1. Public Key Cryptography: Secrecy in Public - Professor Raymond Flood


    from Gresham College / Added

    27 Plays / / 0 Comments

    For centuries massive intellectual effort has gone into methods of ensuring secure communication, because of its importance in diplomatic, commercial and military affairs. Up until recently these…

    + More details
    • 10x10 Codes and Ciphers - the mathematics of the internet by Dr Dillon Mayhew


      from Royal Society of New Zealand / Added

      128 Plays / / 2 Comments

      Dr Dillon Mayhew explains the mathematics of how information can be transmitted on the internet accurately and securely as one of the Royal Society of New Zealand 10x10 Lecture Series, recorded on…

      + More details
      • swagger jagger skype quality:)


        from Vaneza Mae Duetes Aumento / Added

        29 Plays / / 0 Comments

        a day's practice for ubuntu bootcamp intermission number for tomorrow :)) kay wa mi lingaw, gi vid namo XD no copyright intended for the music used :)

        + More details
        • Lucky '13 Freestyle


          from PATSUR / Added

          22 Plays / / 0 Comments

          About to leave Pasadena, CA. Cruisin' with MC Knowledge and GZUS MOf**ken around freestylin'. We love Hip Hop.

          + More details
          • Algebraic and Cube Attacks on Stream/Block Ciphers


            from wdj / Added

            52 Plays / / 0 Comments

            This talk titled "Algebraic and Cube Attacks on Stream/Block Ciphers" by Pante Stanica (from the Naval Postgraduate School, Applied Mathematics Department, Monterey, CA).was given on…

            + More details
            • Fruit


              from wdj / Added

              30 Plays / / 0 Comments

              Chris Christensen (from the Dept of Mathematics, Northern Kentucky Univ.) spoke on Aug 28, 2012, for about 30 minutes on WWII ciphers attacked by cryptographers in the US Navy. Here is…

              + More details
              • Machine attacks on JN-25 during WWII


                from wdj / Added

                56 Plays / / 0 Comments

                Prof. Chris Christensen, Dept of Mathematics, Northern Kentucky Univ. gave a talk on Machine Attack on JN-25 on August 27, 2012. His 45 minute talk was a mixture of WWII history and mathematics. Here…

                + More details
                • The Bifid and Vigenère ciphers and Sage


                  from wdj / Added

                  167 Plays / / 0 Comments

                  This is a screencast showing how to use Sage to work with two classical ciphers, the Bifid cipher and the Vigenère cipher. The Bifid cipher [1] was invented around 1900 by Felix Delastelle.…

                  + More details
                  • Shift ciphers and Sage


                    from wdj / Added

                    157 Plays / / 0 Comments

                    This is a 16 minute screencast I made that shows some ways to use Sage (sagemath.org) to illustrate shift ciphers and affine ciphers. The screencast follows a Sage worksheet.…

                    + More details
                    • THE FOURTH WALL: 七大歌星 C-Pop


                      from Derelict Movie / Added

                      35 Plays / / 0 Comments

                      This is the thirty fifth in a series of documentary clips following the making of the film Derelict. derelictmovie.com

                      + More details

                      What are Tags?


                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."