|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 01.1-intro-annotated.pdf |
307.34KB |
| 01.1-intro-annotated.pptx |
293.19KB |
| 01.2-intro-annotated.pdf |
866.09KB |
| 01.2-intro-annotated.pptx |
1.03MB |
| 01.3-intro-annotated.pdf |
1.39MB |
| 01.3-intro-annotated.pptx |
1.57MB |
| 01.4-intro-annotated.pdf |
307.92KB |
| 01.4-intro-annotated.pptx |
407.61KB |
| 02.1-stream-annotated.pdf |
380.28KB |
| 02.1-stream-annotated.pptx |
1.54MB |
| 02.2-stream-annotated.pdf |
331.50KB |
| 02.2-stream-annotated.pptx |
1.15MB |
| 02.3-stream-annotated.pdf |
593.05KB |
| 02.3-stream-annotated.pptx |
1.04MB |
| 02.4-stream-annotated.pdf |
452.05KB |
| 02.4-stream-annotated.pptx |
732.52KB |
| 02.5-stream-annotated.pdf |
301.67KB |
| 02.5-stream-annotated.pptx |
1.33MB |
| 02.6-stream-annotated.pdf |
242.40KB |
| 02.6-stream-annotated.pptx |
268.96KB |
| 02.7-stream-annotated.pdf |
210.13KB |
| 02.7-stream-annotated.pptx |
481.45KB |
| 03.1-block-annotated.pdf |
290.57KB |
| 03.1-block-annotated.pptx |
224.32KB |
| 03.2-block-annotated.pdf |
1.06MB |
| 03.2-block-annotated.pptx |
809.20KB |
| 03.3-block-annotated.pdf |
467.89KB |
| 03.3-block-annotated.pptx |
622.09KB |
| 03.4-block-annotated.pdf |
419.63KB |
| 03.4-block-annotated.pptx |
524.22KB |
| 03.5-block-annotated.pdf |
808.05KB |
| 03.5-block-annotated.pptx |
435.02KB |
| 03.6-block-annotated.pdf |
434.19KB |
| 03.6-block-annotated.pptx |
275.78KB |
| 04.1-using-block-annotated.pdf |
259.45KB |
| 04.1-using-block-annotated.pptx |
415.30KB |
| 04.2-using-block-annotated.pdf |
387.28KB |
| 04.2-using-block-annotated.pptx |
399.32KB |
| 04.3-using-block-annotated.pdf |
316.89KB |
| 04.3-using-block-annotated.pptx |
318.07KB |
| 04.4-using-block-annotated.pdf |
263.42KB |
| 04.4-using-block-annotated.pptx |
366.22KB |
| 04.5-using-block-annotated.pdf |
204.65KB |
| 04.5-using-block-annotated.pptx |
223.83KB |
| 05.1-integrity-message-authentication-codes.pdf |
236.25KB |
| 05.1-integrity-message-authentication-codes.pptx |
279.99KB |
| 05.2-integrity-macs-based-on-PRFs.pdf |
194.29KB |
| 05.2-integrity-macs-based-on-PRFs.pptx |
283.57KB |
| 05.3-integrity-cbc-mac-and-nmac.pdf |
348.08KB |
| 05.3-integrity-cbc-mac-and-nmac.pptx |
325.45KB |
| 05.4-integrity-mac-padding.pdf |
199.94KB |
| 05.4-integrity-mac-padding.pptx |
249.32KB |
| 05.5-integrity-a-parallel-mac.pdf |
223.58KB |
| 05.5-integrity-a-parallel-mac.pptx |
240.70KB |
| 06.1-collision-resistance-introduction.pdf |
230.19KB |
| 06.1-collision-resistance-introduction.pptx |
204.39KB |
| 06.2-collision-resistance-generic-birthday-attack.pdf |
245.86KB |
| 06.2-collision-resistance-generic-birthday-attack.pptx |
514.73KB |
| 06.3-collision-resistance-the-merkle-damgard-paradigm.pdf |
258.63KB |
| 06.3-collision-resistance-the-merkle-damgard-paradigm.pptx |
817.76KB |
| 06.4-collision-resistance-constructing-compression-functions.pdf |
232.22KB |
| 06.4-collision-resistance-constructing-compression-functions.pptx |
240.14KB |
| 06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf |
200.02KB |
| 06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx |
243.33KB |
| 06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf |
267.74KB |
| 06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx |
325.72KB |
| 07.1-authenc-annotated.pdf |
873.34KB |
| 07.1-authenc-annotated.pptx |
547.85KB |
| 07.2-authenc-annotated.pdf |
533.29KB |
| 07.2-authenc-annotated.pptx |
222.28KB |
| 07.3-authenc-annotated.pdf |
681.45KB |
| 07.3-authenc-annotated.pptx |
261.90KB |
| 07.4-authenc-annotated.pdf |
685.97KB |
| 07.4-authenc-annotated.pptx |
246.32KB |
| 07.5-authenc-annotated.pdf |
672.57KB |
| 07.5-authenc-annotated.pptx |
351.07KB |
| 07.6-authenc-annotated.pdf |
715.66KB |
| 07.6-authenc-annotated.pptx |
380.94KB |
| 07.7-authenc-annotated.pdf |
461.98KB |
| 07.7-authenc-annotated.pptx |
237.26KB |
| 08.1-odds-and-ends.pdf |
328.66KB |
| 08.1-odds-and-ends.pptx |
205.82KB |
| 08.2-odds-and-ends.pdf |
449.21KB |
| 08.2-odds-and-ends.pptx |
264.10KB |
| 08.3-odds-and-ends.pdf |
515.40KB |
| 08.3-odds-and-ends.pptx |
512.96KB |
| 08.4-odds-and-ends.pdf |
550.71KB |
| 08.4-odds-and-ends.pptx |
449.88KB |
| 08.5-odds-and-ends.pdf |
375.59KB |
| 08.5-odds-and-ends.pptx |
239.28KB |
| 09.1-basic-key-exchange-annotated.pdf |
223.10KB |
| 09.1-basic-key-exchange-annotated.pptx |
602.48KB |
| 09.2-basic-key-exchange-annotated.pdf |
229.86KB |
| 09.2-basic-key-exchange-annotated.pptx |
210.22KB |
| 09.3-basic-key-exchange-annotated.pdf |
434.87KB |
| 09.3-basic-key-exchange-annotated.pptx |
735.20KB |
| 09.4-basic-key-exchange-annotated.pdf |
268.92KB |
| 09.4-basic-key-exchange-annotated.pptx |
478.41KB |
| 10.1-numth-annotated.pdf |
241.83KB |
| 10.1-numth-annotated.pptx |
521.77KB |
| 10.2-numth-annotated.pdf |
187.29KB |
| 10.2-numth-annotated.pptx |
205.79KB |
| 10.3-numth-annotated.pdf |
287.45KB |
| 10.3-numth-annotated.pptx |
464.10KB |
| 10.4-numth-annotated.pdf |
269.58KB |
| 10.4-numth-annotated.pptx |
224.15KB |
| 10.5-numth-annotated.pdf |
236.15KB |
| 10.5-numth-annotated.pptx |
234.48KB |
| 10 - 1 - Notation (15 min).mp4 |
15.70MB |
| 10 - 1 - Notation (15 min).srt |
19.22KB |
| 10 - 1 - Notation (15 min).txt |
13.02KB |
| 10 - 2 - Fermat and Euler (18 min).mp4 |
20.06MB |
| 10 - 2 - Fermat and Euler (18 min).srt |
25.64KB |
| 10 - 2 - Fermat and Euler (18 min).txt |
17.55KB |
| 10 - 3 - Modular e'th roots (17 min).mp4 |
19.09MB |
| 10 - 3 - Modular e'th roots (17 min).srt |
22.89KB |
| 10 - 3 - Modular e'th roots (17 min).txt |
15.47KB |
| 10 - 4 - Arithmetic algorithms (13 min).mp4 |
13.89MB |
| 10 - 4 - Arithmetic algorithms (13 min).srt |
18.02KB |
| 10 - 4 - Arithmetic algorithms (13 min).txt |
12.30KB |
