An Interview with Ted Miracco
1:12:37
Bob and Alice mug (No sound)
0:18
C#, Dotnet and Cryptography
11:46
8 ай бұрын
Cyacomb Spin-out
1:56
9 ай бұрын
AES Cipher Bit Flipping
2:24
10 ай бұрын
Cyber Awards 2017
2:17
10 ай бұрын
Let's Talk About Spreadsheets
5:14
Пікірлер
@RosheenChaudhry
@RosheenChaudhry 20 күн бұрын
This video was really helpful in my understanding of the RSA broadcast attack! Thank you Bill! :)
@RazDorNV
@RazDorNV 29 күн бұрын
amazing explanation. thank you!
@frankdelahue9761
@frankdelahue9761 Ай бұрын
Internet can be very unforgiving place and that's why privacy and anonymity are important. Like Bruce said in his book "Data and Goliath"; "forgetting is forgiving". Erasing embarrassing posts prevents them from affects your future.
@frankdelahue9761
@frankdelahue9761 Ай бұрын
Justine Sacco learned all this in a hard way.
@MuscleTeamOfficial
@MuscleTeamOfficial Ай бұрын
thank you for making this available to us plebs Bill
@johnwilson3918
@johnwilson3918 Ай бұрын
Loved this. Thank you for sharing.
@scottishpotatoes5911
@scottishpotatoes5911 Ай бұрын
this is very helpful!
@AlgoNudger
@AlgoNudger Ай бұрын
Math + CS = Lamport? 😂
@Scarthanosaurus
@Scarthanosaurus Ай бұрын
This IS the interview between two legends that we all needed. Love how humble DJB is and the motivation of curiosity. Thank you!
@irgendwerjoker
@irgendwerjoker Ай бұрын
I knw. Humbleness is what DJB is known for.
@qassimm8209
@qassimm8209 2 ай бұрын
thank you Dr
@yeahweburnstuff
@yeahweburnstuff 2 ай бұрын
Just finished listening. Ted sounds like a really genuine and grounded person. Enjoyed this interview a lot.
@yeahweburnstuff
@yeahweburnstuff 2 ай бұрын
Hi Bill! Remember the painting of the Sator square? Today I heard a very plausible theory that it describes LNER tech. As an electrical engineer I'm certain this would be interesting to you. There's an amazing group of people on yt that are experimenting with low energy tech in their sheds! Amazing stuff. Blessings to you and the family. A
@ksaravanan7297
@ksaravanan7297 2 ай бұрын
Oh My God, I finally understood how group theory connects to Diffie Hellman! Thank you so much!
@forheuristiclifeksh7836
@forheuristiclifeksh7836 2 ай бұрын
1:05:30
@_BUIVANTUAN
@_BUIVANTUAN 2 ай бұрын
Sorry it doesn't work, can you check again for me?
@gamegamega4
@gamegamega4 2 ай бұрын
Gracias profesor por su contenido y su pagina web es muy util, saludos desde Peru 🇵🇪
@NLPexperts
@NLPexperts 2 ай бұрын
Great video can you do one about precalculation for rsa/diffie hellman decryption or generating 1024 bit primes? Or prime reuse?
@NLPexperts
@NLPexperts 2 ай бұрын
Great but can you not teach with an etchasketch? Perhaps use a notepad or notepad. When you say 1024 bit prime does that mean prime numbers that are exactly 1024 bits in length or can it be less or more ?
@papaa4918
@papaa4918 2 ай бұрын
damn bitcoins ecdsa
@TheDeclancox
@TheDeclancox 2 ай бұрын
Indeed! How prescient they were as was this gentleman kzbin.info/www/bejne/kHSyeHmJrNd6hMU
@ranjithmkumar
@ranjithmkumar 3 ай бұрын
You are the best, Sir
@yeahweburnstuff
@yeahweburnstuff 3 ай бұрын
Bill, this makes me so sad! What can we do? Are we lost?
@pavithrabasappa385
@pavithrabasappa385 3 ай бұрын
sir can you please provide example using RLWE based BGV scheme
@rami-majdoub
@rami-majdoub 3 ай бұрын
underrated channel
@gmailgmail012345
@gmailgmail012345 3 ай бұрын
I think this channel is heaven for cryptographers.
@pranavsingh-qz9vt
@pranavsingh-qz9vt 3 ай бұрын
Well that counts some of the good explanation available
@Arthur-cx1cg
@Arthur-cx1cg 3 ай бұрын
Thank you!
@gmailgmail012345
@gmailgmail012345 3 ай бұрын
this interview is very much informative for new cipher designers.
@TheJacob2030
@TheJacob2030 3 ай бұрын
Awesome
@AlgoNudger
@AlgoNudger 3 ай бұрын
Relying on brain, thats the key! 😊
@makichii2341
@makichii2341 3 ай бұрын
thank you
@badretdyn
@badretdyn 4 ай бұрын
thanks, dude
@juncyo1788
@juncyo1788 4 ай бұрын
Can you explain how to calculate the inverse of “x+1” that “(x+1)^{-1} = x^3+x^2+x”?
@BillBuchanan
@BillBuchanan 4 ай бұрын
asecuritysite.com/gf/poly_2
@user-px6qm9ns6x
@user-px6qm9ns6x 4 ай бұрын
I have not managed to set the connection via usb(
@Ryan-xq3kl
@Ryan-xq3kl 4 ай бұрын
whit is the most vibrant of all cryptographers ive ever listened too and i love it
@laxmiprasadoli5989
@laxmiprasadoli5989 4 ай бұрын
Greate Video! Thanks a lot :)
@saeedjalali7339
@saeedjalali7339 4 ай бұрын
Thanks for creating these unique videos. first year in college and decided to learn cryptography and you have tons of videos about it.
@Ryan-xq3kl
@Ryan-xq3kl 4 ай бұрын
his website is great too
@typingcat
@typingcat 4 ай бұрын
OMG, you're Thunderf00t!
@aspidistrax_x2722
@aspidistrax_x2722 4 ай бұрын
Thank you so much. Ur videos really help me❤
@aspidistrax_x2722
@aspidistrax_x2722 4 ай бұрын
Thank u so much. I finally got asymmetric lwe
@qassimm8209
@qassimm8209 4 ай бұрын
thanks
@yeahweburnstuff
@yeahweburnstuff 4 ай бұрын
😅 Bruce is so blunt and to the point! Very entertaining to watch; I'd love to chat to him at dinner and see him really let loose!
@yeahweburnstuff
@yeahweburnstuff 4 ай бұрын
Hi Bill! Great to see you going strong!
@kebman
@kebman 4 ай бұрын
Ok, so the ed25519 algorithm is basically EdDSA?
@kebman
@kebman 4 ай бұрын
I just found your website! Thank you so much!
@shrameesrivastav1130
@shrameesrivastav1130 5 ай бұрын
For, e(x·G1, x·G2) · e(G1, -x·G2) · e(G1, 42·G2) = 0 Not sure if we can obtain -x·G2 from x·G2... So the second pairing could instead be e( -1·G1, x·G2) PS, in mod arithmetics, -1*G1 would just be <Order - 1>*G1 Can someone clarify if -1G1 should be <Field - 1> instead?
@conor7728
@conor7728 5 ай бұрын
thanks for posting
@divyanshu_chaurasiya
@divyanshu_chaurasiya 6 ай бұрын
Thank You Sir , Very helpful .
@junghyunkim2247
@junghyunkim2247 6 ай бұрын
Superb explanation.
@prakashmorab1341
@prakashmorab1341 6 ай бұрын
Best presentation for beginners.