1. Public Key Cryptography: Secrecy in Public - Professor Raymond Flood

    01:05:03

    from Gresham College / Added

    27 Plays / / 0 Comments

    For centuries massive intellectual effort has gone into methods of ensuring secure communication, because of its importance in diplomatic, commercial and military affairs. Up until recently these…

    + More details
    • 10x10 Codes and Ciphers - the mathematics of the internet by Dr Dillon Mayhew

      01:05:38

      from Royal Society of New Zealand / Added

      128 Plays / / 2 Comments

      Dr Dillon Mayhew explains the mathematics of how information can be transmitted on the internet accurately and securely as one of the Royal Society of New Zealand 10x10 Lecture Series, recorded on…

      + More details
      • swagger jagger skype quality:)

        01:14

        from Vaneza Mae Duetes Aumento / Added

        29 Plays / / 0 Comments

        a day's practice for ubuntu bootcamp intermission number for tomorrow :)) kay wa mi lingaw, gi vid namo XD no copyright intended for the music used :)

        + More details
        • Lucky '13 Freestyle

          03:07

          from PATSUR / Added

          22 Plays / / 0 Comments

          About to leave Pasadena, CA. Cruisin' with MC Knowledge and GZUS MOf**ken around freestylin'. We love Hip Hop.

          + More details
          • Algebraic and Cube Attacks on Stream/Block Ciphers

            25:47

            from wdj / Added

            52 Plays / / 0 Comments

            This talk titled "Algebraic and Cube Attacks on Stream/Block Ciphers" by Pante Stanica (from the Naval Postgraduate School, Applied Mathematics Department, Monterey, CA).was given on…

            + More details
            • Fruit

              30:16

              from wdj / Added

              30 Plays / / 0 Comments

              Chris Christensen (from the Dept of Mathematics, Northern Kentucky Univ.) spoke on Aug 28, 2012, for about 30 minutes on WWII ciphers attacked by cryptographers in the US Navy. Here is…

              + More details
              • Machine attacks on JN-25 during WWII

                44:59

                from wdj / Added

                56 Plays / / 0 Comments

                Prof. Chris Christensen, Dept of Mathematics, Northern Kentucky Univ. gave a talk on Machine Attack on JN-25 on August 27, 2012. His 45 minute talk was a mixture of WWII history and mathematics. Here…

                + More details
                • The Bifid and Vigenère ciphers and Sage

                  22:27

                  from wdj / Added

                  167 Plays / / 0 Comments

                  This is a screencast showing how to use Sage to work with two classical ciphers, the Bifid cipher and the Vigenère cipher. The Bifid cipher [1] was invented around 1900 by Felix Delastelle.…

                  + More details
                  • Shift ciphers and Sage

                    16:21

                    from wdj / Added

                    157 Plays / / 0 Comments

                    This is a 16 minute screencast I made that shows some ways to use Sage (sagemath.org) to illustrate shift ciphers and affine ciphers. The screencast follows a Sage worksheet.…

                    + More details
                    • THE FOURTH WALL: 七大歌星 C-Pop

                      01:16

                      from Derelict Movie / Added

                      35 Plays / / 0 Comments

                      This is the thirty fifth in a series of documentary clips following the making of the film Derelict. derelictmovie.com

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."