Home
Search results “Cryptography programming problems that need solving”
RSA Algorithm (Solved Example) in Cryptography and Network security in Hindi.
 
19:44
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ c programming - https://www.youtube.com/playlist?list=PLCZJSEiJwWZ6nY1vuEAG8Ut2S4_E0X36G ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Solving Problems - Applied Cryptography
 
01:40
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 672 Udacity
Three problems computers will never solve
 
03:08
Modern computers might seem like they can do anything. But they have their limits...
Views: 20882 Explanimator
The Math Needed for Computer Science (Part 2) | Number Theory and Cryptography
 
08:08
If you missed part 1: https://www.youtube.com/watch?v=eSFA1Fp8jcU ►Support the Channel Patreon: https://patreon.com/majorprep PayPal: https://www.paypal.me/majorprep Join Facebook Group: https://www.facebook.com/groups/majorprep/ Follow MajorPrep on Twitter: https://twitter.com/MajorPrep1 ►Check out the MajorPrep Amazon Store: https://www.amazon.com/shop/majorprep *************************************************** ► For more information on math, science, and engineering majors, check us out at https://majorprep.com Best Ways to Contact Me: Facebook, twitter, or email ([email protected])
Views: 45119 MajorPrep
Chapter 4, part 3, Information Security: Principles and Practice
 
08:52
Information Security: Principles and Practice, 2nd edition, by Mark Stamp Chapter 4: Public Key Crypto Section 4.2, knapsack
Views: 6376 Mark Stamp
Blockchain tutorial 9: Discrete logarithm
 
06:26
This is part 9 of the Blockchain tutorial explaining what discrete logarithms are. In this video series different topics will be explained which will help you to understand blockchain. Bitcoin released as open source software in 2009 is a cryptocurrency invented by Satoshi Nakamoto (unidentified person or group of persons). After the introduction of Bitcoin many Bitcoin alternatives were created. These alternate cryptocurrencies are called Altcoins (Litecoin, Dodgecoin etc). Bitcoin's underlying technology is called Blockchain. The Blockchain is a distributed decentralized incorruptible database (ledger) that records blocks of digital information. Each block contains a timestamp and a link to a previous block. Soon people realises that there many other use cases where the Blockchain technology can be applied and not just as a cryptocurrency application. New Blockchain platforms were created based on the Blockchain technology, one of which is called Ethereum. Ethereum focuses on running programming code, called smart contracts, on any decentralized application. Using the new Blockchain platforms, Blockchain technology can be used in supply chain management, healthcare, real estate, identity management, voting, internet of things, etcetera, just to name a few. Today there is a growing interest in Blockchain not only in the financial sector but also in other sectors. Explaining how Blockchain works is not easy and for many the Blockchain technology remains an elusive concept. This video series tries to explain Blockchain to a large audience but from the bottom up. Keywords often used in Blockchain conversation will be explained. Each Blockchain video is short and to the point. It is recommended to watch each video sequentially as I may refer to certain Blockchain topics explained earlier. Check out all my other Blockchain tutorial videos https://goo.gl/aMTFHU Subscribe to my YouTube channel https://goo.gl/61NFzK The presentation used in this video tutorial can be found at: http://www.mobilefish.com/developer/blockchain/blockchain_quickguide_tutorial.html #mobilefish #blockchain #bitcoin #cryptocurrency #ethereum
Views: 15261 Mobilefish.com
Cryptography Lesson #1 - Block Ciphers
 
04:17
This tutorial video will help provide an understanding of what block ciphers are, and how they are used in the field of cryptography.
Views: 134716 Ryan Kral
What are security issues in Cryptography
 
08:58
www.hiteshChoudhary.com www.newdemy.com What are security issues in Cryptography? Why there is a need of Cryptography is a very important question. In the earlier times when one need to transfer any sensitive information, one can write it on paper and can seal it along with manual monitoring system i.e. one person guarding or protecting the information. But after the invention of radio, things got changed. One can tune into your radio without your knowledge and can collect all information. Just collecting the information is not a bug issue but one can modify the information as well. Information security attack is a broad term, so let’s make a few scenario examples to clarify it out on a broad level. Case 1 User A wants to transmit a file to user B. The file may contain some sensitive information like Bank passwords. User C, who is not authorized to read the file, is somehow monitor the transfer and captures a copy of the file during transmission. Case 2 User A wants to transmit a file to user B. User A gives some bank details to open and close new accounts. User C, intercepts the file and add User C’s information to be added and gets a new unauthorized bank account. User C can also delete some valid account information by altering the information. User B updates the details according to information passed by User A, having no idea that information was tempered on its way. Case 3 User A is just relaxing in this case. User C, who is an unauthorized person, just creates his own message and act as a User A and passes the information to User B. User B accepts the message and act according the message. It is totally up to User C that what he wants to do. User C can format all the information or add some backdoor information in the system and so on. Case 4 User C works for the company and due to some reasons C was fires from the company. User A asks the User B, who is an administrator in the company to lock all the access of User C’s account. But User C, creates some useless traffic and delays the message to reach to user B. User c makes a final access to the account and downloads the entire information to local or permanent access. After completing the work he allows the message to get passed. Case 5 A message is sent from user A to user B to purchase xyz share or xyz amount. Things didn’t went in right direction for User A and investment lose value. Now user A denies that he ever passed any message to user B to purchase any share. These are some of the broadly covered situations explaining the need of cryptography. Cryptography gives us a solution to all of these problems. We just have to utilize the concept and put it in some form of codes or protocols to implement it.
Views: 2304 Hitesh Choudhary
Hashing Algorithms and Security - Computerphile
 
