Похожие видео
array(10) {
[0]=>
object(stdClass)#4703 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Azp_zDgFAGk"
["related_video_title"]=>
string(51) "OpenSSL Tutorial Video-3 | Encryption using OpenSSL"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(13) "Cyber Hashira"
}
[1]=>
object(stdClass)#4676 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QSlWzKNbKrU"
["related_video_title"]=>
string(78) "Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar"
["posted_time"]=>
string(20) "11 лет назад"
["channelName"]=>
string(45) "Introduction to Cryptography by Christof Paar"
}
[2]=>
object(stdClass)#4701 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "LTVGDuM8OCo"
["related_video_title"]=>
string(45) "Public Key Crypto with RSA (CSS322, L12, Y14)"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
string(13) "Steven Gordon"
}
[3]=>
object(stdClass)#4708 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "-nEh7X4dtuw"
["related_video_title"]=>
string(38) "Encryption and decryption with openssl"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(6) "NetSec"
}
[4]=>
object(stdClass)#4687 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "GI790E1JMgw"
["related_video_title"]=>
string(33) "Hashing vs Encryption Differences"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(32) "Programming w/ Professor Sluiter"
}
[5]=>
object(stdClass)#4705 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "yRk-F2Jbwrw"
["related_video_title"]=>
string(45) "Бомба в Офисе Президента"
["posted_time"]=>
string(24) "11 часов назад"
["channelName"]=>
string(27) "Анатолий Шарий"
}
[6]=>
object(stdClass)#4700 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "iEj42l4otNY"
["related_video_title"]=>
string(50) "NAT, Bridged and Internal Networking in VirtualBox"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(13) "Steven Gordon"
}
[7]=>
object(stdClass)#4710 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Z8M2BTscoD4"
["related_video_title"]=>
string(83) "How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
string(13) "Anthony Vance"
}
[8]=>
object(stdClass)#4686 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "vhOXJYyyejE"
["related_video_title"]=>
string(82) "Hashing Encryption Decryption Digital Signature Signing Verification Openssl Pkcs7"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(12) "Sameer Pasha"
}
[9]=>
object(stdClass)#4704 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "95Mkwbsk2HQ"
["related_video_title"]=>
string(79) "Можно ли поменять родину так быстро? / вДудь"
["posted_time"]=>
string(21) "1 день назад"
["channelName"]=>
string(10) "вДудь"
}
}
OpenSSL Tutorial Video-3 | Encryption using OpenSSL
Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar
Public Key Crypto with RSA (CSS322, L12, Y14)
Encryption and decryption with openssl
Hashing vs Encryption Differences
Бомба в Офисе Президента
NAT, Bridged and Internal Networking in VirtualBox
How the RSA algorithm works, including how to select d, e, n, p, q, and φ (phi)
Hashing Encryption Decryption Digital Signature Signing Verification Openssl Pkcs7
Можно ли поменять родину так быстро? / вДудь