Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
20 results
In this video I provide an explanation of the ADFGVX cipher, including an example of how to encrypt and decrypt text using the ...
2,237 views
7 months ago
We will also touch on historical examples, such as the ADFGVX cipher, that combine transposition with substitution techniques.
5 views
In the shadows of World War I, cryptography emerged as a silent yet formidable force. As nations grappled with power, secret ...
444 views
6 months ago
Discover how to effectively read two letters at a time from a string in Python, utilizing the ADFGVX cipher and enhancing your ...
7 views
8 months ago
Learn how to successfully fill empty spaces in your ADFGVX cipher matrix with a character of your choice, allowing for a more ...
3 views
Learn how to create a matrix in Python that fills columns first instead of rows, perfect for decoding ADFGVX ciphers. --- This video ...
76,309 views
5 months ago
The Evolution of Cryptography: From Ancient Ciphers to Quantum Security Explore the journey of cryptography, from ancient ...
34 views
11 months ago
This video will highlight the significance of specific codes and ciphers, including trench codes and the infamous ADFGVX cipher, ...
43 views
10 months ago
Amidst the chaos of World War I, a secret language emerged as a crucial tool for communication and deception: coded messages.
622 views
2 months ago
BO3 Zombies Revelations Cipher Progress Has Finally Been Made 9 Years Later - Easter Eggs are still being solved - Playfair ...
96,359 views
How does the Indian Army keep its messages safe when the enemy is always listening? In this video, we uncover the high-tech ...
863 views
9 views
Then we are going to now form the cipher text out of these so the cipher text would be formed by us going down so still the same ...
841 views
During World War I, communication was key—but so was secrecy. 🕵️♂️ Soldiers, spies, and strategists used secret code ...
76 views
9 months ago
Este es el capítulo 23 del podcast "Ciberseguridad para humanos" un espacio donde trataremos temas de Ciberseguridad, ...
16 views
3 months ago
ポリュビオスの謎と暗号 #notebook.
Learn how to easily replace pointers in a keysquare with letters from a string, using Python's itertools. This guide explains the ...
1 view