Applied Cryptography: Diffie–Hellman Key Exchange - Part 1 Applied Cryptography: Diffie–Hellman Key Exchange - Part 1 begin-post-stats Leandro Junes • 1K views end-post-stats begin-duration 14:23 end-duration Math topics: _Prime_numbers_##Prime numbers##_Prime_number_##Prime number##_Exponentiation_##Exponentiation##_Largest_known_prime_number_##Largest known prime number##_Theoretical_computer_science_##Theoretical computer science##_Discrete_logarithm_##Discrete logarithm##_Random_number_generation_##Random number generation##_Exponentiation_by_squaring_##Exponentiation by squaring Other topics: _Cryptographic_algorithms_##Cryptographic algorithms##_Symmetric-key_algorithm_##Symmetric-key algorithm##_Digital_Signature_Algorithm_##Digital Signature Algorithm##_Cipher_##Cipher##_Modular_exponentiation_##Modular exponentiation##_Application_layer_protocols_##Application layer protocols##_Alice_and_Bob_##Alice and Bob##_Transport_Layer_Security_##Transport Layer Security##_Secure_Shell_##Secure Shell##_Cryptography_##Cryptography##_Key_(cryptography)_##Key (cryptography)##_Trusted_third_party_##Trusted third party##_Plaintext_##Plaintext video-id: pwZebAcjoeo channel_Leandro_Junes_ So What Learning Application layer protocols , Cryptographic algorithms , Cryptography , Prime numbers , Theoretical computer science Saturday, January 20, 2018 Share Share