Security For You
WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318
2 months ago - 1:00
Real World Crypto
Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018
7 years ago - 28:07
TLS Academy
Elliptic Curve Cryptography - (TLS Academy)
2 years ago - 7:11
Cry.College
Introduction to Edwards Curves
3 years ago - 2:23
vlogize
How to Generate curve25519 Key Pair Using Bcrypt in Windows
3 months ago - 2:00
Hey Delphi
Android : Using ECC Curve25519 to encrypt/decrypt data in Java
2 years ago - 1:13
Jeremy Robert Walker
The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis
8 years ago - 51:29
Nida Karagoz
Are curve25519 syscalls sufficient to perform an ed25519 signature verification?
3 months ago - 1:34
The Debug Zone
How to generate a Curve25519 key pair in Terminal?
1 year ago - 3:05
Bits & Bytes with Eliza
Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained
4 months ago - 3:08
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
PapersWeLove
PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography
7 years ago - 1:04:19
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
Vladimír Sedláček
Introduction to Elliptic Curve Cryptography (part III)
2 years ago - 9:57
@Scale
Elliptic Curve Cryptography
9 years ago - 17:10
Maplesoft
Using Maple to Learn Elliptic Curve Cryptography
3 years ago - 23:27
Rust
RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography
7 years ago - 34:22
vlogize
How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption
1 month ago - 2:04
Bill Buchanan OBE
Authenticated Encryption using ElGamal and Elliptic Curve Cryptography
3 years ago - 25:53
Cry.College
Montgomery vs. Edwards Curves
3 years ago - 2:44
Nida Karagoz
ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)
2 months ago - 2:21
zkMarek
Build Ethereum Wallet with Elliptic Curves | Episode 1
1 year ago - 18:36
Bill Buchanan OBE
Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)
2 years ago - 47:40
All Hacking Cons
In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild
3 years ago - 26:19
Bill Buchanan OBE
Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST
7 years ago - 12:37
The Debug Zone
How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)
1 year ago - 3:07
Matthew Flatt
Netsec More Crypto 4 - Some Specific Curves
5 months ago - 1:53
Bill Buchanan OBE
ECDH (Elliptic Curve Diffie Hellman) with X25519
4 years ago - 19:43
Bill Buchanan OBE
The Basics of Elliptic Curve Cryptography (ECC)
4 years ago - 12:16
All Hacking Cons
Martijn Grooten Getting ahead of the elliptic curve
1 year ago - 45:31
CodeMash Conference
Crypto for Developers: Making Sane Choices by Adam Caudill
7 years ago - 55:04
aiootp
Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol
3 years ago - 2:32
Sam Bowne
Ch 12 CNIT 141
2 months ago - 25:52
HackersOnBoard
ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
11 years ago - 1:02:25
Glitched Polygons
CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video
3 years ago - 9:19
Solana
Solana Changelog - October 11, 2022 - Vote Credit Proposal, Curve 25519 Compute Costs, & Seahorse v2
2 years ago - 5:03
Jake
Proof of Concept Hardware Wallet for Burstcoin
7 years ago - 7:47
Bill Buchanan OBE
5. Applied Cryptography and Trust: Key Exchange
2 years ago - 27:36
FixIt42live
TryHackMe - Public Key Cryptography Basics 2/2 (2025-01-06)
4 months ago - 1:04:27
Wiredhippie
Google Introduces Quantum Resilient FIDO2 Security Key Implementation
1 year ago - 0:57
USENIX
USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
8 months ago - 13:07
Xiphera Ltd.
The Role of Elliptic Curve Cryptography in the Post-Quantum Era
3 years ago - 42:30
Leoni Angela
(COMP90043 Cryptography and Security) Group 11 Presentation - Password Key-Exchange Authentication
1 year ago - 9:25
Adrian Crenshaw
BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten
9 years ago - 24:50
Cry.College
Elliptic Curve Landscape
3 years ago - 1:39
CocoaHeadsNL
Cryptography, by Bram Kolkman (English)
3 years ago - 33:27
PKIIndia
Physical Attacks on Post Quantum Cryptography Implementations
5 months ago - 1:03:02
Mojtaba Bisheh Niasar
Efficient and Secure Implementation of Classic and Post-Quantum Public-Key Cryptography
ECC: Proposed Architecture over Curve25519 ...
