LAB 5a. Evaluation of postfix expression and Tower of Hanoi problem with N disks
GNS S
LAB 5a. Evaluation of postfix expression and Tower of Hanoi problem with N disks
21:13
LAB 4 -Program in C for Converting an Infix Expression to Postfix Expression.
GNS S
LAB 4 -Program in C for Converting an Infix Expression to Postfix Expression.
15:33
Generating Ca Publick key
GNS S
Generating Ca Publick key
31:09
public key management
GNS S
public key management
5:11
keyUsage and key change
GNS S
keyUsage and key change
9:56
key Establishment and key storage
GNS S
key Establishment and key storage
23:48
module 4 : Key management Key lengths and lifetimes Key generation
GNS S
module 4 : Key management Key lengths and lifetimes Key generation
25:51
Cryptographic Protocols
GNS S
Cryptographic Protocols
27:51
DIFFIE–HELLMAN Protocol
GNS S
DIFFIE–HELLMAN Protocol
16:32
Zero knowledge mechanisms
GNS S
Zero knowledge mechanisms
9:59
Passwords
GNS S
Passwords
22:25
FRESHENESS
GNS S
FRESHENESS
21:49
Applications of entity
GNS S
Applications of entity
22:25
RANDOM NUMBER GENERATOR MODULE- 3
GNS S
RANDOM NUMBER GENERATOR MODULE- 3
24:57
Generating Random numbers
GNS S
Generating Random numbers
20:51
Information Hiding (steganography)
GNS S
Information Hiding (steganography)
20:29
visual cryptography
GNS S
visual cryptography
8:13
keyESCREW
GNS S
keyESCREW
9:06
Working of sample switch program
GNS S
Working of sample switch program
11:33
secret key sharing
GNS S
secret key sharing
10:19
uses of hash functions- online bids and  spam reduction
GNS S
uses of hash functions- online bids and spam reduction
8:52
non crypto hash
GNS S
non crypto hash
10:48
tigerhash
GNS S
tigerhash
26:54
HMAC with demo
GNS S
HMAC with demo
31:53
birthday problem
GNS S
birthday problem
16:27
Module2- Digital signature
GNS S
Module2- Digital signature
14:00
Module-2 Introduction of Hashing
GNS S
Module-2 Introduction of Hashing
18:56
Taxonamy of cryptanalysis
GNS S
Taxonamy of cryptanalysis
10:45
Taxonomy of Cryptography
GNS S
Taxonomy of Cryptography
10:47
DSA -array Operations  create and traverse
GNS S
DSA -array Operations create and traverse
17:32
Modern crypto History
GNS S
Modern crypto History
9:08
DSA  relloc and free
GNS S
DSA relloc and free
17:09
Dynamic memory allocation function --calloc function
GNS S
Dynamic memory allocation function --calloc function
7:10
Dynamic Memory Allocation  and Malloc() function
GNS S
Dynamic Memory Allocation and Malloc() function
15:10
Cipher of the Election 1876
GNS S
Cipher of the Election 1876
6:57
DSA  Advantages of pointer and types of pointer
GNS S
DSA Advantages of pointer and types of pointer
12:34
Data Structure and application  pointer
GNS S
Data Structure and application pointer
20:55
Information and Network Security codebook cipher
GNS S
Information and Network Security codebook cipher
11:34
Representation of Linear Array in Memory part 3
GNS S
Representation of Linear Array in Memory part 3
21:50
Information and Network security Project venona
GNS S
Information and Network security Project venona
9:48
Data Structure and Application array part 2
GNS S
Data Structure and Application array part 2
19:30
Data Structure and Application  Arrays part-1
GNS S
Data Structure and Application Arrays part-1
25:53
Information and network security One Time Pad
GNS S
Information and network security One Time Pad
14:10
Data structure and application Unions
GNS S
Data structure and application Unions
10:17
Data Structure and application-part4 Pointers
GNS S
Data Structure and application-part4 Pointers
11:54
Information and Network Security  4
GNS S
Information and Network Security 4
8:01
Data Structure and Application  part 3
GNS S
Data Structure and Application part 3
12:23
Data Structure and Application-part3
GNS S
Data Structure and Application-part3
27:49
Information and Network Security part 4
GNS S
Information and Network Security part 4
3:08
INS - crypt-analysis of simple substitution part 3
GNS S
INS - crypt-analysis of simple substitution part 3
14:43
Information and Network Security -part 2
GNS S
Information and Network Security -part 2
12:18
Information and Network Security , Module 1, Introduction
GNS S
Information and Network Security , Module 1, Introduction
18:38
Data Structure and Application ,module 1
GNS S
Data Structure and Application ,module 1
20:22