Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585B |
0 |
622.28KB |
01-Part 1. Primitives - The ingredients of cryptography.mp4 |
6.00MB |
02-Chapter 1. Introduction.mp4 |
50.30MB |
03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp4 |
46.25MB |
04-Chapter 1. Key exchanges or how to get a shared secret.mp4 |
59.29MB |
05-Chapter 1. Classifying and abstracting cryptography.mp4 |
56.23MB |
06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4 |
47.39MB |
07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4 |
52.75MB |
08-Chapter 2. Hash functions.mp4 |
63.46MB |
09-Chapter 2. Security considerations for hash functions.mp4 |
71.06MB |
1 |
11.38KB |
10 |
119.79KB |
10-Chapter 2. Standardized hash functions.mp4 |
50.95MB |
11 |
269.69KB |
11-Chapter 2. The SHA-3 hash function.mp4 |
65.67MB |
12 |
709.78KB |
12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4 |
62.31MB |
13 |
888.21KB |
13-Chapter 3. Message authentication codes.mp4 |
46.06MB |
14 |
959.57KB |
14-Chapter 3. Security properties of a MAC.mp4 |
68.03MB |
15 |
958.41KB |
15-Chapter 3. Integrity of cookies.mp4 |
59.87MB |
16 |
995.61KB |
16-Chapter 4. Authenticated encryption.mp4 |
63.29MB |
17 |
1003.97KB |
17-Chapter 4. The interface of AES.mp4 |
65.84MB |
18 |
713.35KB |
18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4 |
35.00MB |
19 |
783.01KB |
19-Chapter 4. The AES-GCM AEAD.mp4 |
53.05MB |
2 |
472.54KB |
20 |
494.08KB |
20-Chapter 4. ChaCha20-Poly1305.mp4 |
40.89MB |
21 |
979.72KB |
21-Chapter 4. Other kinds of symmetric encryption.mp4 |
52.66MB |
22 |
166.50KB |
22-Chapter 5. Key exchanges.mp4 |
52.27MB |
23 |
334.63KB |
23-Chapter 5. Group theory.mp4 |
58.21MB |
24 |
407.64KB |
24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4 |
54.55MB |
25 |
172.84KB |
25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4 |
36.17MB |
26 |
501.85KB |
26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4 |
44.17MB |
27 |
176.68KB |
27-Chapter 5. Small subgroup attacks and other security considerations.mp4 |
73.42MB |
28 |
556.83KB |
28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4 |
44.12MB |
29 |
639.33KB |
29-Chapter 6. Hybrid encryption.mp4 |
37.13MB |
3 |
475.66KB |
30 |
723.05KB |
30-Chapter 6. Textbook RSA.mp4 |
68.02MB |
31 |
706.04KB |
31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4 |
60.55MB |
32 |
912.72KB |
32-Chapter 7. Signatures and zero-knowledge proofs.mp4 |
57.64MB |
33 |
133.92KB |
33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4 |
60.66MB |
34 |
323.90KB |
34-Chapter 7. The signature algorithms you should use (or not).mp4 |
64.83MB |
35 |
344.33KB |
35-Chapter 7. RSA-PSS - A better standard.mp4 |
64.51MB |
36 |
459.63KB |
36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4 |
61.11MB |
37 |
485.11KB |
37-Chapter 7. Subtle behaviors of signature schemes.mp4 |
43.68MB |
38 |
539.45KB |
38-Chapter 8. Randomness and secrets.mp4 |
43.67MB |
39 |
135.52KB |
39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4 |
59.22MB |
4 |
581.55KB |
40 |
729.30KB |
40-Chapter 8. Obtaining randomness in practice.mp4 |
70.06MB |
41 |
761.94KB |
41-Chapter 8. Public randomness.mp4 |
73.13MB |
42 |
796.77KB |
42-Chapter 8. Managing keys and secrets.mp4 |
67.30MB |
43 |
140.61KB |
43-Part 2. Protocols - The recipes of cryptography.mp4 |
20.07MB |
44 |
809.17KB |
44-Chapter 9. Secure transport.mp4 |
57.48MB |
45 |
369.56KB |
45-Chapter 9. How does the TLS protocol work.mp4 |
58.86MB |
46 |
528.08KB |
46-Chapter 9. The TLS handshake - Part 1.mp4 |