3 years ago - 32:38
HackersOnBoard
25C3 - an introduction to new stream cipher designs
12 years ago - 46:54
MC 5760
3. Thực hành Elliptic Curve Cryptography bằng code Python
2 years ago - 10:00
Matthew Flatt
Netsec More Crypto 5 - X25519 Code Demo
5 months ago - 2:29
CS Research Week
Proving the security of real-world cryptography and protocols by Jonathan Protzenko
1 year ago - 1:23:30
Sergio Quirós
Elliptic Curve Cryptograhphy(ECC)
2 years ago - 15:34
Nida Karagoz
Confused about converting Ed25519 public key to X25519 public key
2 months ago - 1:44
Audiopedia
Elliptic curve cryptography
9 years ago - 18:25
Cloudflare
CloudFlare meet-up: Michael Hamburg talks elliptic curves
11 years ago - 22:13
SecurityFirstCorp
What Are The Different Types Of Curves Used In The ECC Algorithm? - SecurityFirstCorp.com
2 months ago - 3:34
Cosmos
Interchain Conversations II - It's 255:19AM. Do you know what your validation criteria are?
4 years ago - 27:19
Witty Kuya
What Is Cryptography. | Crypto 101 Lesson 11 | Witty Kuya. 🔔
2 years ago - 9:11
All Hacking Cons
Cryptography is easy, but no magic Use it Wisely
2 years ago - 28:27
Cry.College
Ellitpic Curve Digital Signature Algorithm
3 years ago - 2:50
vlogize
How to Store an X25519 Key Pair in a BouncyCastle BCFKS Keystore
1 month ago - 2:13
Johny Pentest
Dominik Pantůček - Eliptic-curve Cryptography and the Internet
9 years ago - 52:29
Wiredhippie
RTM Locker's Ransomware Variant Targets NAS and ESXi Hosts
2 years ago - 0:49
Bill Buchanan OBE
4: Applied Cryptography and Trust: Public Key Encryption (CSN11131)
2 years ago - 36:04
Bill Buchanan OBE
World-leaders in Cryptography: Daniel J Bernstein
1 year ago - 1:52:48
vlogize
Loading encoded public keys from Kotlin in Python using Cryptography
1 month ago - 2:14
DFFML
Architecting Alice: Volume 0: Context: Part 29: Buy One Get One X/Ed25519 Keys!
Streamed 3 years ago - 7:03
prpl Foundation
Security and Hardening by Steven Barth - OpenWrt Summit
9 years ago - 11:40
ACCU Conference
TLS Cryptography for Programmers - Peter Bindels - ACCU 2022
3 years ago - 1:25:50
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:09
All Hacking Cons
A Retrospective on the Use of Export Cryptography
3 years ago - 50:47
Bill Buchanan OBE
World-leaders in Cryptography: Alfred Menezes
7 months ago - 1:10:37
Ghost Chat
What is end-to-end encryption?
5 months ago - 0:46
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:30
Changelog
What's new in Go's cryptography libraries: Part 2
1 year ago - 1:11:32
CS Research Week
Cryptography in the Wild by Kenneth Patterson
1 year ago - 1:37:35
Bill Buchanan OBE
Shamir Secret Shares and Elliptic Curves in Golang
3 years ago - 17:44
Wiredhippie
Google Adds Quantum-Resistant Encryption in Chrome 116 to Enhance TLS Security
1 year ago - 0:57
cardsigner
Securing Bluetooth Communication
3 years ago - 3:47
Cryptography 101
V8c: Elliptic curve cryptography (Cryptography 101)
8 months ago - 16:57
Bill Buchanan OBE
Applied Cryptography and Trust: 5. Key Exchange
3 years ago - 40:37
IACR
Elliptic Curves & Isogenies (Eurocrypt 2025)
1 month ago - 1:01:51
Cryptography 101
V8b: Elliptic curve discrete logarithm problem (Cryptography 101)
8 months ago - 16:07
Cryptography 101
Lectures on Elliptic Curve Cryptography by Alfred Menezes
7 months ago - 1:36
Bill Buchanan OBE
Applied Cryptography and Trust: 4. Public Key Encryption
3 years ago - 41:19
Cryptography 101
V1: Introduction to cryptography (Cryptography 101)
10 months ago - 23:15
Realtime User
Криптография - что нужно знать уже сейчас #cryptoknowledge #cryptography #rsa #aes #ed25519 #sha256
2 years ago - 24:08
Fireship
7 Cryptography Concepts EVERY Developer Should Know
3 years ago - 11:55