| 10 - 5 - Intractable problems (19 min).mp4 |
21.22MB |
| 10 - 5 - Intractable problems (19 min).srt |
27.14KB |
| 10 - 5 - Intractable problems (19 min).txt |
18.08KB |
| 11.1-pubkey-trapdoor.pdf |
549.58KB |
| 11.1-pubkey-trapdoor.pptx |
351.32KB |
| 11.2-pubkey-trapdoor.pdf |
211.62KB |
| 11.2-pubkey-trapdoor.pptx |
186.90KB |
| 11.3-pubkey-trapdoor.pdf |
239.02KB |
| 11.3-pubkey-trapdoor.pptx |
199.52KB |
| 11.4-pubkey-trapdoor.pdf |
264.40KB |
| 11.4-pubkey-trapdoor.pptx |
204.47KB |
| 11.5-pubkey-trapdoor.pdf |
166.27KB |
| 11.5-pubkey-trapdoor.pptx |
181.70KB |
| 11.6-pubkey-trapdoor.pdf |
184.75KB |
| 11.6-pubkey-trapdoor.pptx |
185.20KB |
| 11 - 1 - Definitions and security (16 min).mp4 |
17.22MB |
| 11 - 1 - Definitions and security (16 min).srt |
24.16KB |
| 11 - 1 - Definitions and security (16 min).txt |
16.51KB |
| 11 - 2 - Constructions (11 min) .mp4 |
11.29MB |
| 11 - 2 - Constructions (11 min) .srt |
16.45KB |
| 11 - 2 - Constructions (11 min) .txt |
11.25KB |
| 11 - 3 - The RSA trapdoor permutation (18 min).mp4 |
19.82MB |
| 11 - 3 - The RSA trapdoor permutation (18 min).srt |
26.18KB |
| 11 - 3 - The RSA trapdoor permutation (18 min).txt |
17.94KB |
| 11 - 4 - PKCS 1 (23 min).mp4 |
23.40MB |
| 11 - 4 - PKCS 1 (23 min).srt |
30.69KB |
| 11 - 4 - PKCS 1 (23 min).txt |
21.00KB |
| 11 - 5 - Is RSA a one-way function_ (17 min).mp4 |
18.53MB |
| 11 - 5 - Is RSA a one-way function_ (17 min).srt |
15.36KB |
| 11 - 5 - Is RSA a one-way function_ (17 min).txt |
8.38KB |
| 11 - 6 - RSA in practice (14 min).mp4 |
15.63MB |
| 11 - 6 - RSA in practice (14 min).srt |
3.61KB |
| 11 - 6 - RSA in practice (14 min).txt |
2.06KB |
| 1 - 1 - Course Overview (11 min).mp4 |
11.72MB |
| 1 - 1 - Course Overview (11 min).srt |
16.74KB |
| 1 - 1 - Course Overview (11 min).txt |
11.46KB |
| 12.1-pubkey-dh.pdf |
536.15KB |
| 12.1-pubkey-dh.pptx |
308.88KB |
| 12.2-pubkey-dh.pdf |
294.64KB |
| 12.2-pubkey-dh.pptx |
194.14KB |
| 12.3-pubkey-dh.pdf |
179.30KB |
| 12.3-pubkey-dh.pptx |
186.18KB |
| 12.4-pubkey-dh.pdf |
196.60KB |
| 12.4-pubkey-dh.pptx |
191.08KB |
| 12.5-pubkey-dh.pdf |
320.82KB |
| 12.5-pubkey-dh.pptx |
180.23KB |
| 12 - 1 - The ElGamal Public-key System (23 min).mp4 |
1.66MB |
| 12 - 1 - The ElGamal Public-key System (23 min).srt |
36.98KB |
| 12 - 1 - The ElGamal Public-key System (23 min).txt |
21.24KB |
| 12 - 2 - ElGamal Security (14 min).mp4 |
4.69MB |
| 12 - 2 - ElGamal Security (14 min).srt |
21.52KB |
| 12 - 2 - ElGamal Security (14 min).txt |
14.69KB |
| 12 - 3 - ElGamal Variants With Better Security (11 min).mp4 |
11.27MB |
| 12 - 3 - ElGamal Variants With Better Security (11 min).srt |
16.81KB |
| 12 - 3 - ElGamal Variants With Better Security (11 min).txt |
11.54KB |
| 12 - 4 - A Unifying Theme (12 min).mp4 |
12.93MB |
| 12 - 4 - A Unifying Theme (12 min).srt |
17.83KB |
| 12 - 4 - A Unifying Theme (12 min).txt |