08:12
Audible free book: http://www.audible.com/computerphile Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing? Tom Scott hashes it out. More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Pigeon Sound Effects courtesy of http://www.freesfx.co.uk/ Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 753476 Computerphile
Mining Bitcoin with pencil and paper
 
07:52
Bitcoins are mined using a cryptographic algorithm called SHA-256. This algorithm is simple enough to be done with pencil and paper, as I show in this video. Not surprisingly, this is a thoroughly impractical way to mine. One round of the algorithm takes 16 minutes, 45 seconds which works out to a hash rate of 0.67 hashes per day. For details, see http://righto.com/sha
Views: 1186982 Ken Shirriff
RSA Algorithm With Example
 
10:27
Views: 108592 B Hariharan
Meet in the Middle Algorithm
 
19:12
This tutorial talks about the Meet in the Middle algorithm used in competitive programming. It brings down the time complexity of a problem from O(a^b) to O(a^(b/2)). The example problems for finding elements in an array and 0-1 Knapsack are shown to be solved using Meet in the Middle.
Views: 7885 Gaurav Sen
Extended Euclidean Algorithm and Inverse Modulo Tutorial
 
06:00
Using EA and EEA to solve inverse mod.
Views: 381774 Emily Jane
What is Modular Arithmetic - Introduction to Modular Arithmetic - Cryptography - Lesson 2
 
04:48
Modular Arithmetic is a fundamental component of cryptography. In this video, I explain the basics of modular arithmetic with a few simple examples. Learn Math Tutorials Bookstore http://amzn.to/1HdY8vm Donate - http://bit.ly/19AHMvX
Views: 148496 Learn Math Tutorials
The Chinese Remainder Theorem made easy
 
07:20
A solution to a typical exam question. See my other videos https://www.youtube.com/channel/UCmtelDcX6c-xSTyX6btx0Cw/.
Views: 282357 Randell Heyman
Practice-Driven Cryptographic Theory
 
01:13:32
Cryptographic standards abound: TLS, SSH, IPSec, XML Encryption, PKCS, and so many more. In theory the cryptographic schemes used within these standards solve well understood problems, yet a parade of damaging attacks leave us with the question: What gives? Theoreticians often suggest (at least in private) that the problems are well-understood and attacks arise because standardizers misunderstand cryptographic theory. I'll use some of my recent work which uses provable-security techniques to analyze important standards (including TLS, HMAC, and PKCS#5) to argue that, just as often, it is the theoreticians who don't have all the answers: analyzing practically-useful cryptography requires pushing models and proof techniques in never-before-considered directions. We'll see how (what I'll call) practice-driven cryptographic theory can lead to new understanding and improved confidence in cryptographic practice. This talk will cover joint work with Mihir Bellare, Scott Coull, Yevgeniy Dodis, Kevin Dyer, Kenneth Paterson, Thomas Shrimpton, John Steinberger, and Stefano Tessaro.
Views: 139 Microsoft Research
Can you solve the passcode riddle? - Ganesh Pai
 
04:08
View full lesson: http://ed.ted.com/lessons/can-you-solve-the-passcode-riddle-ganesh-pai In a dystopian world, your resistance group is humanity’s last hope. Unfortunately, you’ve all been captured by the tyrannical rulers and brought to the ancient coliseum for their deadly entertainment. Will you be able to solve the passcode riddle and get everyone out safely? Ganesh Pai shows how. Lesson by Ganesh Pai, animation by Jun Zee Myers.
Views: 5841054 TED-Ed
P vs. NP and the Computational Complexity Zoo
 
10:44
Hackerdashery #2 Inspired by the Complexity Zoo wiki: https://complexityzoo.uwaterloo.ca/Complexity_Zoo For more advanced reading, I highly recommend Scott Aaronson's blog, Shtetl-Optimized: http://www.scottaaronson.com/blog/ ----- Retro-fabulous, cabinet-sized computers: System/360: http://en.wikipedia.org/wiki/IBM_System/360 photo: "360-91-panel". Licensed under Public domain via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:360-91-panel.jpg#mediaviewer/File:360-91-panel.jpg PDP-8: http://en.wikipedia.org/wiki/PDP-8 photo: "PDP-8". Licensed under Public domain via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:PDP-8.jpg#mediaviewer/File:PDP-8.jpg ----- Protein folding illustration: "Protein folding schematic" by Tomixdf (talk) - Own work (Original text: “self-made”). Licensed under Public domain via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:Protein_folding_schematic.png#mediaviewer/File:Protein_folding_schematic.png P vs. NP opinion poll: http://www.cs.umd.edu/~gasarch/papers/poll2012.pdf
Views: 1718014 hackerdashery
Knapsack Problem In Cryptography | Knapsack Public Key Encyption
 
