|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
622.28KB |
| 01-Part 1. Primitives - The ingredients of cryptography.mp4 |
6.00MB |
| 02-Chapter 1. Introduction.mp4 |
50.30MB |
| 03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp4 |
46.25MB |
| 04-Chapter 1. Key exchanges or how to get a shared secret.mp4 |
59.29MB |
| 05-Chapter 1. Classifying and abstracting cryptography.mp4 |
56.23MB |
| 06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4 |
47.39MB |
| 07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4 |
52.75MB |
| 08-Chapter 2. Hash functions.mp4 |
63.46MB |
| 09-Chapter 2. Security considerations for hash functions.mp4 |
71.06MB |
| 1 |
11.38KB |
| 10 |
119.79KB |
| 10-Chapter 2. Standardized hash functions.mp4 |
50.95MB |
| 11 |
269.69KB |
| 11-Chapter 2. The SHA-3 hash function.mp4 |
65.67MB |
| 12 |
709.78KB |
| 12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4 |
62.31MB |
| 13 |
888.21KB |
| 13-Chapter 3. Message authentication codes.mp4 |
46.06MB |
| 14 |
959.57KB |
| 14-Chapter 3. Security properties of a MAC.mp4 |
68.03MB |
| 15 |
958.41KB |
| 15-Chapter 3. Integrity of cookies.mp4 |
59.87MB |
| 16 |
995.61KB |
| 16-Chapter 4. Authenticated encryption.mp4 |
63.29MB |
| 17 |
1003.97KB |
| 17-Chapter 4. The interface of AES.mp4 |
65.84MB |
| 18 |
713.35KB |
| 18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4 |
35.00MB |
| 19 |
783.01KB |
| 19-Chapter 4. The AES-GCM AEAD.mp4 |
53.05MB |
| 2 |
472.54KB |
| 20 |
494.08KB |
| 20-Chapter 4. ChaCha20-Poly1305.mp4 |
40.89MB |
| 21 |
979.72KB |
| 21-Chapter 4. Other kinds of symmetric encryption.mp4 |
52.66MB |
| 22 |
166.50KB |
| 22-Chapter 5. Key exchanges.mp4 |
52.27MB |
| 23 |
334.63KB |
| 23-Chapter 5. Group theory.mp4 |
58.21MB |
| 24 |
407.64KB |
| 24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4 |
54.55MB |
| 25 |
172.84KB |
| 25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4 |
36.17MB |
| 26 |
501.85KB |
| 26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4 |
44.17MB |
| 27 |
176.68KB |
| 27-Chapter 5. Small subgroup attacks and other security considerations.mp4 |
73.42MB |
| 28 |
556.83KB |
| 28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4 |
44.12MB |
| 29 |
639.33KB |
| 29-Chapter 6. Hybrid encryption.mp4 |
37.13MB |
| 3 |
475.66KB |
| 30 |
723.05KB |
| 30-Chapter 6. Textbook RSA.mp4 |
68.02MB |
| 31 |
706.04KB |
| 31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4 |
60.55MB |
| 32 |
912.72KB |
| 32-Chapter 7. Signatures and zero-knowledge proofs.mp4 |
57.64MB |
| 33 |
133.92KB |
| 33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4 |
60.66MB |
| 34 |
323.90KB |
| 34-Chapter 7. The signature algorithms you should use (or not).mp4 |
64.83MB |
| 35 |
344.33KB |
| 35-Chapter 7. RSA-PSS - A better standard.mp4 |
64.51MB |
| 36 |
459.63KB |
| 36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4 |
61.11MB |
| 37 |
485.11KB |
| 37-Chapter 7. Subtle behaviors of signature schemes.mp4 |
43.68MB |
| 38 |
539.45KB |
| 38-Chapter 8. Randomness and secrets.mp4 |
43.67MB |
| 39 |
135.52KB |
| 39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4 |
59.22MB |
| 4 |
581.55KB |
| 40 |
729.30KB |
| 40-Chapter 8. Obtaining randomness in practice.mp4 |
70.06MB |
| 41 |
761.94KB |
| 41-Chapter 8. Public randomness.mp4 |
73.13MB |
| 42 |
796.77KB |
| 42-Chapter 8. Managing keys and secrets.mp4 |
67.30MB |
| 43 |
140.61KB |
| 43-Part 2. Protocols - The recipes of cryptography.mp4 |
20.07MB |
| 44 |
809.17KB |
| 44-Chapter 9. Secure transport.mp4 |
57.48MB |
| 45 |
369.56KB |
| 45-Chapter 9. How does the TLS protocol work.mp4 |
58.86MB |
| 46 |
528.08KB |
| 46-Chapter 9. The TLS handshake - Part 1.mp4 |
