Curve25519 Introduction

Cry.College

Curve25519 Introduction

3 years ago - 2:20

Elliptic Curves - Computerphile

Computerphile

Elliptic Curves - Computerphile

7 years ago - 8:42

Curve25519 Features

Cry.College

Curve25519 Features

3 years ago - 1:36

Curve25519 Reduction

Cry.College

Curve25519 Reduction

3 years ago - 6:11

Curve25519 Details

Cry.College

Curve25519 Details

3 years ago - 1:50

Tor Network Key Exchange - Curve25519

Bill Buchanan OBE

Tor Network Key Exchange - Curve25519

7 years ago - 5:18

Elliptic Curve Cryptography Overview

F5 DevCentral Community

Elliptic Curve Cryptography Overview

9 years ago - 11:29

WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318

Security For You

WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318

2 months ago - 1:00

Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018

Real World Crypto

Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018

7 years ago - 28:07

Elliptic Curve Cryptography - (TLS Academy)

TLS Academy

Elliptic Curve Cryptography - (TLS Academy)

2 years ago - 7:11

ACM CCS 2017   Luke Valenta   Microarchitectural Side Channel Attack Curve25519

Association of Computing Machinery 2017

ACM CCS 2017 Luke Valenta Microarchitectural Side Channel Attack Curve25519

7 years ago - 28:42

Introduction to Edwards Curves

Cry.College

Introduction to Edwards Curves

3 years ago - 2:23

Curve Ed25519

Cry.College

Curve Ed25519

3 years ago - 3:35

How to Generate curve25519 Key Pair Using Bcrypt in Windows

vlogize

How to Generate curve25519 Key Pair Using Bcrypt in Windows

3 months ago - 2:00

The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis

Jeremy Robert Walker

The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis

8 years ago - 51:29

Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained

Bits & Bytes with Eliza

Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained

3 months ago - 3:08

Android : Using ECC Curve25519 to encrypt/decrypt data in Java

Hey Delphi

Android : Using ECC Curve25519 to encrypt/decrypt data in Java

2 years ago - 1:13

Elliptic-curve cryptography IX - Explicit formulas

Tanja Lange: Cryptology

Elliptic-curve cryptography IX - Explicit formulas

3 years ago - 27:21

How to generate a Curve25519 key pair in Terminal?

The Debug Zone

How to generate a Curve25519 key pair in Terminal?

1 year ago - 3:05

Are curve25519 syscalls sufficient to perform an ed25519 signature verification?

Nida Karagoz

Are curve25519 syscalls sufficient to perform an ed25519 signature verification?

3 months ago - 1:34

PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography

PapersWeLove

PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography

7 years ago - 1:04:19

Elliptic Curve Cryptography

@Scale

Elliptic Curve Cryptography

9 years ago - 17:10

Introduction to Elliptic Curve Cryptography (part III)

Vladimír Sedláček

Introduction to Elliptic Curve Cryptography (part III)

2 years ago - 9:57

Authenticated Encryption using ElGamal and Elliptic Curve Cryptography

Bill Buchanan OBE

Authenticated Encryption using ElGamal and Elliptic Curve Cryptography

3 years ago - 25:53

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

Rust

RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography

7 years ago - 34:22

Using Maple to Learn Elliptic Curve Cryptography

Maplesoft

Using Maple to Learn Elliptic Curve Cryptography

3 years ago - 23:27

How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption

vlogize

How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption

1 month ago - 2:04

Introduction to ECDSA

Cry.College

Introduction to ECDSA

3 years ago - 0:55

Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)

Bill Buchanan OBE

Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)

2 years ago - 47:40

12 Elliptic Curves

Sams Class

12 Elliptic Curves

1 year ago - 22:20

ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)

Nida Karagoz

ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)

2 months ago - 2:21

The Brainpool Curves

Bill Buchanan OBE

The Brainpool Curves

8 months ago - 10:11

In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild

All Hacking Cons

In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild

3 years ago - 26:19

Build Ethereum Wallet with Elliptic Curves | Episode 1

zkMarek

Build Ethereum Wallet with Elliptic Curves | Episode 1

1 year ago - 18:36

Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST

Bill Buchanan OBE

Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST

7 years ago - 12:37

The Basics of Elliptic Curve Cryptography (ECC)

Bill Buchanan OBE

The Basics of Elliptic Curve Cryptography (ECC)

4 years ago - 12:16

How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)

The Debug Zone

How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)

11 months ago - 3:07

27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions

Selected Areas in Cryptography

27. High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions

4 years ago - 21:30

ECDH (Elliptic Curve Diffie Hellman) with X25519

Bill Buchanan OBE

ECDH (Elliptic Curve Diffie Hellman) with X25519

4 years ago - 19:43

CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video

Glitched Polygons

CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video

3 years ago - 9:19

(COMP90043 Cryptography and Security) Group 11 Presentation - Password Key-Exchange Authentication

Leoni Angela

(COMP90043 Cryptography and Security) Group 11 Presentation - Password Key-Exchange Authentication

