个人资料图片
English
  • 全部
  • 搜索
  • 图片
  • 视频
    • 短视频
  • 地图
  • 资讯
  • 更多
    • 购物
    • 航班
    • 旅游
  • 笔记本
报告不当内容
请选择下列任一选项。
  • 时长
    全部短(小于 5 分钟)中(5-20 分钟)长(大于 20 分钟)
  • 日期
    全部过去 24 小时过去一周过去一个月去年
  • 清晰度
    全部低于 360p360p 或更高480p 或更高720p 或更高1080p 或更高
  • 源
    全部
    Dailymotion
    Vimeo
    Metacafe
    Hulu
    VEVO
    Myspace
    MTV
    CBS
    Fox
    CNN
    MSN
  • 价格
    全部免费付费
  • 清除筛选条件
  • 安全搜索:
  • 中等
    严格中等(默认)关闭
筛选器
Dimensions and Types of Attacks | Cryptography and Network Security | Module 1 BCS703 | VTU 22SCHEME
8:36
YouTubeExam Helper
Dimensions and Types of Attacks | Cryptography and Network Security | Module 1 BCS703 | VTU 22SCHEME
This video explains how cryptographic systems are classified along three independent dimensions and then introduces the main types of attacks on symmetric ciphers. First, it covers the two basic operations used in classical and modern ciphers: substitution (replacing elements) and transposition (rearranging elements), and why these operations ...
3 天之前
Ciphertext Decryption
Playfair Cipher (Part 2)
11:26
Playfair Cipher (Part 2)
YouTubeNeso Academy
已浏览 49.6万 次2021年6月8日
Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn
2:15:01
Cryptography Full Course | Cryptography And Network Security | Cryptography | Simplilearn
YouTubeSimplilearn
已浏览 27.5万 次2021年8月17日
Rail Fence Technique
6:46
Rail Fence Technique
YouTubeNeso Academy
已浏览 29.1万 次2021年7月24日
热门视频
Requirement for Secure Encryption | Cryptography & Network Security | Module 1 BCS703 | VTU 22SCHEME
5:11
Requirement for Secure Encryption | Cryptography & Network Security | Module 1 BCS703 | VTU 22SCHEME
YouTubeExam Helper
3 天之前
Project 107 - What Exactly Is Meterpreter and How Can It Best Be Used For Post Exploitation? (CTF)
30:12
Project 107 - What Exactly Is Meterpreter and How Can It Best Be Used For Post Exploitation? (CTF)
YouTubeDaryl Shows His Work
1 天前
Morse Code D #morsecode
0:04
Morse Code D #morsecode
YouTubeInformation Data Encyclopedi
23 小时之前
Ciphertext Encryption Methods
Cryptography – Key Terms
9:39
Cryptography – Key Terms
YouTubeNeso Academy
已浏览 18.7万 次2021年4月22日
Cryptanalysis
11:32
Cryptanalysis
YouTubeNeso Academy
已浏览 24.6万 次2021年4月27日
Encryption and public keys | Internet 101 | Computer Science | Khan Academy
6:40
Encryption and public keys | Internet 101 | Computer Science | Khan Academy
YouTubeKhan Academy
已浏览 46.5万 次2019年4月23日
Requirement for Secure Encryption | Cryptography & Network Security | Module 1 BCS703 | VTU 22SCHEME
5:11
Requirement for Secure Encryption | Cryptography & Network Security …
3 天之前
YouTubeExam Helper
Project 107 - What Exactly Is Meterpreter and How Can It Best Be Used For Post Exploitation? (CTF)
30:12
Project 107 - What Exactly Is Meterpreter and How Can It Best B…
1 天前
YouTubeDaryl Shows His Work
Morse Code D #morsecode
0:04
Morse Code D #morsecode
23 小时之前
YouTubeInformation Data Encyclopedia
观看更多视频
静态缩略图占位符
更多类似内容
反馈
  • 隐私
  • 条款