Home
Videos uploaded by user “DrVikasThada”
Running Python program using Anaconda and Jupyter Notebook
 
09:04
Learn to install anaconda on windows, running python shell and script, short introduction to jupyter notebook and how to use it.
Views: 4115 DrVikasThada
SET Part 2 : Dual Signature
 
09:10
Understand the concept of Dual Signature and how it is used in Secure Electronic Transaction
Views: 578 DrVikasThada
Group Rings & fields in Cryptograpy
 
13:34
Learn concepts of groups, subgroups, generators, rings and fields in cryptography.
Views: 1569 DrVikasThada
Message Digest Algorithm: MD5
 
12:50
Learn the concept of message integrity and message digest. Understand how Message Digest 5 algorithm works.
Views: 3908 DrVikasThada
Galois Field Part 1
 
14:46
Learn and understand GF and various operations on elements using polynomial representation
Views: 5910 DrVikasThada
Chinese Remainder Theorem Using Formula
 
07:56
Understanding Chinese Remainder Theorem using a simple example consisting of 3 equations. Fully Solved step by step.
Views: 374 DrVikasThada
Euler and Fermat's Theorem Part 1
 
05:56
Understand the Euler's and Fermat's Theorem . See more example in Part 2
Views: 3971 DrVikasThada
Rabin Miller Primality Testing
 
11:57
Rabin Miller Primality Testing Algorithm for checking primality or compositeness of large numbers
Views: 670 DrVikasThada
Affine Cipher in cryptography
 
13:01
Learn and understand affine cipher in cryptography with two fully explained examples.
Views: 214 DrVikasThada
Division Theorem
 
05:03
Division Theorem and GCD for finding modular multiplicative inverse.
Views: 486 DrVikasThada
Advanced Encryption Standard Part 2 (Details of one round)
 
10:13
Understand details of one round of AES covering substitution bytes, shiftrows, mixcolumns, and addroundkey. Key expansion module is also covered.
Views: 178 DrVikasThada
OSI Security Architecture Part 2
 
13:43
Part 2 covers physical and active attacks, security services, security mechanims
Views: 493 DrVikasThada
Pseudo Primality Testing
 
05:01
Psuedo Primality Testing in Crytography
Views: 259 DrVikasThada
Model of Network Security in Cryptography & Network Security
 
10:43
Understand the model of network security and network access.
Views: 167 DrVikasThada
Modular Multiplicative Inverse
 
11:31
How to find modular multiplicative inverse, see video "Division Theorem" as foundation.
Views: 596 DrVikasThada
Galois Field Part 2
 
07:41
Multiplication and addition tables for GF(2^3), concept of generator in GF and operations using generator.
Views: 2638 DrVikasThada
OSI Security Architecture  Part 1
 
12:44
Learn and understand concepts of OSI security architecture, security attacks, services, mechanisms, principles of security.
Views: 1830 DrVikasThada
Secure Electronic Transaction  Part 1
 
13:05
Learn and understand Secure Electronic Transaction protocol and its working, need, key features, various participants.
Views: 2196 DrVikasThada
First Program in C++ Visual Studio 6.0
 
07:02
Learn to work in VC++ environment by writing your first C++ program in three different style.
Views: 36 DrVikasThada
Baby Step Giant Step Algorithm
 
08:38
Solving Discrete logarithm problem using Baby Step Giant Step algorithm. Full algorithm with detailed example, step by step
Views: 1322 DrVikasThada
Internet Protocol Security(IPSec) Part 1
 
10:02
Understand the concept of IPSec protocol, its position in OSI/TCP-IP layer, transport and tunnel mode of operations.
Views: 434 DrVikasThada
Elgamal Digital Signature Algorithm and Example
 
14:00
Understand the concept of Digital signature using Elgamal Digital signature with complete description and example. NOTE: in the last slide 5 into 2 plus 1 is 11 and not 10.
Views: 2094 DrVikasThada
Elgamal Cryptosystem
 
10:16
Elgamal Encryption and Decryption with examples explained in detail with known plaintext attack.
Views: 904 DrVikasThada
Chinese Remainder Theorem with example step by step solution
 
15:25
Learn and understand how to apply chinese remainder theorem to set of modular linear equations.
Views: 124 DrVikasThada
C++Basics Part 2
 
10:17
Structure of C++ Program, Styles of writing C++ program, variables, input, output, cout and cin operator, dynamic initialization, basic programs.
Views: 19 DrVikasThada
Solving Modular Linear Equation in cryptography
 
18:14
Learn how to use algorithm for solving modular linear equation with two clearly explained examples
Views: 144 DrVikasThada
Internet Protocol Security (IPSec) Part 2
 
10:16
Learn and understand Authentication Header(AH), Encapsulating Security Payload (ESP) , formats and how they work, Security associations
Views: 209 DrVikasThada
Kerberos Authetication Protocol Part 1
 
13:29
Learn and understand how kerberos version 4 authentication service works.
Views: 183 DrVikasThada
Secure Hash Algorithm-1
 
10:51
Understand working of SHA-1 algorithm
Views: 156 DrVikasThada
Chinese Remainder Theorem Solving without formula
 
12:13
Solution of linear modular equation with single variable without explicit formula and using simply concept of division theorem and modular inverse. NOTE: Read t as quotient in video.
Views: 308 DrVikasThada
JAVA PROGRAMMING: COMMA AND SIZEOF OPERATOR
 
04:36
Understand why comma and sizeof operators not present in java
Views: 21 DrVikasThada
Kerberos Authentication Protocol Part 2
 
11:32
Part 2 of the kerberos authentication protocol, discusses problems of the modified dialouge and explains actual version 4 dialogues.
Views: 186 DrVikasThada
Basics of Cryptography: Definitions to beginners
 
13:57
Understand terms used in cryptography: cryptography, encryption, decryption, key, symmetric key cryptography, asymmetric key cryptography, cryptology etc
Views: 49 DrVikasThada
Extended Euclid Algorithm and Modular Inverse in Cryptography
 
16:48
Learn and understand tabular and back substitution method of Extended euclid algorithm with step step by approach
Views: 139 DrVikasThada
Java Programming: Creating Constants in Java
 
04:13
Learn how to use final keyword for creating named constants in java
Views: 15 DrVikasThada
Type Conversion and Type casting in java
 
12:52
Learn concepts of type casting, type conversion, automatic type promotion in java.
Views: 82 DrVikasThada
Basics of C++ Part 1
 
12:40
Learn the basics of C++ : Character set, Tokens, Identifiers, Keywords, Data Types, Range, First Program in C++
Views: 39 DrVikasThada
packages in Java: Part 2, Implicit, Explicit and static import
 
09:51
Understand concept of dynamic linking, implicit / explicit import and static import in java
Views: 12 DrVikasThada
Substitution Ciphers in Cryptography: Caesar, Vignere, PlayFair,PigPen
 
29:28
Learn and understand monoalphabetic, polyalphabetic ciphers like caesar, shift cipher, vignere, playfair, vernam cipher
Views: 50 DrVikasThada
Just in Time: JIT Compiler in Java
 
11:00
Learn to understand the Just in Time Compiler in Java
Views: 159 DrVikasThada
Java Programming: The instanceof Operator
 
09:54
Learn with code sample the instanceof operator in java
Views: 15 DrVikasThada
Rational Number Arithmetic in Java : Full Program with detailed explanation
 
19:08
Understand how to represent rational number in java with Rational class and performing 4 arithmetic operations along with reduction and evaluation.
Views: 84 DrVikasThada
CBasics Part 1
 
14:24
Covering Overview,History, Character set, Tokens
Views: 195 DrVikasThada
Rail Fence Transposition cipher in cryptography
 
10:49
Learn and understand the Rail Fence transposition cipher with two examples of different keys
Views: 42 DrVikasThada
Arrays in C Programming Part 1
 
17:11
What are arrays, declaration, Initialization compile time and runtime both,features of array and some basic programs,
Views: 75 DrVikasThada
JAVA Programming: Reading using DataInputStream
 
11:40
Reading Strings, integers, float, long data using DataInputStream class in Java
Views: 36 DrVikasThada
Data Encryption Standard: DES Symmetric Key Cryptography Algorithm
 
27:25
Understand in details the complete description of DES.
Views: 54 DrVikasThada
Java Programming: Scanner class & Command Line arguments
 
14:05
Learn how to use Scanner class for reading data and Command Line argumetns
Views: 28 DrVikasThada
Packages in Java : Part 1 (User defined packages and classpath environment variable and option)
 
21:54
Learn the basics of packages and creating user defined packages with complete practical approach.
Views: 7 DrVikasThada
JAVA PROGRAMMING: TOKENS,KEYWORDS, IDENTIFIERS, LITERALS(2)
 
12:28
Learn and understand tokens, keywords, identifiers, literals of various types in java.
Views: 36 DrVikasThada

Unemployment application las vegas nv
Dialysis nurse resume cover letter
Term papers writing service
Unsolicited cover letter for fresh graduates salary
Picard s method application letters