Oblivious Transfer Computerphile
Oblivious Transfer Computerphile Information Guide
Introduction of Oblivious Transfer Computerphile

Share part of a secret without knowing which part? Dr Tim Muller explains how This video is part of an online course, Applied Cryptography. the course here: The back door that may not be a back door... The suspicion about Dual_EC_DRBG - The Dual Elliptic Curve Deterministic ... Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ... Diffie Hellman has a flaw. Dr Mike Pound explains how a man in the middle could be a big problem, unless we factor it in... Public ... What goes on TOR stays on TOR, or so we hope. Dr Mike Pound takes us through how Onion Routing works. This video was ...
You don't just 'run a cipher' - you need a mode of operation. Dr Mike Pound explains some relative to the Feistel cipher. **This ... Many of us use Location Services & GPS on smartphones but Cell Phone Companies have been able to track us for a long time. The Port Smash exploits Hyperthreading and timings to work out what other programs are doing. Dr Steve Bagley looks at how. How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ... There's a reason Needham–Schroeder isn't used any more - Tim Muller demonstrates the weakness in the technique. Substitution-permutation networks are the basis for almost all modern symmetric cryptography. Dr Mike Pound explains.
Main Features

Why it's a bad idea to build a Virtual Private Network using TCP. Dr Steve Bagley on TCP over TCP... At the heart of Bzip2 is the Burrows Wheeler Transform. Dr Steve Bagley (and a live studio audience) explains how & why it works. End to end encryption, government ministers are again talking about stopping it. What is it and why might that be a bad idea? Security of users' passwords should be at the forefront of every web developer's mind. Tom takes us through the insecure ways in ... How do you pick a secure password that's memorable but truly random? Dr Mike Pound explains Diceware The Diceware ...
Developments

Deep Dive
Data is compiled from public records and verified media reports.
Last Updated: May 21, 2026
Final Thoughts

Disclaimer:











