Security For You
WhatsApp encryption explained - From AES-256 to Curve25519 and HMAC SHA-256. 💥 #shorts -318
2 months ago - 1:00
TLS Academy
Elliptic Curve Cryptography - (TLS Academy)
2 years ago - 7:11
Real World Crypto
Side channel attacks on implementations of Curve25519 | Yuval Yarom and Daniel Genkin | RWC 2018
7 years ago - 28:07
PapersWeLove
PWLSF - 7/2017 - Kevin Burke on Curve25519 and Fast Public Key Cryptography
7 years ago - 1:04:19
Cry.College
Introduction to Edwards Curves
3 years ago - 2:23
vlogize
How to Generate curve25519 Key Pair Using Bcrypt in Windows
3 months ago - 2:00
Hey Delphi
Android : Using ECC Curve25519 to encrypt/decrypt data in Java
2 years ago - 1:13
Jeremy Robert Walker
The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis
8 years ago - 51:29
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
Bits & Bytes with Eliza
Unlocking Secure Curves in the Web Platform: Ed25519 & X25519 Explained
4 months ago - 3:08
Vladimír Sedláček
Introduction to Elliptic Curve Cryptography (part III)
2 years ago - 9:57
@Scale
Elliptic Curve Cryptography
9 years ago - 17:10
Oracle Developers
High-Speed Cryptography in Java: X25519, Poly1305, and EdDSA
6 years ago - 38:35
Maplesoft
Using Maple to Learn Elliptic Curve Cryptography
3 years ago - 23:27
vlogize
How to Create a Curve25519 Symmetric Key in Python for Secure Data Encryption
2 months ago - 2:04
Rust
RustConf 2017 - Fast, Safe, Pure-Rust Elliptic Curve Cryptography
7 years ago - 34:22
Bill Buchanan OBE
Authenticated Encryption using ElGamal and Elliptic Curve Cryptography
3 years ago - 25:53
Nida Karagoz
ECDSA vs ECDH vs Ed25519 vs Curve25519 (3 SOLUTIONS!!)
2 months ago - 2:21
CyberCrashCourses
Understanding Diffie-Hellman and Elliptic Curve Cryptography
2 weeks ago - 31:45
Cry.College
Montgomery vs. Edwards Curves
3 years ago - 2:44
Bill Buchanan OBE
The Basics of Elliptic Curve Cryptography (ECC)
4 years ago - 12:16
All Hacking Cons
In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild
3 years ago - 26:19
zkMarek
Build Ethereum Wallet with Elliptic Curves | Episode 1
1 year ago - 18:36
Bill Buchanan OBE
Elliptic Curve Cryptography (ECC) Parameters and Types: secp256k1, Curve 25519, and NIST
7 years ago - 12:37
Bill Buchanan OBE
Elliptic Curve Cryptography: Key Exchange (ECDH), Digital Sig (ECDSA/EdDSA) and Encryption (ECIES)
2 years ago - 47:40
The Debug Zone
How can you use .NET Core to support Safe Curves in ECC (eg. Curve25519)
1 year ago - 3:07
Bill Buchanan OBE
ECDH (Elliptic Curve Diffie Hellman) with X25519
4 years ago - 19:43
Matthew Flatt
Netsec More Crypto 4 - Some Specific Curves
5 months ago - 1:53
All Hacking Cons
Martijn Grooten Getting ahead of the elliptic curve
1 year ago - 45:31
aiootp
Python - aiootp Elliptic Curve x25519 Diffie-Hellman & The 3DH Protocol
3 years ago - 2:32
HackersOnBoard
ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
11 years ago - 1:02:25
CodeMash Conference
Crypto for Developers: Making Sane Choices by Adam Caudill
7 years ago - 55:04
Sam Bowne
Ch 12 CNIT 141
3 months ago - 25:52
Xiphera Ltd.
The Role of Elliptic Curve Cryptography in the Post-Quantum Era
3 years ago - 42:30
Glitched Polygons
CECIES: How to encrypt and decrypt a message asymmetrically - Tutorial video
3 years ago - 9:19
Bill Buchanan OBE
5. Applied Cryptography and Trust: Key Exchange
2 years ago - 27:36
Jake
Proof of Concept Hardware Wallet for Burstcoin
7 years ago - 7:47
Solana
Solana Changelog - October 11, 2022 - Vote Credit Proposal, Curve 25519 Compute Costs, & Seahorse v2
2 years ago - 5:03
Audiopedia
Elliptic curve cryptography
9 years ago - 18:25
FixIt42live
TryHackMe - Public Key Cryptography Basics 2/2 (2025-01-06)
5 months ago - 1:04:27
Wiredhippie
Google Introduces Quantum Resilient FIDO2 Security Key Implementation
1 year ago - 0:57
Leoni Angela
(COMP90043 Cryptography and Security) Group 11 Presentation - Password Key-Exchange Authentication
1 year ago - 9:25
Cry.College
Elliptic Curve Landscape
3 years ago - 1:39
PKIIndia
Physical Attacks on Post Quantum Cryptography Implementations
5 months ago - 1:03:02
Adrian Crenshaw
BSidesSF 114 Elliptic Curve Cryptography for those who are afraid of mathematics Martijn Grooten
9 years ago - 24:50
CocoaHeadsNL
Cryptography, by Bram Kolkman (English)
3 years ago - 33:27
Bill Buchanan OBE
4: Applied Cryptography and Trust: Public Key Encryption (CSN11131)
2 years ago - 36:04
HackersOnBoard
25C3 - an introduction to new stream cipher designs
12 years ago - 46:54
MC 5760
3. Thực hành Elliptic Curve Cryptography bằng code Python
2 years ago - 10:00
SecurityFirstCorp
What Are The Different Types Of Curves Used In The ECC Algorithm? - SecurityFirstCorp.com
2 months ago - 3:34
Cosmos
Interchain Conversations II - It's 255:19AM. Do you know what your validation criteria are?
