Curve25519 Introduction

Cry.College

Curve25519 Introduction

3 years ago - 2:20

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

Curve25519 Features

Cry.College

Curve25519 Features

3 years ago - 1:36

Curve25519 Reduction

Cry.College

Curve25519 Reduction

3 years ago - 6:11

Curve25519 Details

Cry.College

Curve25519 Details

3 years ago - 1:50

Tor Network Key Exchange - Curve25519

Bill Buchanan OBE

Tor Network Key Exchange - Curve25519

7 years ago - 5:18

Elliptic Curve Cryptography Overview

F5 DevCentral Community

Elliptic Curve Cryptography Overview

9 years ago - 11:29

Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018

Real World Crypto

Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018

7 years ago - 28:07

Elliptic Curve Cryptography - (TLS Academy)

TLS Academy

Elliptic Curve Cryptography - (TLS Academy)

2 years ago - 7:11

WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318

Security For You

WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318

2 months ago - 1:00

ACM CCS 2017   Luke Valenta   Microarchitectural Side Channel Attack Curve25519

Association of Computing Machinery 2017

ACM CCS 2017 Luke Valenta Microarchitectural Side Channel Attack Curve25519

7 years ago - 28:42

Introduction to Edwards Curves

Cry.College

Introduction to Edwards Curves

3 years ago - 2:23

How to Generate curve25519 Key Pair Using Bcrypt in Windows

vlogize

How to Generate curve25519 Key Pair Using Bcrypt in Windows

3 months ago - 2:00

Android : Using ECC Curve25519 to encrypt/decrypt data in Java

Hey Delphi

Android : Using ECC Curve25519 to encrypt/decrypt data in Java

2 years ago - 1:13

Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained

Bits & Bytes with Eliza

Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained

3 months ago - 3:08

Curve Ed25519

Cry.College

Curve Ed25519

3 years ago - 3:35

How to generate a Curve25519 key pair in Terminal?

The Debug Zone

How to generate a Curve25519 key pair in Terminal?

1 year ago - 3:05

Are curve25519 syscalls sufficient to perform an ed25519 signature verification?

Nida Karagoz

Are curve25519 syscalls sufficient to perform an ed25519 signature verification?

2 months ago - 1:34

The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis

Jeremy Robert Walker

The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis

8 years ago - 51:29

PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography

PapersWeLove

PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography

7 years ago - 1:04:19

How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption

vlogize

How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption

1 month ago - 2:04

High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA

Oracle Developers

High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA

6 years ago - 38:35

Introduction to Elliptic Curve Cryptography (part III)

Vladimír Sedláček

Introduction to Elliptic Curve Cryptography (part III)

2 years ago - 9:57

Elliptic Curve Cryptography

@Scale

Elliptic Curve Cryptography

9 years ago - 17:10

Using Maple to Learn Elliptic Curve Cryptography

Maplesoft

Using Maple to Learn Elliptic Curve Cryptography

3 years ago - 23:27

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Rust

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

7 years ago - 34:22

Build Ethereum Wallet with Elliptic Curves | Episode 1

zkMarek

Build Ethereum Wallet with Elliptic Curves | Episode 1

1 year ago - 18:36

12 Elliptic Curves

Sams Class

12 Elliptic Curves

1 year ago - 22:20

High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA

Oracle Developers

High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA

6 years ago - 38:35

ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)

Nida Karagoz

ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)

1 month ago - 2:21

Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)

Bill Buchanan OBE

Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)

2 years ago - 47:40

Netsec More Crypto 4 - Some Specific Curves

Matthew Flatt

Netsec More Crypto 4 - Some Specific Curves

4 months ago - 1:53

How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)

The Debug Zone

How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)

11 months ago - 3:07

In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild

All Hacking Cons

In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild

3 years ago - 26:19

Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST

Bill Buchanan OBE

Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST

7 years ago - 12:37

ECDH (Elliptic Curve Diffie Hellman) with X25519

Bill Buchanan OBE

ECDH (Elliptic Curve Diffie Hellman) with X25519

4 years ago - 19:43

27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions

Selected Areas in Cryptography

27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions

4 years ago - 21:30

The Basics of Elliptic Curve Cryptography (ECC)

Bill Buchanan OBE

The Basics of Elliptic Curve Cryptography (ECC)

4 years ago - 12:16

Introduction to ECDSA

Cry.College

Introduction to ECDSA

3 years ago - 0:55

Martijn Grooten   Getting ahead of the elliptic curve

All Hacking Cons

Martijn Grooten Getting ahead of the elliptic curve

1 year ago - 45:31

Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol

aiootp

Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol

3 years ago - 2:32

6B 1 ECCKiila BBCRU

ACSAC Conference

6B 1 ECCKiila BBCRU

4 years ago - 11:47

A Coq proof of the correctness of X25519 in TweetNaCl

IEEE Computer Security Foundations Symposium

A Coq proof of the correctness of X25519 in TweetNaCl

4 years ago - 9:54

Lightweight Public Key Encryption in Post-Quantum Computing Era

Computer Science & IT Conference Proceedings

Lightweight Public Key Encryption in Post-Quantum Computing Era

1 year ago - 26:29

Crypto for Developers: Making Sane Choices by Adam Caudill

CodeMash Conference

Crypto for Developers: Making Sane Choices by Adam Caudill

7 years ago - 55:04

Ch 12 CNIT 141

Sam Bowne

Ch 12 CNIT 141

2 months ago - 25:52

X25519 Key Exchange

Cry.College

X25519 Key Exchange

3 years ago - 2:03

Montgomery vs. Edwards Curves

Cry.College

Montgomery vs. Edwards Curves

3 years ago - 2:44

Projective Curves

Cry.College

Projective Curves

3 years ago - 5:36

ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

HackersOnBoard

ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

11 years ago - 1:02:25

5. Applied Cryptography and Trust: Key Exchange

Bill Buchanan OBE

5. Applied Cryptography and Trust: Key Exchange

2 years ago - 27:36

The Role of Elliptic Curve Cryptography in the Post-Quantum Era

Xiphera Ltd.

The Role of Elliptic Curve Cryptography in the Post-Quantum Era

3 years ago - 42:30

CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video

Glitched Polygons

CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video

3 years ago - 9:19

Proof of Concept Hardware Wallet for Burstcoin

Jake

Proof of Concept Hardware Wallet for Burstcoin

7 years ago - 7:47

V8a: Elliptic curves (Cryptography 101)

Cryptography 101

V8a: Elliptic curves (Cryptography 101)

8 months ago - 25:35

TryHackMe - Public Key Cryptography Basics 2/2 (2025-01-06)

FixIt42live

TryHackMe - Public Key Cryptography Basics 2/2 (2025-01-06)

4 months ago - 1:04:27

CloudFlare meet-up: Michael Hamburg talks elliptic curves

Cloudflare

CloudFlare meet-up: Michael Hamburg talks elliptic curves

11 years ago - 22:13

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

USENIX

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

7 months ago - 13:07

W 11 and W 12

Sam Bowne

W 11 and W 12

4 months ago - 7:28