13:38
In this video you will learn how to solve knapsack problem in cryptography .. encrytion and decryption of any letter using ASCII value and convert them into binary .. which will make hard of any intruder to decrypt the message Please subscribe and like video . Thanks Visit Our Channel :- https://www.youtube.com/channel/UCxik... In this lecture we have taught about Knapsack Public Key Cryptography and how to solve it with example. Follow Smit Kadvani on :- Facebook :- https://www.facebook.com/smit.kadvani Instagram :- https://www.instagram.com/the_smit0507 Follow Dhruvan Tanna on :- Facebook :- https://www.facebook.com/dhruvan.tanna1 Instagram :- https://www.instagram.com/dhru1_tanna Follow Keyur Thakkar on :- Facebook :- https://www.facebook.com/keyur.thakka... Instagram :- https://www.instagram.com/keyur_1982 Snapchat :- keyur1610 Follow Ankit Soni on:- Instagram :- https://www.instagram.com/ankit_soni1511
Views: 9904 Quick Trixx
Turing's Enigma Problem (Part 1) - Computerphile
 
19:00
The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII. Professor Brailsford takes us through just what Turing and his team were up against. Engima Part 2: http://youtu.be/kj_7Jc1mS9k Professor Brailsford's notes: http://bit.ly/enigmapart2 158,962,555,217,826,360,000 – Numberphile: http://youtu.be/G2_Q9FoD-oQ Flaw in the Enigma Code - Numberphile: http://youtu.be/V4V2bpZlqx8 Punch Card Programming: http://youtu.be/KG2M4ttzBnY Public Key Cryptography: http://youtu.be/GSIDS_lvRv4 http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 564358 Computerphile
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
 
34:11
This Algorithm is used to exchange the secret /symmetric key between sender and receiver. This exchange of key can be done with the help of public key and private key step 1 Assume prime number p step 2 Select a such that a is primitive root of p and a less than p step 3 Assume XA private key of user A step 4 Calculate YA public key of user A with the help of formula step 5 Assume XB private key of user B step 6 Calculate YB public key of user B with the help of formula step 7 Generate K secret Key using YB and XA with the help of formula at Sender side. step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.
Birthday probability problem | Probability and Statistics | Khan Academy
 
13:17
The probability that at least 2 people in a room of 30 share the same birthday. Practice this lesson yourself on KhanAcademy.org right now: https://www.khanacademy.org/math/probability/probability-and-combinatorics-topic/probability_combinatorics/e/probability_with_perm_comb?utm_source=YT&utm_medium=Desc&utm_campaign=ProbabilityandStatistics Watch the next lesson: https://www.khanacademy.org/math/probability/probability-and-combinatorics-topic/decisions-with-probability/v/simple-hypothesis-testing?utm_source=YT&utm_medium=Desc&utm_campaign=ProbabilityandStatistics Missed the previous lesson? https://www.khanacademy.org/math/probability/probability-and-combinatorics-topic/probability_combinatorics/v/bayes-theorem-visualized?utm_source=YT&utm_medium=Desc&utm_campaign=ProbabilityandStatistics Probability and statistics on Khan Academy: We dare you to go through a day in which you never consider or use probability. Did you check the weather forecast? Busted! Did you decide to go through the drive through lane vs walk in? Busted again! We are constantly creating hypotheses, making predictions, testing, and analyzing. Our lives are full of probabilities! Statistics is related to probability because much of the data we use when determining probable outcomes comes from our understanding of statistics. In these tutorials, we will cover a range of topics, some which include: independent events, dependent probability, combinatorics, hypothesis testing, descriptive statistics, random variables, probability distributions, regression, and inferential statistics. So buckle up and hop on for a wild ride. We bet you're going to be challenged AND love it! About Khan Academy: Khan Academy offers practice exercises, instructional videos, and a personalized learning dashboard that empower learners to study at their own pace in and outside of the classroom. We tackle math, science, computer programming, history, art history, economics, and more. Our math missions guide learners from kindergarten to calculus using state-of-the-art, adaptive technology that identifies strengths and learning gaps. We've also partnered with institutions like NASA, The Museum of Modern Art, The California Academy of Sciences, and MIT to offer specialized content. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to KhanAcademy’s Probability and Statistics channel: https://www.youtube.com/channel/UCRXuOXLW3LcQLWvxbZiIZ0w?sub_confirmation=1 Subscribe to KhanAcademy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 426278 Khan Academy
Cicada 3301 (All Clues and How They Were Solved)
 
15:07
Want to know more about PGP encryption? Here's the video I used https://www.youtube.com/watch?v=3yN4uMMsK8I Songs: 00:40 song {Halsey - Haunting (Official Instrumental) https://www.youtube.com/watch?v=eT6VVntT8lo Piano cover by cragezy https://www.youtube.com/watch?v=4AxBYR11MG8 As not stated, the video is not entirely accurate (i.e notes shown were drawn up for clearity). Please refrain from pointing out the flaws when the majority of the video is correct. Douche Clues Clue 1: 0:00 Clue 2: 1:22 Clue 3: 1:48 Clue 4: 2:00 Clue 5: 5:50 Clue 6: 6:45 Clue 7: 8:22 Clue 8: 10:11 Clue 9: 11:05 Clue 10: 13:08
Views: 3472867 TheBraveZombies
Chinese Remainder Theorem - 2 (Solve Example) Cryptography and Network security in Hindi.
 
