Covers: theory of Security
Estimated time needed to finish: 2 minutes
Questions this item addresses:
  • What is Vigenere Cipher?
How to use this item?

This video talks about a type of poly-alphabetic cipher called Vigenere Cipher. This cipher uses a clever letter mapping technique with matrix. Here is the link to the full Udacity course "Intro to Information Security"

Fail to play? Open the link directly:
Author(s) / creator(s) / reference(s)
0 comment

Simple Cryptography Techniques

Total time needed: ~3 hours
This recipe introduces two type of simple cryptography techniques, Caesar & Vigenere Cipher.
Potential Use Cases
Insight on how the ancients used cryptography during war times.
Who is This For ?
BEGINNERSecurity/Privacy enthusiasts.
Click on each of the following annotated items to see details.
ARTICLE 1. Detailed notebook to fine tune RoBERTa (for beginners)
  • How to use the RoBERTa model from the transformers library by Hugging Face?
  • How to fine-tune the model to get better results?
40 minutes
ARTICLE 2. Battle of the Transformers: ELECTRA, BERT, RoBERTa, or XLNet
  • How to use the RoBERTa model from the simpletransformers library?
  • How do different post-BERT models compare in terms of performance and training time?
40 minutes
VIDEO 3. Vigenere Cipher
  • What is Vigenere Cipher?
2 minutes
RECIPE 4. Simple Cryptography Techniques
82 minutes

Concepts Covered

0 comment