66.04MB |
| 47 |
322.63KB |
| 47-Chapter 9. The TLS handshake - Part 2.mp4 |
54.79MB |
| 48 |
500.14KB |
| 48-Chapter 9. How TLS 1.3 encrypts application data.mp4 |
75.15MB |
| 49 |
786.69KB |
| 49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4 |
53.01MB |
| 5 |
866.06KB |
| 50 |
970.24KB |
| 50-Chapter 10. End-to-end encryption.mp4 |
65.60MB |
| 51 |
49.30KB |
| 51-Chapter 10. The failure of encrypted email.mp4 |
51.81MB |
| 52 |
79.35KB |
| 52-Chapter 10. Key discovery is a real issue.mp4 |
67.24MB |
| 53 |
218.01KB |
| 53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4 |
55.95MB |
| 54 |
456.15KB |
| 54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp4 |
74.57MB |
| 55 |
49.80KB |
| 55-Chapter 11. User authentication.mp4 |
56.51MB |
| 56 |
345.72KB |
| 56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4 |
43.54MB |
| 57 |
972.08KB |
| 57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4 |
40.48MB |
| 58 |
1010.05KB |
| 58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp4 |
73.68MB |
| 59 |
234.00KB |
| 59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4 |
71.31MB |
| 6 |
442.41KB |
| 60 |
251.09KB |
| 60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp4 |
52.63MB |
| 61 |
352.13KB |
| 61-Chapter 12. Crypto as in cryptocurrency.mp4 |
56.68MB |
| 62 |
379.13KB |
| 62-Chapter 12. A problem of trust Decentralization helps.mp4 |
60.47MB |
| 63 |
746.86KB |
| 63-Chapter 12. How does Bitcoin work.mp4 |
71.74MB |
| 64 |
195.48KB |
| 64-Chapter 12. Forking hell! Solving conflicts in mining.mp4 |
66.52MB |
| 65 |
51.74KB |
| 65-Chapter 12. A tour of cryptocurrencies.mp4 |
63.38MB |
| 66 |
345.42KB |
| 66-Chapter 12. A round in the DiemBFT protocol.mp4 |
60.87MB |
| 67 |
717.92KB |
| 67-Chapter 13. Hardware cryptography.mp4 |
59.26MB |
| 68 |
311.45KB |
| 68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp4 |
49.70MB |
| 69 |
258.16KB |
| 69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4 |
48.26MB |
| 7 |
324.84KB |
| 70 |
753.58KB |
| 70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4 |
55.92MB |
| 71 |
625.16KB |
| 71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4 |
35.51MB |
| 72 |
766.31KB |
| 72-Chapter 13. What solution is good for me.mp4 |
77.43MB |
| 73 |
966.92KB |
| 73-Chapter 13. Constant-time programming.mp4 |
77.54MB |
| 74 |
854.32KB |
| 74-Chapter 14. Post-quantum cryptography.mp4 |
83.39MB |
| 75 |
902.56KB |
| 75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4 |
71.13MB |
| 76 |
323.41KB |
| 76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp4 |
35.24MB |
| 77 |
341.75KB |
| 77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4 |
53.95MB |
| 78 |
472.65KB |
| 78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4 |
48.75MB |
| 79 |
491.27KB |
| 79-Chapter 14. Kyber, a lattice-based key exchange.mp4 |
60.53MB |
| 8 |
598.59KB |
| 80 |
116.76KB |
| 80-Chapter 14. Do I need to panic.mp4 |
53.66MB |
| 81 |
529.09KB |
| 81-Chapter 15. Is this it Next-generation cryptography.mp4 |
63.83MB |
| 82 |
895.58KB |
| 82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4 |
60.68MB |
| 83 |
847.22KB |
| 83-Chapter 15 Where is it used..mp4 |
79.54MB |
| 84 |
498.36KB |
| 84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4 |
52.77MB |
| 85 |
775.50KB |
| 85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4 |
71.88MB |
| 86 |
1022.33KB |
| 86-Chapter 16. When and where cryptography fails.mp4 |
79.99MB |
| 87 |
947.55KB |
| 87-Chapter 16. Where are the good libraries.mp4 |
50.66MB |
| 88-Chapter 16. Cryptography is not an island.mp4 |
56.05MB |
| 89-Appendix. Answers to exercises.mp4 |
43.52MB |
| 9 |
891.61KB |
| TutsNode.com.txt |
63B |