18:21
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Dealing Cards with Cryptography (with Ron Rivest) - Numberphile
 
11:25
More Ron Rivest videos: http://bit.ly/RonRivest Cryptography playlist: http://bit.ly/crypto_videos More links & stuff in full description below ↓↓↓ Ron Rivest: http://people.csail.mit.edu/rivest/ Computerphile: https://www.youtube.com/user/computerphile Numberphile is supported by the Mathematical Sciences Research Institute (MSRI): http://bit.ly/MSRINumberphile We are also supported by Science Sandbox, a Simons Foundation initiative dedicated to engaging everyone with the process of science. https://www.simonsfoundation.org/outreach/science-sandbox/ And support from Math For America - https://www.mathforamerica.org/ NUMBERPHILE Website: http://www.numberphile.com/ Numberphile on Facebook: http://www.facebook.com/numberphile Numberphile tweets: https://twitter.com/numberphile Subscribe: http://bit.ly/Numberphile_Sub Videos by Brady Haran Patreon: http://www.patreon.com/numberphile Brady's videos subreddit: http://www.reddit.com/r/BradyHaran/ Brady's latest videos across all channels: http://www.bradyharanblog.com/ Sign up for (occasional) emails: http://eepurl.com/YdjL9
Views: 145299 Numberphile
Programming Problem #3 - Geneva Confection (Intermidiate)
 
16:47
Programming Problems & Solutions #3! Welcome back to another weekly programming problem. For today's problem I have chosen to pick something from the university of Waterloo website. I really enjoyed this problem when I came across it and I found it very interesting and good practice! It allows you to use critical thinking to first start to understand the problem before you attempt a solution which is very important as we move into more difficult problems. Think you have a better solution than me? Leave a comment down below with it or a link to it and I will be sure to check it out and shout you out in my next video! My Solutions: https://goo.gl/eKWNzR Want To Support This Channel? Bitcoin: 1PbkAYLFaJBgjbKn2ptGyBz65xWN8hJgBU Ethereum: 0xdd42dbbdba60f7163fc7a840e189474b6e8bfcad Ripple: rD4arM9CVjQWqi8f1kxdpCgkCgEkqBgtud Please leave a LIKE and SUBSCRIBE for more content! Tags: - Tech - Tech With Tim - Crypto - Programming - Coding - Pygame - Python Tutorials - Solving Problems - Coding Problems - Think like a computer scientest - Programming Problems for Begginers - Programming Problems and Solutions - Programming Problems - Train your brain
Views: 156 Tech With Tim
Intro to Security CTFs for Beginners - Website Security Tutorial
 
28:23
Security CTFs? What are those? They are competitions with security challenges so that you can go out and practice your security skills! This video is a beginner tutorial for some easy and fun web security challenges! Find all 6 keys. Leave a comment on what keys you've found: http://ctf.slothparadise.com Allan Wirth developed these web security drills. Be sure to drop him a tweet because it's awesome that he developed these intro web security drills for everyone! https://twitter.com/Allan_Wirth Check out the source code after you have found all the keys: https://github.com/allanlw/builds-hackme Do you want to compete in security CTFs? Check out the upcoming security CTFs here and register for one: https://ctftime.org/event/list/upcoming Intro to CTFs (video at the beginning): https://www.youtube.com/watch?v=bxt-JidP3bU EditThisCookie: https://chrome.google.com/webstore/detail/editthiscookie/fngmhnnpilhplaeedifhccceomclgfbg?hl=en First Key: 1:34 Second Key: 3:27 Third Key: 4:27 Fourth Key: 11:22 Fifth Key: 23:17 Sixth Key: 26:12 Intro to Crypto: https://www.youtube.com/watch?v=SUNaFniXYpA Songs used: https://soundcloud.com/aivisura/steven-universe-connie-piano-demo https://soundcloud.com/jafunkofficial/jafunk-this-thing-1 https://www.youtube.com/watch?v=8avMLHvLwRQ Outro song: https://www.youtube.com/watch?v=ptu5ldfr3WA Twitter: https://twitter.com/microwavesam Blog: http://slothparadise.com Consider supporting our group in making stuff: ►https://www.patreon.com/slothparadise ►Twitter: https://twitter.com/slothparadise
Views: 53729 MicrowaveSam
Elliptic Curves - Computerphile
 
08:42
Just what are elliptic curves and why use a graph shape in cryptography? Dr Mike Pound explains. Mike's myriad Diffie-Hellman videos: https://www.youtube.com/playlist?list=PLzH6n4zXuckpoaxDKOOV26yhgoY2S-xYg https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 162125 Computerphile
NETWORK SECURITY - RSA ALGORITHM
 
23:04
RSA Algorithm is the example for Public Key Encryption algorithm. Here we are supposed to find two keys 1) Public Key which is used at encryption 2) Private Key which is used at decryption step 1: Select two large Primes P , Q Step 2: Calculate n=P*Q & O(n) = (P-1)*(Q-1) Step 3: Assume e and d (Public and Private Key). Step 4: Encrypt the Plain Text using Public Key e. Step 5: Decrypt the Cipher Text using Private Key d.
AES - 2 Advanced Encryption Standard Sub Byte, Shift Row, Mix Col cryptography [HINDI]
 
05:52
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Cryptography: Crash Course Computer Science #33
 
12:33
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure. Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4 Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids
Views: 205037 CrashCourse
Crypto (RSA 2)  CTF | Amrita Inctf Challenges | Solved By Python | Easy CTF Writeups..
 