66.04MB |
47 |
322.63KB |
47-Chapter 9. The TLS handshake - Part 2.mp4 |
54.79MB |
48 |
500.14KB |
48-Chapter 9. How TLS 1.3 encrypts application data.mp4 |
75.15MB |
49 |
786.69KB |
49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4 |
53.01MB |
5 |
866.06KB |
50 |
970.24KB |
50-Chapter 10. End-to-end encryption.mp4 |
65.60MB |
51 |
49.30KB |
51-Chapter 10. The failure of encrypted email.mp4 |
51.81MB |
52 |
79.35KB |
52-Chapter 10. Key discovery is a real issue.mp4 |
67.24MB |
53 |
218.01KB |
53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4 |
55.95MB |
54 |
456.15KB |
54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp4 |
74.57MB |
55 |
49.80KB |
55-Chapter 11. User authentication.mp4 |
56.51MB |
56 |
345.72KB |
56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4 |
43.54MB |
57 |
972.08KB |
57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4 |
40.48MB |
58 |
1010.05KB |
58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp4 |
73.68MB |
59 |
234.00KB |
59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4 |
71.31MB |
6 |
442.41KB |
60 |
251.09KB |
60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp4 |
52.63MB |
61 |
352.13KB |
61-Chapter 12. Crypto as in cryptocurrency.mp4 |
56.68MB |
62 |
379.13KB |
62-Chapter 12. A problem of trust Decentralization helps.mp4 |
60.47MB |
63 |
746.86KB |
63-Chapter 12. How does Bitcoin work.mp4 |
71.74MB |
64 |
195.48KB |
64-Chapter 12. Forking hell! Solving conflicts in mining.mp4 |
66.52MB |
65 |
51.74KB |
65-Chapter 12. A tour of cryptocurrencies.mp4 |
63.38MB |
66 |
345.42KB |
66-Chapter 12. A round in the DiemBFT protocol.mp4 |
60.87MB |
67 |
717.92KB |
67-Chapter 13. Hardware cryptography.mp4 |
59.26MB |
68 |
311.45KB |
68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp4 |
49.70MB |
69 |
258.16KB |
69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4 |
48.26MB |
7 |
324.84KB |
70 |
753.58KB |
70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4 |
55.92MB |
71 |
625.16KB |
71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4 |
35.51MB |
72 |
766.31KB |
72-Chapter 13. What solution is good for me.mp4 |
77.43MB |
73 |
966.92KB |
73-Chapter 13. Constant-time programming.mp4 |
77.54MB |
74 |
854.32KB |
74-Chapter 14. Post-quantum cryptography.mp4 |
83.39MB |
75 |
902.56KB |
75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4 |
71.13MB |
76 |
323.41KB |
76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp4 |
35.24MB |
77 |
341.75KB |
77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4 |
53.95MB |
78 |
472.65KB |
78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4 |
48.75MB |
79 |
491.27KB |
79-Chapter 14. Kyber, a lattice-based key exchange.mp4 |
60.53MB |
8 |
598.59KB |
80 |
116.76KB |
80-Chapter 14. Do I need to panic.mp4 |
53.66MB |
81 |
529.09KB |
81-Chapter 15. Is this it Next-generation cryptography.mp4 |
63.83MB |
82 |
895.58KB |
82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4 |
60.68MB |
83 |
847.22KB |
83-Chapter 15 Where is it used..mp4 |
79.54MB |
84 |
498.36KB |
84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4 |
52.77MB |
85 |
775.50KB |
85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4 |
71.88MB |
86 |
1022.33KB |
86-Chapter 16. When and where cryptography fails.mp4 |
79.99MB |
87 |
947.55KB |
87-Chapter 16. Where are the good libraries.mp4 |
50.66MB |
88-Chapter 16. Cryptography is not an island.mp4 |
56.05MB |
89-Appendix. Answers to exercises.mp4 |
43.52MB |
9 |
891.61KB |
TutsNode.com.txt |
63B |