature in which it was recorded. https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by […]

Chacha Cipher – Computerphile

The only viable alternative to AES? Dr Mike Pound unravels the clever ChaCha cipher. https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com

Elliptic Curves – Computerphile

Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike’s myriad Diffie-Hellman videos: https://www.youtube.com/playlist?list=PLzH6n4zXuckpoaxDKOOV26yhgoY2S-xYg https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com

High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA

Adam Petcher, Principal Member of Technical Staff, Oracle JDK 11 includes support for the first of a new breed of cryptographic algorithm that features improved performance, trustworthiness, and security in cloud and multitenant environments. This session describes the features and implementations of some of these algorithms: X25519 key agreement, Poly1305 authentication, and EdDSA signatures. The […]

How secure is 256 bit security?

Supplement to the cryptocurrency video: How hard is it to find a 256-bit hash just by guessing and checking? What kind of computer would that take? Cryptocurrency video: https://youtu.be/bBC-nXj3Ng4 Home page: https://www.3blue1brown.com/ Several people have commented about how 2^256 would be the maximum number of attempts, not the average. This depends on the thing being […]

Secret Sharing Explained Visually

The IEEE Information Theory Society presents an overview of Adi Shamir’s 1979 paper on secret sharing. This is part of our series on the greatest papers from information theory.¬† Paper featured in this video: http://users.cms.caltech.edu/~vidick/teaching/101_crypto/Shamir1979.pdf Support this program:https://www.patreon.com/artoftheproblem

How to use PGP (Pretty Good Privacy) And Why You Need it?! Bitcoin Magazine

@nikcantmine from Twitter explains why PGP (Pretty Good Privacy) was created and who made it. Nik also covers why you need to use a PGP and the pros and cons of two popular PGP software. Please enjoy this video from Bitcoin Magazine and please use this information to improve your security, privacy and sovereignty. Links: […]

Blockchain tutorial 4: Cryptography, encrypt, decrypt

This is part 4 of the Blockchain tutorial explaining what cryptograhy is and also what encrypt and decrypt means. In this video series different topics will be explained which will help you to understand blockchain. Bitcoin released as open source software in 2009 is a cryptocurrency invented by Satoshi Nakamoto (unidentified person or group of […]

24. zkLedger

MIT MAS.S62 Cryptocurrency Engineering and Design, Spring 2018 Instructor: Neha Narula View the complete course: https://ocw.mit.edu/MAS-S62S18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP61KHzhg3JIJdK08JLSlcLId zkLedger, a private, auditable transaction ledger for digital currency is explained. License: Creative Commons BY-NC-SA More information at https://ocw.mit.edu/terms More courses at https://ocw.mit.edu

Shafi Goldwasser: From Basic Idea to Impact: the story of modern cryptography

Shafi Goldwasser is one of the largest female figures in the world of cryptography, with works ranging from the construction and application of random number generators, probabilistic cryptography, computer theory, and distributed systems. You want to see more? See at Bit2Me Academy

Cómo funciona la criptografía

Hoy hablamos de RSA, el sistema criptogr√°fico desarrollado por Rivest, Shamir y Adleman. Los n√ļmeros primos guardan tus secretos. Muy buena la explicaci√≥n de Eduardo S√°enz de Cabez√≥n, mira muchos m√°s videos de √©l aqui en Bit2Me.

Cypherpunks and Bitcoin by Paul Rosenberg

Paul Rosenberg discusses the early history of the cypherpunks and their interest in digital cash leading up to the invention of bitcoin.
compound-governance-token
Compound (COMP) 261,29 ‚ā¨ 2,97%
dash
Dash (DASH) 138,89 ‚ā¨ 2,43%
zcash
Zcash (ZEC) 116,01 ‚ā¨ 3,67%
yearn-finance
yearn.finance (YFI) 30.567,41 ‚ā¨ 5,11%
waves
Waves (WAVES) 14,19 ‚ā¨ 5,23%
bitcoin
Bitcoin (BTC) 32.103,87 ‚ā¨ 3,02%
ethereum
Ethereum (ETH) 2.004,80 ‚ā¨ 4,54%
tether
Tether (USDT) 0,825165 ‚ā¨ 0,26%
cardano
Cardano (ADA) 1,25 ‚ā¨ 2,56%
xrp
XRP (XRP) 0,695301 ‚ā¨ 4,06%
dogecoin
Dogecoin (DOGE) 0,257141 ‚ā¨ 2,88%
polkadot
Polkadot (DOT) 19,21 ‚ā¨ 2,92%
usd-coin
USD Coin (USDC) 0,825092 ‚ā¨ 0,05%
uniswap
Uniswap (UNI) 18,45 ‚ā¨ 4,83%
bitcoin-cash
Bitcoin Cash (BCH) 499,40 ‚ā¨ 4,11%
chainlink
Chainlink (LINK) 19,60 ‚ā¨ 5,37%
matic-network
Polygon (MATIC) 1,27 ‚ā¨ 5,94%
litecoin
Litecoin (LTC) 139,65 ‚ā¨ 3,04%
stellar
Stellar (XLM) 0,266768 ‚ā¨ 3,84%
ethereum-classic
Ethereum Classic (ETC) 46,68 ‚ā¨ 3,32%
eos
EOS (EOS) 4,09 ‚ā¨ 4,47%
tron
TRON (TRX) 0,057828 ‚ā¨ 2,55%
filecoin
Filecoin (FIL) 57,91 ‚ā¨ 3,36%
aave
Aave (AAVE) 245,67 ‚ā¨ 4,65%
monero
Monero (XMR) 222,37 ‚ā¨ 3,50%
dai
Dai (DAI) 0,825165 ‚ā¨ 0,14%
tezos
Tezos (XTZ) 2,63 ‚ā¨ 2,70%
cosmos
Cosmos (ATOM) 10,79 ‚ā¨ 2,20%
algorand
Algorand (ALGO) 0,841668 ‚ā¨ 1,71%
kusama
Kusama (KSM) 303,64 ‚ā¨ 6,30%