05:56
Here I've Solved the Challenge from Crypto (RSA intro). The challange was Quick I Welcome Suggestions
Views: 87 Satyam Gupta
158,962,555,217,826,360,000 (Enigma Machine) - Numberphile
 
11:52
The Nazi's Enigma Machine - and the mathematics behind it - was a crucial part of World War II. Flaw video at: http://www.youtube.com/watch?v=V4V2bpZlqx8 More links & stuff in full description below ↓↓↓ Brown papers on ebay: bit.ly/brownpapers Dr James Grime demonstrates the machine and discusses its many configurations. James' "day job" is touring with the Enigma machine - he could even visit you - see more at http://enigma.maths.org/content/project-officer NUMBERPHILE Website: http://www.numberphile.com/ Numberphile on Facebook: http://www.facebook.com/numberphile Numberphile tweets: https://twitter.com/numberphile Subscribe: http://bit.ly/Numberphile_Sub Videos by Brady Haran Patreon: http://www.patreon.com/numberphile Brady's videos subreddit: http://www.reddit.com/r/BradyHaran/ Brady's latest videos across all channels: http://www.bradyharanblog.com/ Sign up for (occasional) emails: http://eepurl.com/YdjL9 Numberphile T-Shirts: https://teespring.com/stores/numberphile Other merchandise: https://store.dftba.com/collections/numberphile
Views: 3615222 Numberphile
Playfair Cipher Explained
 
04:20
An animated attempt of explaining the Playfair cipher. This tutorial includes rules of the cipher followed by an example to clear things up. This was a part of my final year project to create a learning aid. I decided to upload this so the animation won't go to waste. All feedbacks welcome. Special thanks to Olivia Beck for creating the background image
Views: 174987 Kenny Luminko
SHA: Secure Hashing Algorithm - Computerphile
 
10:21
Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash strings. EXTRA BITS: https://youtu.be/f8ZP_1K2Y-U Tom Scott on Hash Algorithms: https://youtu.be/b4b8ktEV4Bg http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 452673 Computerphile
IOT Chain (ITC) Crypto Project Review | $4000+ Contest?? (WATCH TILL THE END)
 
07:23
In this video I`m reviewing a crypto project called IOT Chain (ITC) to see what they are about, what problems they want to solve and how they want to do it, the reason why we review those projects is to help you get a better understanding of the project before putting your money down on it. IOT Chain (ITC) Website: https://iotchain.io/ Get Involved with the contest this week: https://medium.com/iot-chain/announcing-the-iot-chain-video-contest-6e9c8f950dab IOT Chain (ITC) Medium: https://medium.com/@IoT_Chain/latest Get $10 of Bitcoin When You Deposit $100 Here: https://www.coinbase.com/join/5953707... Sign up to BINANCE to buy some HOT Altcoins here: https://www.binance.com/?ref=13017853 Donate Here: Bitcoin - 151cHP2Zoh8fhxZ8JytYWsjaN2HrNQZPT1 Ethereum - 0xf66ec38d8413ff76babff4a1e5568983ae0c38b7
Views: 8467 DOMSCRYPTO
Deffie hellman key exchange algorithm in cryptography and network security in hindi.
 
15:58
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Ep. 5 – Yao's Millionaire Problem, Where to Study Cryptography and more | Ask the Professor
 
02:39
In this episode of 'Ask the Professor," Prof. Nigel Smart talks about Yao's Millionaire Problem (how to reveal who is the richest millionaire w/out revealing how much money they actually have), in the case of two or more parties. Additionally, what do you do if the message is longer than the keystream? And finally, how and when should one study cryptography? Prof. Nigel Smart gives us all the details! In the 'Ask the Professor' video series, Professor Nigel Smart, a world-renowned expert in applied cryptography, and professor at the COSIC group at the KU Leuven was Vice President of the International Association for Cryptologic Research and a fellow of the IACR. Prof. Smart answers the internet's' most interesting questions about cryptography. Based on questions from popular blogs, forums, and social media—this series is relevant for both beginners and advanced crypto enthusiasts alike. Based on questions from popular blogs, forums, and social media—this series is relevant for both beginners and advanced crypto enthusiasts alike. Brought to you by Unbound Tech (https://www.unboundtech.com). Unbound applies revolutionary breakthroughs in mathematics to allow secrets to be used without ever being exposed, thus ensuring digital assets are safe – anytime, anywhere. Reinventing the future of security and privacy, Unbound enables business to deliver a new world of digital products and services with unprecedented speed and scale which were previously beyond reach. At the heart of Unbound, formerly known as Dyadic, lie sophisticated applications of Multi-Party Computation (MPC), developed by Unbound’s co-founders, Professor Yehuda Lindell and Professor Nigel Smart, world-renowned cryptographers.
Views: 679 Unbound Tech
Perfect Cipher Solution - Applied Cryptography
 
01:21
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3031 Udacity
WHY ETHEREUM 1.0 FAILED? Programmer explains
 
