Shreya's E-Learning
Cryptography & N/W Security: #18 Playfair, Vignere, Hill, One time pad Polyalphabetic Ciphers
14:49
Shreya's E-Learning
Cryptography & Network Security: #17 Polyalphabetic Cipher and its type Autokey Cipher
7:11
Shreya's E-Learning
Cryptography and Network Security: #16 Affine Cipher
9:37
Shreya's E-Learning
Cryptography and Network Security: #15 Multiplicative Cipher
10:56
Shreya's E-Learning
Cryptography and Network Security: #14 Multiplicative Inverse
6:10
Shreya's E-Learning
Cryptography and Network Security: #13 Euler's Theorem
6:51
Shreya's E-Learning
Cryptography and Network Security: #12 Fermat's Little Theorem
4:25
Shreya's E-Learning
Cryptography and Network Security: #11 Euler's Phi Function
9:06
Shreya's E-Learning
Cryptography and Network Security:#10 Cryptanalysis for Additive Ciphers
7:35
Shreya's E-Learning
Cryptography and Network Security:#9 Traditional Ciphers: Additive Substitution Cipher
11:53
Shreya's E-Learning
Cryptography and Network Security:#8 Symmetric Key Ciphers
9:35
Shreya's E-Learning
Cryptography and Network Security: #7 Security Services and Mechanisms
12:07
Shreya's E-Learning
Cryptography and Network Security: #6 Cryptographic Attacks
10:35
Shreya's E-Learning
Cryptography and Network Security: #5 Multiplicative Inverse using Extended Euclidean Algo Part 2
9:02
Shreya's E-Learning
Cryptography and Network Security: #4 Inverses(Additive Inverse, Multiplicative Inverse) Part 1
11:05
Shreya's E-Learning
Cryptography and Network Security: #3 Operations in Zn and Properties
9:37
Shreya's E-Learning
Cryptography and Network Security: #2 Modulo Arithmetic and Basic Concept
10:04
Shreya's E-Learning
Cryptography and Network Security: #1 Extended Euclidean Algorithm with solved example (GCD)
11:01