1 year ago - 9:25

Proof of Concept Hardware Wallet for Burstcoin

Jake

Proof of Concept Hardware Wallet for Burstcoin

7 years ago - 7:47

ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

HackersOnBoard

ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography

11 years ago - 1:02:25

A Coq proof of the correctness of X25519 in TweetNaCl

IEEE Computer Security Foundations Symposium

A Coq proof of the correctness of X25519 in TweetNaCl

4 years ago - 9:54

Applied Cryptography

Bill Buchanan OBE

Applied Cryptography

3 months ago - 1:08:56

X25519 Key Exchange

Cry.College

X25519 Key Exchange

3 years ago - 2:03

Solana Changelog - October 11, 2022 - Vote Credit Proposal, Curve 25519 Compute Costs, & Seahorse v2

Solana

Solana Changelog - October 11, 2022 - Vote Credit Proposal, Curve 25519 Compute Costs, & Seahorse v2

2 years ago - 5:03

5. Applied Cryptography and Trust: Key Exchange

Bill Buchanan OBE

5. Applied Cryptography and Trust: Key Exchange

2 years ago - 27:36

The Role of Elliptic Curve Cryptography in the Post-Quantum Era

Xiphera Ltd.

The Role of Elliptic Curve Cryptography in the Post-Quantum Era

3 years ago - 42:30

Projective Curves

Cry.College

Projective Curves

3 years ago - 5:36

Lightweight Public Key Encryption in Post-Quantum Computing Era

Computer Science & IT Conference Proceedings

Lightweight Public Key Encryption in Post-Quantum Computing Era

1 year ago - 26:29

BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten

Adrian Crenshaw

BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten

9 years ago - 24:50

Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol

aiootp

Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol

3 years ago - 2:32

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

USENIX

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

8 months ago - 13:07

Applied Cryptography and Trust: 7. Tunnelling

Bill Buchanan OBE

Applied Cryptography and Trust: 7. Tunnelling

2 years ago - 30:44

Introduction to Key Exchange (DH and ECDH)

Bill Buchanan OBE

Introduction to Key Exchange (DH and ECDH)

4 years ago - 14:58

BSidesSF 2016 - Elliptic Curve Cryptography for those who are afraid of math (Martijn Grooten)

Security BSides San Francisco

BSidesSF 2016 - Elliptic Curve Cryptography for those who are afraid of math (Martijn Grooten)

9 years ago - 24:50

David Buchanan: Modern Cryptography from Scratch, in Scratch

Electromagnetic Field

David Buchanan: Modern Cryptography from Scratch, in Scratch

2 years ago - 28:17

Elliptic Curve Landscape

Cry.College

Elliptic Curve Landscape

3 years ago - 1:39

The Brainpool Curves

Bill Buchanan OBE

The Brainpool Curves

8 months ago - 10:11

W 11 and W 12

Sam Bowne

W 11 and W 12

4 months ago - 7:28

Physical Attacks on Post Quantum Cryptography Implementations

PKIIndia

Physical Attacks on Post Quantum Cryptography Implementations

4 months ago - 1:03:02

CECIES: Settings menu - Tutorial video

Glitched Polygons

CECIES: Settings menu - Tutorial video

3 years ago - 1:29

3. Thực hành Elliptic Curve Cryptography bằng code Python

MC 5760

3. Thực hành Elliptic Curve Cryptography bằng code Python

2 years ago - 10:00

25C3 - an introduction to new stream cipher designs

HackersOnBoard

25C3 - an introduction to new stream cipher designs

12 years ago - 46:54

Cryptocurrencies' Choice of Digital Signature Algorithms

Sefik Ilkin Serengil

Cryptocurrencies' Choice of Digital Signature Algorithms

1 year ago - 2:43

Elliptic curve cryptography

Audiopedia

Elliptic curve cryptography

9 years ago - 18:25

Efficient and Secure Implementation of Classic and Post-Quantum Public-Key Cryptography

Mojtaba Bisheh Niasar

Efficient and Secure Implementation of Classic and Post-Quantum Public-Key Cryptography

ECC: Proposed Architecture over Curve25519 ...

3 years ago - 32:38

How a not so random number broke the PS3 #MegaFavNumbers

Calle "ZetaTwo" Svensson

How a not so random number broke the PS3 #MegaFavNumbers

4 years ago - 17:25

Cryptography, by Bram Kolkman (English)

CocoaHeadsNL

Cryptography, by Bram Kolkman (English)

3 years ago - 33:27

CECIES: How to create a backup - Tutorial video

Glitched Polygons

CECIES: How to create a backup - Tutorial video

3 years ago - 1:53

Confused about converting Ed25519 public key to X25519 public key

Nida Karagoz

Confused about converting Ed25519 public key to X25519 public key

1 month ago - 1:44

What Is Cryptography. | Crypto 101 Lesson 11 | Witty Kuya. 🔔

Witty Kuya

What Is Cryptography. | Crypto 101 Lesson 11 | Witty Kuya. 🔔

2 years ago - 9:11

Elliptic Curve Cryptograhphy(ECC)

Sergio Quirós

Elliptic Curve Cryptograhphy(ECC)

2 years ago - 15:34

RTM Locker's Ransomware Variant Targets NAS and ESXi Hosts

Wiredhippie

RTM Locker's Ransomware Variant Targets NAS and ESXi Hosts

2 years ago - 0:49

What Are The Different Types Of Curves Used In The ECC Algorithm? - SecurityFirstCorp.com

SecurityFirstCorp

What Are The Different Types Of Curves Used In The ECC Algorithm? - SecurityFirstCorp.com

2 months ago - 3:34