{"id":24858,"date":"2014-07-15T11:45:33","date_gmt":"2014-07-15T15:45:33","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24858"},"modified":"2014-07-15T11:45:33","modified_gmt":"2014-07-15T15:45:33","slug":"introduction-to-cryptography-part-2-public-key-and-key-exchange-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/introduction-to-cryptography-part-2-public-key-and-key-exchange-video.php","title":{"rendered":"Introduction to Cryptography Part 2 &#8211; Public key and key exchange &#8211; Video"},"content":{"rendered":"<p><br \/>Introduction to Cryptography Part 2 - Public key and key exchange<br \/><span>Public key, hash functions, and key exchange. Part 1 is here: <a href=\"https:\/\/www.youtube.com\/watch?v=_9YuARcSTVY\" rel=\"nofollow\">https:\/\/www.youtube.com\/watch?v=_9YuARcSTVY<\/a> and related examples: <a href=\"http:\/\/asecuritysite.com\/encryption\" rel=\"nofollow\">http:\/\/asecuritysite.com\/encryption<\/a>.<\/span><span><\/p>\n<p>By: <\/span>Bill Buchanan<span style=\"color: #666666; font-size: 11px;\"<br \/><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.youtube.com\/watch?v=HKQLBUAGbeQ\" title=\"Introduction to Cryptography Part 2 - Public key and key exchange - Video\">Introduction to Cryptography Part 2 - Public key and key exchange - Video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Introduction to Cryptography Part 2 - Public key and key exchange Public key, hash functions, and key exchange. Part 1 is here: <a href=\"https:\/\/www.youtube.com\/watch?v=_9YuARcSTVY\" rel=\"nofollow\">https:\/\/www.youtube.com\/watch?v=_9YuARcSTVY<\/a> and related examples: <a href=\"http:\/\/asecuritysite.com\/encryption\" rel=\"nofollow\">http:\/\/asecuritysite.com\/encryption<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24858","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24858"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24858"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24858\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}