CSE Adil
Windows 11 Taskbar Customization | How to Change Taskbar Position Windows 11
1:17
CSE Adil
How to Disable Startup Programs in Windows 11 | Speed Up Your PC by Managing Autorun Apps/Programs.
4:01
CSE Adil
How to Enable Autocorrect & Highlight Misspelled Words | Writing Assistance for Error-Free Text
1:03
CSE Adil
Create custom shortcut key to open any file, folder, or application | The Secret Effortless Access
3:02
CSE Adil
How to Enable and Disable Notification in Windows 11 | Notification Settings
1:21
CSE Adil
How to Hide or Unhide Files & Folders using CMD | Windows11 Command Prompt Tips & Tricks
4:15
CSE Adil
How to Enable Dark Mode in Windows11 | Official Dark Theme Setup (Step-by-Step
1:53
CSE Adil
Help Command CMD | CMD Commands Descriptions | Command Details
2:17
CSE Adil
How to View Installed Programs Using CMD | Command Prompt tips & tricks
1:45
CSE Adil
How to Change Default Browser | Windows 11 tips & tricks
2:17
CSE Adil
How to Change CMD Title | Best Command Prompt Tricks & Tips
1:24
CSE Adil
How to Change CMD (Command Prompt) Color | CMD tricks and hacks in Windows 11
1:51
CSE Adil
Shutdown Task Schedule | Auto Shutdown | Set Shutdown Timer | Window 11
2:44
CSE Adil
How to Find/Show Wifi Password Using CMD | Wifi hacking in Window 10/11
3:09
CSE Adil
Digital Signature over Hash Function | Cryptographic Hash Function & Digital Signatures
7:48
CSE Adil
Digital Signature | Public and private key in Digital Signature | Authentication and Non-Repudiation
7:59
CSE Adil
Hash Function Properties and Requirements
4:34
CSE Adil
Hash Function Cryptography
4:16
CSE Adil
Message Authentication Code (MAC) Properties, Requirements and Uses
5:21
CSE Adil
Message Authentication Code (MAC)
4:55
CSE Adil
Message Authentication
3:25
CSE Adil
Man in the Middle Attack in Diffie Hellman Key Exchange | Cryptanalyst attack
4:10
CSE Adil
Diffie-Hellman Key Exchange Example
5:01
CSE Adil
Diffie Hellman Key Exchange Example
7:03
CSE Adil
Primitive Roots
6:15
CSE Adil
Diffie Hellman Key Exchange Algorithm
6:49
CSE Adil
RSA Algorithm Example
9:15
CSE Adil
RSA Algorithm Use
3:56
CSE Adil
RSA Algorithm | RSA Algorithm Key Setup
5:55
CSE Adil
Secrecy and Authentication using Public-Key/Two-Key Cryptography or Asymmetric Encryption
6:23
CSE Adil
Public-Key Cryptography | Two-Key Cryptography | Asymmetric Encryption
6:05
CSE Adil
Private-Key Cryptography | Single-Key Cryptography | Symmetric Encryption
4:27
CSE Adil
AES (Advanced Encryption Standard) Decryption | Encryption Reverse Process
3:32
CSE Adil
Add Round Key in AES (Advanced Encryption Standard)
3:43
CSE Adil
Mix Columns in AES (Advanced Encryption Standard)
4:34
CSE Adil
Shift Rows in AES (Advanced Encryption Standard)
7:32
CSE Adil
Substitute bytes in AES | S-BOX in AES (Advanced Encryption Standard)
6:13
CSE Adil
Plaintext in AES (Advanced Encryption Standard)
3:36
CSE Adil
AES (Advanced Encryption Standard) Structure Description | AES Key Expansion | AES Rounds
3:58
CSE Adil
AES Encryption | AES Structure
6:37
CSE Adil
AES (Advanced Encryption Standard) algorithm
3:57
CSE Adil
Key Distribution
