Torrent Info
Title Real-World Cryptography
Category
Size 5.02GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 622.28KB
01-Part 1. Primitives - The ingredients of cryptography.mp4 6.00MB
02-Chapter 1. Introduction.mp4 50.30MB
03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp4 46.25MB
04-Chapter 1. Key exchanges or how to get a shared secret.mp4 59.29MB
05-Chapter 1. Classifying and abstracting cryptography.mp4 56.23MB
06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4 47.39MB
07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4 52.75MB
08-Chapter 2. Hash functions.mp4 63.46MB
09-Chapter 2. Security considerations for hash functions.mp4 71.06MB
1 11.38KB
10 119.79KB
10-Chapter 2. Standardized hash functions.mp4 50.95MB
11 269.69KB
11-Chapter 2. The SHA-3 hash function.mp4 65.67MB
12 709.78KB
12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4 62.31MB
13 888.21KB
13-Chapter 3. Message authentication codes.mp4 46.06MB
14 959.57KB
14-Chapter 3. Security properties of a MAC.mp4 68.03MB
15 958.41KB
15-Chapter 3. Integrity of cookies.mp4 59.87MB
16 995.61KB
16-Chapter 4. Authenticated encryption.mp4 63.29MB
17 1003.97KB
17-Chapter 4. The interface of AES.mp4 65.84MB
18 713.35KB
18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4 35.00MB
19 783.01KB
19-Chapter 4. The AES-GCM AEAD.mp4 53.05MB
2 472.54KB
20 494.08KB
20-Chapter 4. ChaCha20-Poly1305.mp4 40.89MB
21 979.72KB
21-Chapter 4. Other kinds of symmetric encryption.mp4 52.66MB
22 166.50KB
22-Chapter 5. Key exchanges.mp4 52.27MB
23 334.63KB
23-Chapter 5. Group theory.mp4 58.21MB
24 407.64KB
24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4 54.55MB
25 172.84KB
25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4 36.17MB
26 501.85KB
26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4 44.17MB
27 176.68KB
27-Chapter 5. Small subgroup attacks and other security considerations.mp4 73.42MB
28 556.83KB
28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4 44.12MB
29 639.33KB
29-Chapter 6. Hybrid encryption.mp4 37.13MB
3 475.66KB
30 723.05KB
30-Chapter 6. Textbook RSA.mp4 68.02MB
31 706.04KB
31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4 60.55MB
32 912.72KB
32-Chapter 7. Signatures and zero-knowledge proofs.mp4 57.64MB
33 133.92KB
33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4 60.66MB
34 323.90KB
34-Chapter 7. The signature algorithms you should use (or not).mp4 64.83MB
35 344.33KB
35-Chapter 7. RSA-PSS - A better standard.mp4 64.51MB
36 459.63KB
36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4 61.11MB
37 485.11KB
37-Chapter 7. Subtle behaviors of signature schemes.mp4 43.68MB
38 539.45KB
38-Chapter 8. Randomness and secrets.mp4 43.67MB
39 135.52KB
39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4 59.22MB
4 581.55KB
40 729.30KB
40-Chapter 8. Obtaining randomness in practice.mp4 70.06MB
41 761.94KB
41-Chapter 8. Public randomness.mp4 73.13MB
42 796.77KB
42-Chapter 8. Managing keys and secrets.mp4 67.30MB
43 140.61KB
43-Part 2. Protocols - The recipes of cryptography.mp4 20.07MB
44 809.17KB
44-Chapter 9. Secure transport.mp4 57.48MB
45 369.56KB
45-Chapter 9. How does the TLS protocol work.mp4 58.86MB
46 528.08KB
46-Chapter 9. The TLS handshake - Part 1.mp4 66.04MB
47 322.63KB
47-Chapter 9. The TLS handshake - Part 2.mp4 54.79MB
48 500.14KB
48-Chapter 9. How TLS 1.3 encrypts application data.mp4 75.15MB
49 786.69KB
49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4 53.01MB
5 866.06KB
50 970.24KB
50-Chapter 10. End-to-end encryption.mp4 65.60MB
51 49.30KB
51-Chapter 10. The failure of encrypted email.mp4 51.81MB
52 79.35KB
52-Chapter 10. Key discovery is a real issue.mp4 67.24MB
53 218.01KB
53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4 55.95MB
54 456.15KB
54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp4 74.57MB
55 49.80KB
55-Chapter 11. User authentication.mp4 56.51MB
56 345.72KB
56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4 43.54MB
57 972.08KB
57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4 40.48MB
58 1010.05KB
58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp4 73.68MB
59 234.00KB
59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4 71.31MB
6 442.41KB
60 251.09KB
60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp4 52.63MB
61 352.13KB
61-Chapter 12. Crypto as in cryptocurrency.mp4 56.68MB
62 379.13KB
62-Chapter 12. A problem of trust Decentralization helps.mp4 60.47MB
63 746.86KB
63-Chapter 12. How does Bitcoin work.mp4 71.74MB
64 195.48KB
64-Chapter 12. Forking hell! Solving conflicts in mining.mp4 66.52MB
65 51.74KB
65-Chapter 12. A tour of cryptocurrencies.mp4 63.38MB
66 345.42KB
66-Chapter 12. A round in the DiemBFT protocol.mp4 60.87MB
67 717.92KB
67-Chapter 13. Hardware cryptography.mp4 59.26MB
68 311.45KB
68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp4 49.70MB
69 258.16KB
69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4 48.26MB
7 324.84KB
70 753.58KB
70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4 55.92MB
71 625.16KB
71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4 35.51MB
72 766.31KB
72-Chapter 13. What solution is good for me.mp4 77.43MB
73 966.92KB
73-Chapter 13. Constant-time programming.mp4 77.54MB
74 854.32KB
74-Chapter 14. Post-quantum cryptography.mp4 83.39MB
75 902.56KB
75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4 71.13MB
76 323.41KB
76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp4 35.24MB
77 341.75KB
77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4 53.95MB
78 472.65KB
78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4 48.75MB
79 491.27KB
79-Chapter 14. Kyber, a lattice-based key exchange.mp4 60.53MB
8 598.59KB
80 116.76KB
80-Chapter 14. Do I need to panic.mp4 53.66MB
81 529.09KB
81-Chapter 15. Is this it Next-generation cryptography.mp4 63.83MB
82 895.58KB
82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4 60.68MB
83 847.22KB
83-Chapter 15 Where is it used..mp4 79.54MB
84 498.36KB
84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4 52.77MB
85 775.50KB
85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4 71.88MB
86 1022.33KB
86-Chapter 16. When and where cryptography fails.mp4 79.99MB
87 947.55KB
87-Chapter 16. Where are the good libraries.mp4 50.66MB
88-Chapter 16. Cryptography is not an island.mp4 56.05MB
89-Appendix. Answers to exercises.mp4 43.52MB
9 891.61KB
TutsNode.com.txt 63B
Distribution statistics by country
Mexico (MX) 2
France (FR) 1
Sweden (SE) 1
Brazil (BR) 1
India (IN) 1
China (CN) 1
Canada (CA) 1
Total 8
IP List List of IP addresses which were distributed this torrent