29:38
What everyone hopes for right now is that Ethereum 2.0 will save Ethereum with Casper, Sharding and Plasma. HOWEVER, Ethereum 1.0 is very innovative on its own. The wrong assumption would be to blame the entire situation on scalability issues. After all, Bitcoin is not really scalable either, yet it is a wild success. Let's discuss the real reasons... Stake.com - place a bet and start winning just like everyone else - https://goo.gl/hYP7BK https://medium.com/@noahruderman/why-ethereum-1-0-failed-and-bitcoin-succeeded-72e9594b9789 https://www.coinbureau.com/analysis/solving-blockchain-trilemma/ Unfortunately, Resistance excluded the US from the contest :( it sucks, sorry guys ❤️ RULES TO WIN LEDGER NANO S: 1) Comment what you have learned or bring a new perspective. 2) Sign up here: https://toshitimes.com/resistance-ledger-nano-s/ 3) Join Telegram channel https://t.me/joinchat/AAAAAE2xJE4l8xhC8MU4cg GET FULL ACCESS TO THE ACADEMY: https://academy.ivanontech.com LET’S MEET IN NEW YORK: https://www.facebook.com/events/452734075131412/ 💰 GET $10 TO BUY YOUR FIRST CRYPTO: https://www.coinbase.com/join/59d1738ff36136022bd9ee10 🏆 BUY PHYSICAL BULLION GOLD: http://www.bullionvaultaffiliate.com/ivanli/en 📈 BEST ALTCOIN EXCHANGE: https://www.binance.com/en?ref=35933746 🔐 BEST WALLET: https://www.ledger.com?r=5a56aa023b40&tracker=IOT Good Morning Crypto 🎓 LEARN SMART CONTRACT PROGRAMMING http://coding.ivanontech.com 🎓 Join my online academy https://academy.ivanontech.com 👬 Join the crypto discussion forum - https://forum.toshitimes.com 📣 Join Telegram channel https://t.me/joinchat/AAAAAE2xJE4l8xhC8MU4cg 🎤 If you would like me to speak at your conference, book me here: https://ivanontech.com #bitcoin #blockchain #ivanontech 👫👭👬Social: LinkedIn: http://linkedin.com/in/ivanliljeqvist/ Instagram: http://instagram.com/ivanontech/ Steemit: https://steemit.com/@ivanli Facebook: http://facebook.com/ivanontech/ Exclusive email list: http://eepurl.com/c0hyc9 DISCLAIMER: This is NOT financial advice. This is just my opinions. I am not responsible for any investment decisions that you choose to make. Ivan on Tech is all about cryptocurrencies and the technology behind Bitcoin, Ethereum, Litecoin, Ripple, IOTA. We also cover Bitcoin price, altcoin price, investing, analytics, different altcoins. Ivan on Tech by Ivan Liljeqvist
Views: 11236 Ivan on Tech
Lecture 15: Elgamal Encryption Scheme by Christof Paar
 
01:17:51
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com
RUFF CHAIN (RUFF) Crypto Project Review | TOP IoT Ecosystem?
 
09:55
In this video I`m reviewing a crypto project called RUFF CHAIN (RUFF) to see what they are about, what problems they want to solve and how they want to do it, the reason why we review those projects is to help you get a better understanding of the project before putting your money down on it. RUFF CHAIN (RUFF) : Twitter: https://twitter.com/Ruff_Chain Facebook: https://www.facebook.com/RuffChainProject/ Telegram:https://t.me/ruffchain Medium https://medium.com/@ruffchain Reddit https://www.reddit.com/r/ruffchain/ PRESS RELEASE : https://www.ccn.com/ruff-founder-roy-li-show-on-live-streaming-in-the-youtube-huobi-talk/ Get $10 of Bitcoin When You Deposit $100 Here: https://www.coinbase.com/join/5953707305fcbc094f04716b Sign up to BINANCE to buy some HOT Altcoins here: https://www.binance.com/?ref=13017853 Donate Here: Bitcoin - 151cHP2Zoh8fhxZ8JytYWsjaN2HrNQZPT1 Ethereum - 0xf66ec38d8413ff76babff4a1e5568983ae0c38b7
Views: 9011 DOMSCRYPTO
C/C++ Cryptography — XOR Encryption | Simple encryption Algorithm
 
01:30
simple program that uses xor encryption algorithm to encrypt a string. • Support me on Patreon: http://www.patreon.com/Zer0Mem0ry • Donate Bitcoin: 1JhSKGgRQmir8rRF4Sm5CP4fDDofKFAypd • Facebook: https://www.facebook.com/Zer0Mem0ry • Twitter: https://www.twitter.com/Zer0Mem0ry
Views: 15062 Zer0Mem0ry
INTERNET CENSORSHIP - The Only Solution...
 
21:30
Social media and the Internet as a whole is facing huge problems. Today we discuss why Blockchain and crypto is the only solution. Good morning and tune in! https://mastodon.social/about https://memo.cash/ https://steemit.com/ https://mashable.com/2017/04/05/mastodon-wont-survive/?europe=true#pPakaiZXraqj 🎓 BECOME BLOCKCHAIN BUSINESS LEADER http://business.ivanontech.com SIGN UP FOR YOUTUBE NOTIFICATIONS: http://eepurl.com/dADBVj Thanks for watching guys 💝 JOIN VIP Facebook Group: https://www.facebook.com/groups/154642935214122/?source=create_flow 🎓 LEARN ALL ABOUT BLOCKCHAIN BUSINESS http://business.ivanontech.com 🎓 LEARN SMART CONTRACT PROGRAMMING http://coding.ivanontech.com 🎓 Join my online academy https://academy.ivanontech.com 👬 Join the crypto discussion forum - https://forum.toshitimes.com 📣 Join Telegram channel https://t.me/joinchat/AAAAAE2xJE4l8xhC8MU4cg 🎤 If you would like me to speak at your conference, book me here: https://ivanontech.com #bitcoin #blockchain #ivanontech 👫👭👬Social: LinkedIn: http://linkedin.com/in/ivanliljeqvist/ Instagram: http://instagram.com/ivanontech/ Steemit: https://steemit.com/@ivanli Facebook: http://facebook.com/ivanontech/ Exclusive email list: http://eepurl.com/c0hyc9 💰 Secure your Crypto with Hardware Wallets: Ledger: https://www.ledgerwallet.com/r/4607 Trezor: https://trezor.io/?a=rvj3rqtje3ph DISCLAIMER: This is NOT financial advice. This is just my opinions. I am not responsible for any investment decisions that you choose to make. Ivan on Tech is all about cryptocurrencies and the technology behind Bitcoin, Ethereum, Litecoin, Ripple, IOTA. We also cover Bitcoin price, altcoin price, investing, analytics, different altcoins. Ivan on Tech by Ivan Liljeqvist
Views: 7531 Ivan on Tech
Kerberos, Introduction and working of Kerberos with block diagram in cryptography  in हिंदी
 
