Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
_README.txt |
2.38KB |
10 - 1 - Notation (15 min).mp4 |
15.70MB |
10 - 1 - Notation (15 min).srt |
19.28KB |
10 - 2 - Fermat and Euler (18 min).mp4 |
20.06MB |
10 - 2 - Fermat and Euler (18 min).srt |
25.59KB |
10 - 3 - Modular e_'th roots (17 min)14.mp4 |
19.09MB |
10 - 3 - Modular e'th roots (17 min)14.mp4 |
19.09MB |
10 - 3 - Modular e'th roots (17 min)14.srt |
22.91KB |
10 - 4 - Arithmetic algorithms (13 min).mp4 |
13.89MB |
10 - 4 - Arithmetic algorithms (13 min).srt |
18.07KB |
10 - 5 - Intractable problems (19 min).mp4 |
21.22MB |
10 - 5 - Intractable problems (19 min).srt |
27.61KB |
11 - 1 - Definitions and security (16 min).mp4 |
17.22MB |
11 - 1 - Definitions and security (16 min).srt |
24.21KB |
11 - 2 - Constructions (11 min) .mp4 |
11.29MB |
11 - 2 - Constructions (11 min) .srt |
16.52KB |
11 - 3 - The RSA trapdoor permutation (18 min).mp4 |
19.82MB |
11 - 3 - The RSA trapdoor permutation (18 min).srt |
26.14KB |
11 - 4 - PKCS 1 (23 min).mp4 |
23.40MB |
11 - 4 - PKCS 1 (23 min).srt |
30.62KB |
11 - 5 - Is RSA a one-way function |
26.84KB |
11 - 5 - Is RSA a one-way function_ (17 min).mp4 |
18.53MB |
11 - 6 - RSA in practice (14 min).mp4 |
15.63MB |
11 - 6 - RSA in practice (14 min).srt |
20.95KB |
1 - 1 - Course Overview (11 min).mp4 |
11.72MB |
1 - 1 - Course Overview (11 min).srt |
16.76KB |
12 - 1 - The ElGamal Public-key System (23 min).mp4 |
21.36MB |
12 - 1 - The ElGamal Public-key System (23 min).srt |
37.11KB |
12 - 2 - ElGamal Security (14 min).mp4 |
14.53MB |
12 - 2 - ElGamal Security (14 min).srt |
21.57KB |
12 - 3 - ElGamal Variants With Better Security (11 min).mp4 |
11.27MB |
12 - 3 - ElGamal Variants With Better Security (11 min).srt |
16.81KB |
12 - 4 - A Unifying Theme (12 min).mp4 |
12.93MB |
12 - 4 - A Unifying Theme (12 min).srt |
17.78KB |
12 - 5 - Farewell (for now) (6 min).mp4 |
5.73MB |
12 - 5 - Farewell (for now) (6 min).srt |
9.04KB |
1 - 2 - What is cryptography_ (15 min).mp4 |
17.01MB |
1 - 3 - History of cryptography (19 min).mp4 |
20.47MB |
1 - 3 - History of cryptography (19 min).srt |
26.08KB |
1 - 4 - Discrete probability (Crash course) (18 min).mp4 |
19.82MB |
1 - 4 - Discrete probability (Crash course) (18 min).srt |
25.35KB |
1 - 5 - Discrete probability (crash course, cont.) (14 min).mp4 |
14.64MB |
1 - 5 - Discrete probability (crash course, cont.) (14 min).srt |
20.02KB |
2 - 1 - Information theoretic security and the one time pad (19 min).mp4 |
20.04MB |
2 - 1 - Information theoretic security and the one time pad (19 min).srt |
25.63KB |
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 |
21.17MB |
2 - 2 - Stream ciphers and pseudo random generators (20 min).srt |
28.39KB |
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 |
25.43MB |
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt |
34.80KB |
2 - 4 - Real-world stream ciphers (20 min).mp4 |
21.87MB |
2 - 4 - Real-world stream ciphers (20 min).srt |
27.69KB |
2 - 5 - PRG Security Definitions (25 min).mp4 |
26.80MB |
2 - 5 - PRG Security Definitions (25 min).srt |
35.79KB |
2 - 6 - Semantic Security (16 min).mp4 |
16.80MB |
2 - 6 - Semantic Security (16 min).srt |
23.97KB |
2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 |
11.73MB |
2 - 7 - Stream ciphers are semantically secure (11 min) [optional].srt |
16.21KB |
3 - 1 - What are block ciphers |
24.94KB |
3 - 1 - What are block ciphers_ (17 min).mp4 |
18.67MB |
3 - 2 - The Data Encryption Standard (22 min).mp4 |
24.50MB |
3 - 2 - The Data Encryption Standard (22 min).srt |
31.32KB |
3 - 3 - Exhaustive search attacks (20 min).mp4 |
21.91MB |
3 - 3 - Exhaustive search attacks (20 min).srt |
27.31KB |
3 - 4 - More attacks on block ciphers (16 min).mp4 |
17.75MB |
3 - 4 - More attacks on block ciphers (16 min).srt |
25.03KB |
3 - 5 - The AES block cipher (14 min).mp4 |
