L20: TLS
Mohammad Ali Humayun
L20: TLS
16:19
L18: SHA2, Message authentication codes and Digital signatures,
Mohammad Ali Humayun
L18: SHA2, Message authentication codes and Digital signatures,
26:50
L17: Hashing for authentication
Mohammad Ali Humayun
L17: Hashing for authentication
32:15
Brief Introduction of Cryptography
Mohammad Ali Humayun
Brief Introduction of Cryptography
3:10
L16: Learning with errors
Mohammad Ali Humayun
L16: Learning with errors
34:26
L15: Shor's algorithm
Mohammad Ali Humayun
L15: Shor's algorithm
33:26
L14: Elliptic Curve Cryptography
Mohammad Ali Humayun
L14: Elliptic Curve Cryptography
29:40
L13: Index calculus algorithm
Mohammad Ali Humayun
L13: Index calculus algorithm
27:28
L12: Discrete Log Problem
Mohammad Ali Humayun
L12: Discrete Log Problem
23:24
L11: Asymmetric algorithms
Mohammad Ali Humayun
L11: Asymmetric algorithms
30:01
L10: Fast exponentiation and extended euclidean algorithms
Mohammad Ali Humayun
L10: Fast exponentiation and extended euclidean algorithms
19:16
L9: Mathematical foundations for asymmetric ciphers
Mohammad Ali Humayun
L9: Mathematical foundations for asymmetric ciphers
59:29
L8: Stream ciphers: random numbers and Salsa20
Mohammad Ali Humayun
L8: Stream ciphers: random numbers and Salsa20
43:26
L7: Encryption Modes for Block Ciphers
Mohammad Ali Humayun
L7: Encryption Modes for Block Ciphers
19:17
L6: AES and Finite Extension Fields
Mohammad Ali Humayun
L6: AES and Finite Extension Fields
58:32
L5: Differential Cryptanalysis for Symmetric Block Ciphers
Mohammad Ali Humayun
L5: Differential Cryptanalysis for Symmetric Block Ciphers
28:30
L4: Linear Cryptanalysis for Symmetric Block Ciphers
Mohammad Ali Humayun
L4: Linear Cryptanalysis for Symmetric Block Ciphers
48:50
L3: Confusion and Diffusion for Block Ciphers (SBOX, PBOX)
Mohammad Ali Humayun
L3: Confusion and Diffusion for Block Ciphers (SBOX, PBOX)
30:23
L2: Symmetric Block Cipher Primitives, (Groups, Mod and XOR)
Mohammad Ali Humayun
L2: Symmetric Block Cipher Primitives, (Groups, Mod and XOR)
29:43
L1: Counting principles for brute force key search cryptanalysis
Mohammad Ali Humayun
L1: Counting principles for brute force key search cryptanalysis
18:11
L19: User authentication and Fiat Shamir as  Zero Knowledge Proof
Mohammad Ali Humayun
L19: User authentication and Fiat Shamir as Zero Knowledge Proof
19:44
SQL Injection TryHackMe Room Walk Through [Urdu]
Mohammad Ali Humayun
SQL Injection TryHackMe Room Walk Through [Urdu]
1:03:29
RSA
Mohammad Ali Humayun
RSA
30:25
Internet Architecture in a nutshell [Urdu]
Mohammad Ali Humayun
Internet Architecture in a nutshell [Urdu]
6:56
Stack overflow exploit demo [Kali linux]
Mohammad Ali Humayun
Stack overflow exploit demo [Kali linux]
21:22
Fourier series coefficients
Mohammad Ali Humayun
Fourier series coefficients
22:09
System Frequency response examples
Mohammad Ali Humayun
System Frequency response examples
12:41
Fourier series introduction
Mohammad Ali Humayun
Fourier series introduction
15:20
Complex numbers and Euler's relation [Urdu]
Mohammad Ali Humayun
Complex numbers and Euler's relation [Urdu]
32:01
Simple Harmonic Motion and sinusoids [Urdu]
Mohammad Ali Humayun
Simple Harmonic Motion and sinusoids [Urdu]
27:00
Explaining pi and e [Urdu]
Mohammad Ali Humayun
Explaining pi and e [Urdu]
15:06
Python Visualisation of Fourier Transform and Ideal Filtering
Mohammad Ali Humayun
Python Visualisation of Fourier Transform and Ideal Filtering
26:00
Python visualisation of LTI systems
Mohammad Ali Humayun
Python visualisation of LTI systems
28:51
Speech processing (Introduction)
Mohammad Ali Humayun
Speech processing (Introduction)
15:33
Griffin Lim algorithm for speech synthesis and coding
Mohammad Ali Humayun
Griffin Lim algorithm for speech synthesis and coding
38:27
sequence classification (speech to text)
Mohammad Ali Humayun
sequence classification (speech to text)
42:34
Machine learning fundamentals (classification) [Urdu]
Mohammad Ali Humayun
Machine learning fundamentals (classification) [Urdu]
43:22
speech perception and features
Mohammad Ali Humayun
speech perception and features
38:02
Uniform tube modelling of speech production
Mohammad Ali Humayun
Uniform tube modelling of speech production
1:06:35
Arabic verbs morphology (SARF) summary:   صرف كا خلاصہ
Mohammad Ali Humayun
Arabic verbs morphology (SARF) summary: صرف كا خلاصہ
35:00
Tajweed basics
Mohammad Ali Humayun
Tajweed basics
9:01
Arabic basic Vocabulary
Mohammad Ali Humayun
Arabic basic Vocabulary
36:58
Arabic Grammer (Nahw) orientation. علم النحو کا تعارف
Mohammad Ali Humayun
Arabic Grammer (Nahw) orientation. علم النحو کا تعارف
28:57
waveform coding techniques example
Mohammad Ali Humayun
waveform coding techniques example
27:55
speech enhancement example
Mohammad Ali Humayun
speech enhancement example
16:10
speech enhancement
Mohammad Ali Humayun
speech enhancement
15:10
speech coding
Mohammad Ali Humayun
speech coding
17:46
Linear prediction coefficients as speech features
Mohammad Ali Humayun
Linear prediction coefficients as speech features
22:07
short term speech features
Mohammad Ali Humayun
short term speech features
39:25
DTFT (Fourier Transform) simplified
Mohammad Ali Humayun
DTFT (Fourier Transform) simplified
23:37
Z-Transform (DSP 5)
Mohammad Ali Humayun
Z-Transform (DSP 5)
10:35
DTFT Properties, System Transfer Function, Filters (DSP 4)
Mohammad Ali Humayun
DTFT Properties, System Transfer Function, Filters (DSP 4)
36:30
Discrete Time Fourier Transform and its Inverse (DSP 3)
Mohammad Ali Humayun
Discrete Time Fourier Transform and its Inverse (DSP 3)
31:14
Convolution and Difference Equations (DSP 2)
Mohammad Ali Humayun
Convolution and Difference Equations (DSP 2)
25:52
Signals and Systems Basics (DSP 1)
Mohammad Ali Humayun
Signals and Systems Basics (DSP 1)
22:41
Arabic morphology (SARF) orientation  عربي علم  صرف كا تعارف
Mohammad Ali Humayun
Arabic morphology (SARF) orientation عربي علم صرف كا تعارف
53:44
Demystifying machine learning
Mohammad Ali Humayun
Demystifying machine learning
20:13