2:56
CSE Adil
3DES(Triple DES algorithm) | Triple-DES with two keys | Triple-DES with three keys
4:16
CSE Adil
Meet in the Middle Attack Cryptography | Double DES
5:42
CSE Adil
Double DES(Data Encryption Standard) | Types of DES
2:26
CSE Adil
Counter Method(CTR) Mode | DES Mode of Operation
4:16
CSE Adil
Output Feedback(OFB) Mode | DES Mode of Operation
5:27
CSE Adil
Cipher Feedback (CFB) Mode | DES Mode of Operation
6:22
CSE Adil
Cipher Block Chaining(CBC) Cipher | DES Mode of Operation | Advantages and Limitations of CBC
6:57
CSE Adil
Electronic Code Book(ECB) Cipher | DES Modes of Operations | Advantages and Limitations of ECB
7:42
CSE Adil
DES Avalanche Effect
2:23
CSE Adil
DES Decryption
6:30
CSE Adil
DES key generation | Permuted choice one | Permuted choice two
7:48
CSE Adil
DES Cipher (S-BOX) | Substitution Box
9:52
CSE Adil
Single round of DES | DES round structure
8:55
CSE Adil
Initial and inverse initial permutation cryptography | Initial permutation | Final permutation
4:21
CSE Adil
Encryption in Data Encryption Standards(DES) | Working Principles of DES
7:10
CSE Adil
Data Encryption Standard(des) | DES Algorithm structure
4:25
CSE Adil
Feistel Cipher Structure Design Principles | Feistel Cipher Structure Principles
5:25
CSE Adil
Feistel Cipher | Feistel Cipher Structure
6:48
CSE Adil
Claude shannon cryptography | Confusion | Diffusion | Claude shannon Substitution-permutation Cipher
3:25
CSE Adil
Reversible vs Irreversible cryptography | Reversible Mapping | Irreversible Mapping
3:23
CSE Adil
Block Cipher vs Stream Cipher | Block Cipher | Stream Cipher
3:39
CSE Adil
Route Transposition Cipher | Route Cipher
4:27
CSE Adil
Row Transposition Cipher | Columnar Cipher Encryption | Columnar Cipher Decryption
4:06
CSE Adil
Rail Fence Cipher | Rail Fence Cipher Encryption and Decryption | Rail Fence Cipher Example
2:38
CSE Adil
One Time Pad
2:30
CSE Adil
Autokey Cipher | Auto Key Cipher Encryption and Decryption
2:37
CSE Adil
Kasiski Method | Cryptanalysis in Cryptography | Decrypting Ciphertexts with Periodic Patterns
2:47
CSE Adil
Vigenere Cipher | Vigenere Cipher Encryption and Decryption
4:43
CSE Adil
Playfair Cipher | Playfair Cipher Encryption and Decryption | Playfair Key Matrix |Playfair Security
15:09
CSE Adil
Polygram Substitution Cipher | Polygram Substitution Encryption | Enhancing Cryptographic Complexity
6:01
CSE Adil
Monoalphabetic Cipher | Monoalphabetic Cipher Security | Language Redundancy and Cryptanalysis
7:53
CSE Adil
Reciprocal Cipher | Reciprocal Cipher Encryption | Reciprocal Cipher Decryption
3:50
CSE Adil
Caesar Cipher | Caesar Cipher Encryption | Caesar Cipher Decryption
14:53
CSE Adil
Cryptanalytic Attacks | Cryptanalysis | Exploring Types and Techniques
4:47
CSE Adil
Characterization of Cryptography
7:33
CSE Adil
Exploring the Pillars of Cybersecurity | Authentication | Integrity | Non-Repudiation
6:21
CSE Adil
Cryptographic Technology | Steganography | Cryptology | Basic Terminology of Cryptography
5:30
CSE Adil
Cryptography | Cryptography explained for beginners | Symmetric encryption | Asymmetric encryption
6:07