Security For You
WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318
2 months ago - 1:00
TLS Academy
Elliptic Curve Cryptography - (TLS Academy)
2 years ago - 7:11
Real World Crypto
Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018
7 years ago - 28:07
Cry.College
Introduction to Edwards Curves
3 years ago - 2:23
vlogize
How to Generate curve25519 Key Pair Using Bcrypt in Windows
3 months ago - 2:00
Hey Delphi
Android : Using ECC Curve25519 to encrypt/decrypt data in Java
2 years ago - 1:13
Jeremy Robert Walker
The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis
8 years ago - 51:29
The Debug Zone
How to generate a Curve25519 key pair in Terminal?
1 year ago - 3:05
Nida Karagoz
Are curve25519 syscalls sufficient to perform an ed25519 signature verification?
3 months ago - 1:34
Bits & Bytes with Eliza
Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained
4 months ago - 3:08
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
PapersWeLove
PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography
7 years ago - 1:04:19
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
Vladimír Sedláček
Introduction to Elliptic Curve Cryptography (part III)
2 years ago - 9:57
@Scale
Elliptic Curve Cryptography
9 years ago - 17:10
Maplesoft
Using Maple to Learn Elliptic Curve Cryptography
3 years ago - 23:27
Bill Buchanan OBE
Authenticated Encryption using ElGamal and Elliptic Curve Cryptography
3 years ago - 25:53
Rust
RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography
7 years ago - 34:22
vlogize
How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption
1 month ago - 2:04
Nida Karagoz
ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)
2 months ago - 2:21
zkMarek
Build Ethereum Wallet with Elliptic Curves | Episode 1
1 year ago - 18:36
All Hacking Cons
In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild
3 years ago - 26:19
Bill Buchanan OBE
Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST
7 years ago - 12:37
The Debug Zone
How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)
1 year ago - 3:07
Bill Buchanan OBE
Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)
2 years ago - 47:40
Bill Buchanan OBE
ECDH (Elliptic Curve Diffie Hellman) with X25519
4 years ago - 19:43
Leoni Angela
(COMP90043 Cryptography and Security) Group 11 Presentation - Password Key-Exchange Authentication
1 year ago - 9:25
Glitched Polygons
CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video
3 years ago - 9:19
Jake
Proof of Concept Hardware Wallet for Burstcoin
7 years ago - 7:47
HackersOnBoard
ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
11 years ago - 1:02:25
Solana
Solana Changelog - October 11, 2022 - Vote Credit Proposal, Curve 25519 Compute Costs, & Seahorse v2
2 years ago - 5:03
Bill Buchanan OBE
5. Applied Cryptography and Trust: Key Exchange
2 years ago - 27:36
Xiphera Ltd.
The Role of Elliptic Curve Cryptography in the Post-Quantum Era
3 years ago - 42:30
Adrian Crenshaw
BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten
9 years ago - 24:50
USENIX
USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
8 months ago - 13:07
aiootp
Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol
3 years ago - 2:32
Cry.College
Elliptic Curve Landscape
3 years ago - 1:39
FixIt42live
TryHackMe - Public Key Cryptography Basics 2/2 (2025-01-06)
4 months ago - 1:04:27
Cloudflare
CloudFlare meet-up: Michael Hamburg talks elliptic curves
11 years ago - 22:13
HackersOnBoard
25C3 - an introduction to new stream cipher designs
12 years ago - 46:54
CocoaHeadsNL
Cryptography, by Bram Kolkman (English)
3 years ago - 33:27
PKIIndia
Physical Attacks on Post Quantum Cryptography Implementations
4 months ago - 1:03:02
Mojtaba Bisheh Niasar
Efficient and Secure Implementation of Classic and Post-Quantum Public-Key Cryptography
ECC: Proposed Architecture over Curve25519 ...
3 years ago - 32:38
Cosmos
Interchain Conversations II - It's 255:19AM. Do you know what your validation criteria are?
4 years ago - 27:19
Matthew Flatt
Netsec More Crypto 5 - X25519 Code Demo
4 months ago - 2:29
Audiopedia
Elliptic curve cryptography
9 years ago - 18:25
Sergio Quirós
Elliptic Curve Cryptograhphy(ECC)
2 years ago - 15:34
Bill Buchanan OBE
World-leaders in Cryptography: Alfred Menezes
7 months ago - 1:10:37
Nida Karagoz
Confused about converting Ed25519 public key to X25519 public key
1 month ago - 1:44
CS Research Week
Proving the security of real-world cryptography and protocols by Jonathan Protzenko
1 year ago - 1:23:30
Matthew Flatt
Netsec More Crypto 4 - Some Specific Curves
4 months ago - 1:53
SecurityFirstCorp
What Are The Different Types Of Curves Used In The ECC Algorithm? - SecurityFirstCorp.com
2 months ago - 3:34
Cry.College
Ellitpic Curve Digital Signature Algorithm
3 years ago - 2:50
Witty Kuya
What Is Cryptography. | Crypto 101 Lesson 11 | Witty Kuya. 🔔
2 years ago - 9:11
All Hacking Cons
Martijn Grooten Getting ahead of the elliptic curve
1 year ago - 45:31
MC 5760
3. Thực hành Elliptic Curve Cryptography bằng code Python
2 years ago - 10:00
All Hacking Cons
Cryptography is easy, but no magic Use it Wisely
2 years ago - 28:27
vlogize
How to Store an X25519 Key Pair in a BouncyCastle BCFKS Keystore
1 month ago - 2:13
Bill Buchanan OBE
4: Applied Cryptography and Trust: Public Key Encryption (CSN11131)
2 years ago - 36:04
Cryptography 101
V8c: Elliptic curve cryptography (Cryptography 101)
8 months ago - 16:57
vlogize
Loading encoded public keys from Kotlin in Python using Cryptography
1 month ago - 2:14
DFFML
Architecting Alice: Volume 0: Context: Part 29: Buy One Get One X/Ed25519 Keys!
Streamed 3 years ago - 7:03
Bill Buchanan OBE
Shamir Secret Shares and Elliptic Curves in Golang
3 years ago - 17:44
Johny Pentest
Dominik Pantůček - Eliptic-curve Cryptography and the Internet
9 years ago - 52:29
Wiredhippie
RTM Locker's Ransomware Variant Targets NAS and ESXi Hosts
2 years ago - 0:49
prpl Foundation
Security and Hardening by Steven Barth - OpenWrt Summit
9 years ago - 11:40
ACCU Conference
TLS Cryptography for Programmers - Peter Bindels - ACCU 2022
3 years ago - 1:25:50
All Hacking Cons
A Retrospective on the Use of Export Cryptography
3 years ago - 50:47
Changelog
What's new in Go's cryptography libraries: Part 2
1 year ago - 1:11:32
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:30
CS Research Week
Cryptography in the Wild by Kenneth Patterson
1 year ago - 1:37:35
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:09
Sefik Ilkin Serengil
Edwards Curve Digital Signature Algorithm (EdDSA) In Python From Scratch
1 year ago - 20:03
cardsigner
Securing Bluetooth Communication
3 years ago - 3:47