14.52MB |
3 - 5 - The AES block cipher (14 min).srt |
20.24KB |
3 - 6 - Block ciphers from PRGs(12 min).mp4 |
12.88MB |
3 - 6 - Block ciphers from PRGs(12 min).srt |
17.47KB |
4 - 1 - Review_ PRPs and PRFs (12 min).mp4 |
12.72MB |
4 - 1 - Review_ PRPs and PRFs (12 min).srt |
16.80KB |
4 - 2 - Modes of operation_ one time key (8 min).mp4 |
7.98MB |
4 - 2 - Modes of operation_ one time key (8 min).srt |
11.84KB |
4 - 3 - Security for many-time key (23 min).mp4 |
24.92MB |
4 - 3 - Security for many-time key (23 min).srt |
34.34KB |
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 |
17.96MB |
4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt |
24.42KB |
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 |
10.44MB |
4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt |
14.15KB |
5 - 1 - Message Authentication Codes (16 min).mp4 |
16.55MB |
5 - 1 - Message Authentication Codes (16 min).srt |
23.42KB |
5 - 2 - MACs Based On PRFs (10 min).mp4 |
11.18MB |
5 - 2 - MACs Based On PRFs (10 min).srt |
15.36KB |
5 - 3 - CBC-MAC and NMAC (20 min).mp4 |
22.34MB |
5 - 3 - CBC-MAC and NMAC (20 min).srt |
29.15KB |
5 - 4 - MAC padding (9 min).mp4 |
9.30MB |
5 - 4 - MAC padding (9 min).srt |
13.18KB |
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 |
17.06MB |
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt |
24.36KB |
6 - 1 - Introduction (11 min).mp4 |
11.92MB |
6 - 1 - Introduction (11 min).srt |
16.70KB |
6 - 2 - Generic birthday attack (16 min).mp4 |
16.14MB |
6 - 2 - Generic birthday attack (16 min).srt |
21.99KB |
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 |
12.58MB |
6 - 3 - The Merkle-Damgard Paradigm (12 min).srt |
17.34KB |
6 - 4 - Constructing compression functions (8 min).mp4 |
8.78MB |
6 - 4 - Constructing compression functions (8 min).srt |
12.89KB |
6 - 5 - HMAC (7 min).mp4 |
7.83MB |
6 - 5 - HMAC (7 min).srt |
10.06KB |
6 - 6 - Timing attacks on MAC verification (9 min).mp4 |
9.39MB |
6 - 6 - Timing attacks on MAC verification (9 min).srt |
13.35KB |
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 |
14.02MB |
7 - 1 - Active attacks on CPA-secure encryption (13 min).srt |
19.52KB |
7 - 2 - Definitions (6 min).mp4 |
5.61MB |
7 - 2 - Definitions (6 min).srt |
8.27KB |
7 - 3 - Chosen ciphertext attacks (12 min).mp4 |
13.04MB |
7 - 3 - Chosen ciphertext attacks (12 min).srt |
18.70KB |
7 - 4 - Constructions from ciphers and MACs (21 min).mp4 |
22.84MB |
7 - 4 - Constructions from ciphers and MACs (21 min).srt |
30.67KB |
7 - 5 - Case study_ TLS (18 min).mp4 |
18.96MB |
7 - 5 - Case study_ TLS (18 min).srt |
26.38KB |
7 - 6 - CBC padding attacks (14 min).mp4 |
14.99MB |
7 - 6 - CBC padding attacks (14 min).srt |
21.21KB |
7 - 7 - Attacking non-atomic decryption (10 min).mp4 |
11.09MB |
7 - 7 - Attacking non-atomic decryption (10 min).srt |
14.91KB |
8 - 1 - Key Derivation (14 min).mp4 |
14.57MB |
8 - 1 - Key Derivation (14 min).srt |
21.44KB |
8 - 2 - Deterministic Encryption (15 min).mp4 |
15.62MB |
8 - 2 - Deterministic Encryption (15 min).srt |
22.99KB |
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 |
22.06MB |
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt |
30.87KB |
8 - 4 - Tweakable encryption (15 min).mp4 |
15.58MB |
8 - 4 - Tweakable encryption (15 min).srt |
22.03KB |
8 - 5 - Format preserving encryption (13 min).mp4 |
13.21MB |
8 - 5 - Format preserving encryption (13 min).srt |
18.54KB |
9 - 1 - Trusted 3rd parties (11 min).mp4 |
12.22MB |
9 - 1 - Trusted 3rd parties (11 min).srt |
17.32KB |
9 - 2 - Merkle Puzzles (11 min).mp4 |
12.40MB |
9 - 2 - Merkle Puzzles (11 min).srt |
19.67KB |
9 - 3 - The Diffie-Hellman protocol (19 min).mp4 |
20.96MB |
9 - 3 - The Diffie-Hellman protocol (19 min).srt |
29.20KB |
9 - 4 - Public-key encryption (11 min).mp4 |
11.83MB |
9 - 4 - Public-key encryption (11 min).srt |
16.95KB |