19:37
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ======================================================Parallel computing lecture (Programmer) - https://www.youtube.com/channel/UCqkKeYuYOpYKGV8oCTSJRAQ/playlists ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ c programming - https://www.youtube.com/playlist?list=PLCZJSEiJwWZ6nY1vuEAG8Ut2S4_E0X36G ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Litecoin Halvening, Twitter's Jack Dorsey on BTC, Venezuela Crisis and Bitcoin - Crypto News
 
13:43
Joe Rogan and Jack Dorsey recently shared their opinions on bitcoin on the Joe Rogan Podcast. The price of Litecoin is also outperforming other top cryptos and Mattie will tell you what that is. He also talks about Venezuela's new crypto regulations. ----------------------------------------------------------------------------------- CHECK OUT OUR PODCAST: https://bit.ly/2sZCAiF New episode every Monday and Friday! ----------------------------------------------------------------------------------- Check out Altcoin Buzz Ladies! https://www.youtube.com/channel/UCxulvI2C9wUvvDDNS7S35fA/videos ---------------------------------------------------------------------------------- Connect with us on Social Media: Twitter: https://bit.ly/2GDAoCp Facebook: https://bit.ly/2wYksLB Telegram: https://bit.ly/2IAqDuI ---------------------------------------------------------------------------------- Looking for the best cryptocurrency wallets? Check these out: BitLox: https://bit.ly/2rWQnHa CoolWallet S: https://bit.ly/2Liy5bv Trezor: https://bit.ly/2IXrZic Ledger Nano S: https://bit.ly/2IyE3al KeepKey: https://bit.ly/2x5TlhM Read about them here: https://bit.ly/2rTdthZ --------------------------------------------------------------------------------- References: Joe Rogan Experience with Jack Dorsey [Time Stamped to the conversation about Bitcoin] https://youtu.be/_mP9OmOFxc4?t=6357 https://www.altcoinbuzz.io/crypto-news/blockchain-technology/twitter-ceo-jack-dorsey-believes-in-bitcoin-as-native-internet-currency/ https://dailyhodl.com/2019/02/03/watch-joe-rogan-and-twitter-ceo-jack-dorsey-free-speech-bitcoin-and-tech-innovation/ https://cointelegraph.com/news/twitter-ceo-jack-dorsey-still-believes-bitcoin-will-be-internets-currency https://www.ccn.com/twitter-bitcoin-binance-credit-cards-week-crypto Litecoin Halvening https://www.litecoinblockhalf.com https://ambcrypto.com/litecoin-ltc-community-looks-forward-to-surge-in-prices-after-implementation-of-halving-in-186-days https://www.newsbtc.com/2019/02/02/analyst-upcoming-litecoin-halving-could-ultimately-send-ltc-surging https://blokt.com/technical-analysis/litecoin-ltc-price-outperforms-other-top-cryptocurrencies-this-week https://ethereumworldnews.com/bitcoin-halving-trigger-price-growth-prominent-trader [OLD ARTICLE] https://bitcoinexchangeguide.com/litecoins-charlie-lee-says-2020s-block-halving-of-btc-and-ltc-wont-affect-their-prices https://coingape.com/sentimental-analysis-for-cryptocurrencies-february-03 https://cointelegraph.com/news/top-5-crypto-performers-overview-litecoin-binance-coin-ripple-bitcoin-tron New Cryptocurrency Rules in Venezuela https://news.bitcoin.com/venezuelas-cryptocurrency-rules https://bitcoinist.com/venezuela-bitcoin-trading-new-regulations Altcoin Buzz coverage of various perspectives of the Crypto Industry at the Binance Fair https://twitter.com/Altcoinbuzzio/status/1092104520350363649 https://youtu.be/qRpT2_rzK2M -------------------------------------------------------------------------------- DISCLAIMER The information discussed on the Altcoin Buzz YouTube, Altcoin Buzz Ladies YouTube, Altcoin Buzz Podcast or other social media channels including but not limited to Twitter, Telegram chats, Instagram, facebook, website etc is not financial advice. This information is for educational, informational and entertainment purposes only. Any information and advice or investment strategies are thoughts and opinions only, relevant to accepted levels of risk tolerance of the writer, reviewer or narrator and their risk tolerance maybe different than yours. We are not responsible for your losses. Bitcoin and other cryptocurrencies are high-risk investments so please do your due diligence and consult the financial advisor before acting on any information provided. Copyright Altcoin Buzz Pte Ltd. All rights reserved.
Views: 4012 Altcoin Buzz
JW Weatherman – Crypto-Anarchist and Creator of Mathbot.com
 
