Monthly Archives: April 2014

The discrete logarithm problem | Journey into cryptography | Computer Science | Khan Academy

April 28th, 2014 📆 | 5672 Views ⚑

A mathematical lock using modular arithmetic Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange-part-2?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/diffie-hellman-key-exchange-part-1?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan

Tagged with:




Public key cryptography: What is it? | Computer Science | Khan Academy

April 28th, 2014 📆 | 8462 Views ⚑

Why do we need public key cryptography? Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/discrete-logarithm-problem?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/modern-crypt/v/the-fundamental-theorem-of-arithmetic-1?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on

Tagged with:




Viber Security Vulnerabilities: Images, Doodles, Location and Videos sent over Viber is unencrypted

April 23rd, 2014 📆 | 4775 Views ⚑

http://www.unhcfreg.com http://cyberforensics.newhaven.edu Interested in studying with us? http://www.newhaven.edu/engineering/get-information-about-computer-science-programs/ University of New Haven Cyber Forensics Research and Education Group Researchers, CT,

Tagged with: