Похожие видео
array(10) {
[0]=>
object(stdClass)#4520 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "lH2JaYx7TY0"
["related_video_title"]=>
string(60) "Threshold RSA: Splitting the private decryption key - Part 1"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(2) "DG"
}
[1]=>
object(stdClass)#4493 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "srCXNBWsCkA"
["related_video_title"]=>
string(49) "V2d: Kyber-KEM (Kyber and Dilithium short course)"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(16) "Cryptography 101"
}
[2]=>
object(stdClass)#4518 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "oOcTVTpUsPQ"
["related_video_title"]=>
string(58) "The RSA Encryption Algorithm (2 of 2: Generating the Keys)"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
string(9) "Eddie Woo"
}
[3]=>
object(stdClass)#4525 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-fpVv_T4xwA"
["related_video_title"]=>
string(77) "AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(13) "Computerphile"
}
[4]=>
object(stdClass)#4504 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "qph77bTKJTM"
["related_video_title"]=>
string(31) "How does RSA Cryptography work?"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(15) "Tom Rocks Maths"
}
[5]=>
object(stdClass)#4522 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "3 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[6]=>
object(stdClass)#4517 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ecvCfTPRBrI"
["related_video_title"]=>
string(34) "Your Encryption Isn't Quantum Safe"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(14) "IBM Technology"
}
[7]=>
object(stdClass)#4527 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "wlSG3pEiQdc"
["related_video_title"]=>
string(46) "Securing Stream Ciphers (HMAC) - Computerphile"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(13) "Computerphile"
}
[8]=>
object(stdClass)#4503 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "_zyKvPvh808"
["related_video_title"]=>
string(87) "Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(20) "Practical Networking"
}
[9]=>
object(stdClass)#4521 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "95Mkwbsk2HQ"
["related_video_title"]=>
string(79) "Можно ли поменять родину так быстро? / вДудь"
["posted_time"]=>
string(19) "3 дня назад"
["channelName"]=>
string(10) "вДудь"
}
}
Threshold RSA: Splitting the private decryption key - Part 1
V2d: Kyber-KEM (Kyber and Dilithium short course)
The RSA Encryption Algorithm (2 of 2: Generating the Keys)
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile
How does RSA Cryptography work?
Разведчик о том, как использовать людей
Your Encryption Isn't Quantum Safe
Securing Stream Ciphers (HMAC) - Computerphile
Public and Private Keys - Signatures & Key Exchanges - Cryptography - Practical TLS
Можно ли поменять родину так быстро? / вДудь