01:07:48
Please enjoy my recent conversation with JW Weatherman, creator of MathBot.com. Herein we discussed the importance of programming, socialization myth, spectacularly evil government math, government school like a sausage factory, best way to teach kids math, incentives for learning, chess is problem solving, obsolete professions, the power of computer programming, his path to being a cypher punk/crypto-anarchist, Ludwig Von Mises, Murray Rothbard, why did he create MathBot, make human sacrifice great again, financial incentive, Bitcoin changes everything and more! “Whatever you do to the least of my brothers you do unto me.” Jesus Christ, King James version The Conscious Resistance Network is an independent media organization focused on empowering individuals through education, philosophy, health, and community organizing. We work to create a world where corporate and state power does not rule over the lives of free human beings. Find more videos like this at: www.theconsciousresistance.com Our work is supported by SmartCash, the business focused, user-friendly & decentralized crypto-currency. www.smartcash.cc Support our work: Patreon.com/DerrickBroze
Windows Form - (Cryptography) Encryption and Decryption in c# [Hindi\Urdu]
 
20:35
In this video you can learn Cryptography (how to encrypt and decrypt data in windows form) in hindi/urdu. This c# tutorials series helps for beginner to clear basics concept of the C# .NET programming Language. For more details visit our website http://www.safcode.com/ Here we explain very basic concept of C#. c# tutorials for beginner in hindi/urdu, how to encrypt and decrypt data in windows form, Cryptography in c#, Windows Form Cryptography, Windows Form Encrypt and Decrypt using c#, Encrption and Decryption in hindi/urdu, plain text convert to ciper text in c# See our Related Videos Like: Insert data into database https://www.youtube.com/watch?v=jL8RGGCXN-I Delete Data from Database https://www.youtube.com/watch?v=nqd6DU8ZzFQ Select Single Row from Database https://www.youtube.com/watch?v=8FR5TpqEmIQ safcode provide a platform where Students and IT Professionals discuss their problems with us and we try to help, give them a better solution and give new ideas for their projects. We can also help the students in their IT related FYP(Final Year Project). We have highly qualified and experienced trainers who can solve the problems of students and IT professionalist. We also teach online and give home tuitions with certifications, We offer quality educations and training in affordable prices for students to improve and polish their skills and make them market competent product. You can learn through our videos which is available on our Youtube channel which are very helpful for beginners. Youtube: https://www.youtube.com/channel/UCLEErpaPoOLnKbRBH6riJsw You are also like our facebook page for more updates Facebook: https://www.facebook.com/safcode3 For more details visit our website: http://safcode.com/
Views: 1586 Saf Code
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?
 
26:21
Bitcoin explained from the viewpoint of inventing your own cryptocurrency. Videos like these made possible by patreon: https://patreon.com/3blue1brown Protocol Labs: https://protocol.ai/ Interested in contributing? https://protocol.ai/join/ Special thanks to the following patrons: http://3b1b.co/btc-thanks Some people have asked if this channel accepts contributions in cryptocurrency form as an alternative to Patreon. As you might guess, the answer is yes :). Here are the relevant addresses: ETH: 0x88Fd7a2e9e0E616a5610B8BE5d5090DC6Bd55c25 BTC: 1DV4dhXEVhGELmDnRppADyMcyZgGHnCNJ BCH: qrr82t07zzq5uqgek422s8wwf953jj25c53lqctlnw LTC: LNPY2HEWv8igGckwKrYPbh9yD28XH3sm32 Supplement video: https://youtu.be/S9JGmA5_unY Music by Vincent Rubinetti: https://soundcloud.com/vincerubinetti/heartbeat Here are a few other resources I'd recommend: Original Bitcoin paper: https://bitcoin.org/bitcoin.pdf Block explorer: https://blockexplorer.com/ Blog post by Michael Nielsen: https://goo.gl/BW1RV3 (This is particularly good for understanding the details of what transactions look like, which is something this video did not cover) Video by CuriousInventor: https://youtu.be/Lx9zgZCMqXE Video by Anders Brownworth: https://youtu.be/_160oMzblY8 Ethereum white paper: https://goo.gl/XXZddT If you want to contribute translated subtitles or to help review those that have already been made by others and need approval, you can click the gear icon in the video and go to subtitles/cc, then "add subtitles/cc". I really appreciate those who do this, as it helps make the lessons accessible to more people. Music by Vince Rubinetti: https://vincerubinetti.bandcamp.com/album/the-music-of-3blue1brown ------------------ 3blue1brown is a channel about animating math, in all senses of the word animate. And you know the drill with YouTube, if you want to stay posted on new videos, subscribe, and click the bell to receive notifications (if you're into that). If you are new to this channel and want to see more, a good place to start is this playlist: http://3b1b.co/recommended Various social media stuffs: Website: https://www.3blue1brown.com Twitter: https://twitter.com/3Blue1Brown Patreon: https://patreon.com/3blue1brown Facebook: https://www.facebook.com/3blue1brown Reddit: https://www.reddit.com/r/3Blue1Brown
Views: 2425405 3Blue1Brown