4 years ago - 27:19
Matthew Flatt
Netsec More Crypto 4 - Some Specific Curves
5 months ago - 1:53
Witty Kuya
What Is Cryptography. | Crypto 101 Lesson 11 | Witty Kuya. 🔔
2 years ago - 9:11
Cry.College
Ellitpic Curve Digital Signature Algorithm
3 years ago - 2:50
All Hacking Cons
Martijn Grooten Getting ahead of the elliptic curve
1 year ago - 45:31
Nida Karagoz
Confused about converting Ed25519 public key to X25519 public key
2 months ago - 1:44
Matthew Flatt
Netsec More Crypto 5 - X25519 Code Demo
5 months ago - 2:29
All Hacking Cons
Cryptography is easy, but no magic Use it Wisely
2 years ago - 28:27
ACCU Conference
TLS Cryptography for Programmers - Peter Bindels - ACCU 2022
3 years ago - 1:25:50
Bill Buchanan OBE
Shamir Secret Shares and Elliptic Curves in Golang
3 years ago - 17:44
DFFML
Architecting Alice: Volume 0: Context: Part 29: Buy One Get One X/Ed25519 Keys!
Streamed 3 years ago - 7:03
Ghost Chat
What is end-to-end encryption?
5 months ago - 0:46
vlogize
How to Store an X25519 Key Pair in a BouncyCastle BCFKS Keystore
1 month ago - 2:13
prpl Foundation
Security and Hardening by Steven Barth - OpenWrt Summit
9 years ago - 11:40
vlogize
Loading encoded public keys from Kotlin in Python using Cryptography
1 month ago - 2:14
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:09
wikipedia tts
NaCl (software) | Wikipedia audio article
6 years ago - 4:30
Cryptography 101
V8c: Elliptic curve cryptography (Cryptography 101)
8 months ago - 16:57
Changelog
What's new in Go's cryptography libraries: Part 2
1 year ago - 1:11:32
Sefik Ilkin Serengil
Edwards Curve Digital Signature Algorithm (EdDSA) In Python From Scratch
1 year ago - 20:03
CS Research Week
Cryptography in the Wild by Kenneth Patterson
1 year ago - 1:37:35
cardsigner
Securing Bluetooth Communication
3 years ago - 3:47
Bill Buchanan OBE
Applied Cryptography and Trust: 5. Key Exchange
3 years ago - 40:37
Bill Buchanan OBE
World-leaders in Cryptography: Alfred Menezes
8 months ago - 1:10:37
All Hacking Cons
A Retrospective on the Use of Export Cryptography
3 years ago - 50:47
Cryptography 101
V8b: Elliptic curve discrete logarithm problem (Cryptography 101)
8 months ago - 16:07
Cryptography 101
Lectures on Elliptic Curve Cryptography by Alfred Menezes
7 months ago - 1:36
Bill Buchanan OBE
Applied Cryptography and Trust: 4. Public Key Encryption
3 years ago - 41:19
Wiredhippie
Google Adds Quantum-Resistant Encryption in Chrome 116 to Enhance TLS Security
1 year ago - 0:57
IACR
Elliptic Curves & Isogenies (Eurocrypt 2025)
1 month ago - 1:01:51
Bill Buchanan OBE
World-leaders in Cryptography: Daniel J Bernstein
1 year ago - 1:52:48
Cryptography 101
V1: Introduction to cryptography (Cryptography 101)
10 months ago - 23:15
Realtime User
Криптография - что нужно знать уже сейчас #cryptoknowledge #cryptography #rsa #aes #ed25519 #sha256
2 years ago - 24:08
Sai K
Fidelius CLI: An E2E Cryptography Solution
2 years ago - 14:13
Fireship
7 Cryptography Concepts EVERY Developer Should Know
3 years ago - 11:55
Ripple
Integrating Post Quantum Cryptography into the XRP Ledger, Atharva Lele
3 weeks ago - 8:51
TheEmailToolbox
What PGP Key Size Is Recommended? - TheEmailToolbox.com
7 days ago - 2:46
OWASP CycloneDX
CycloneDX Cryptography WG (2025-05-15)
2 months ago - 57:15
Алексей Рябов
New Generation Cryptocurrency : PRIZM
6 years ago - 1:39
Nick Janetakis
Switching from an RSA SSH Key to Ed25519 on Ubuntu 22.04
2 years ago - 13:50
STMicroelectronics
STM32H5 MCU Series - Security-Asymmetric crypto (ASYMCRYPTO)
1 month ago - 3:57
LearnEveryone
End-to-End Encryption in WhatsApp? Technical Explanation.
2 months ago - 1:33
Matrixdotorg
MCS2023 — Implementing E2EE from Scratch
1 year ago - 1:12:14
Zero Knowledge
Episode 289 - Penumbra Catch Up with Finch, Erwan and Jen
1 year ago - 1:05:56
LearnEveryone
5 Secret WhatsApp Features You Must Know!!
2 months ago - 1:13
CodeTime
How to plot a learning curve in python
1 year ago - 5:04
LearnEveryone
What is WhatsApp and How Does it Work Technically?
2 months ago - 3:00