12.23KB |
| 12 - 5 - Farewell (for now) (6 min).mp4 |
5.73MB |
| 12 - 5 - Farewell (for now) (6 min).srt |
9.01KB |
| 12 - 5 - Farewell (for now) (6 min).txt |
6.20KB |
| 1 - 2 - What is cryptography_ (15 min).mp4 |
17.01MB |
| 1 - 2 - What is cryptography_ (15 min).srt |
25.42KB |
| 1 - 2 - What is cryptography_ (15 min).txt |
17.37KB |
| 1 - 3 - History of cryptography (19 min).mp4 |
20.47MB |
| 1 - 3 - History of cryptography (19 min).srt |
26.25KB |
| 1 - 3 - History of cryptography (19 min).txt |
17.97KB |
| 1 - 4 - Discrete probability (16 min).mp4 |
17.46MB |
| 1 - 4 - Discrete probability (16 min).srt |
23.05KB |
| 1 - 4 - Discrete probability (16 min).txt |
15.74KB |
| 2 - 1 - Information theoretic security and the one time pad (19 min).mp4 |
20.04MB |
| 2 - 1 - Information theoretic security and the one time pad (19 min).srt |
25.71KB |
| 2 - 1 - Information theoretic security and the one time pad (19 min).txt |
17.58KB |
| 2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 |
21.17MB |
| 2 - 2 - Stream ciphers and pseudo random generators (20 min).srt |
28.38KB |
| 2 - 2 - Stream ciphers and pseudo random generators (20 min).txt |
19.39KB |
| 2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 |
25.43MB |
| 2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt |
34.82KB |
| 2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt |
23.76KB |
| 2 - 4 - Real-world stream ciphers (20 min).mp4 |
21.87MB |
| 2 - 4 - Real-world stream ciphers (20 min).srt |
27.70KB |
| 2 - 4 - Real-world stream ciphers (20 min).txt |
18.90KB |
| 2 - 5 - PRG Security Definitions (25 min).mp4 |
26.80MB |
| 2 - 5 - PRG Security Definitions (25 min).srt |
35.79KB |
| 2 - 5 - PRG Security Definitions (25 min).txt |
24.35KB |
| 2 - 6 - Semantic Security (16 min).mp4 |
16.80MB |
| 2 - 6 - Semantic Security (16 min).srt |
23.98KB |
| 2 - 6 - Semantic Security (16 min).txt |
16.30KB |
| 2 - 7 - Stream ciphers are semantically secure (11 min).mp4 |
11.73MB |
| 2 - 7 - Stream ciphers are semantically secure (11 min).srt |
16.21KB |
| 2 - 7 - Stream ciphers are semantically secure (11 min).txt |
11.05KB |
| 3 - 1 - What are block ciphers_ (17 min).mp4 |
18.67MB |
| 3 - 1 - What are block ciphers_ (17 min).srt |
24.94KB |
| 3 - 1 - What are block ciphers_ (17 min).txt |
16.92KB |
| 3 - 2 - The Data Encryption Standard (22 min).mp4 |
24.50MB |
| 3 - 2 - The Data Encryption Standard (22 min).srt |
31.00KB |
| 3 - 2 - The Data Encryption Standard (22 min).txt |
21.13KB |
| 3 - 3 - Exhaustive search attacks (20 min).mp4 |
21.91MB |
| 3 - 3 - Exhaustive search attacks (20 min).srt |
27.31KB |
| 3 - 3 - Exhaustive search attacks (20 min).txt |
18.84KB |
| 3 - 4 - More attacks on block ciphers (16 min).mp4 |
16.17MB |
| 3 - 4 - More attacks on block ciphers (16 min).srt |
25.03KB |
| 3 - 4 - More attacks on block ciphers (16 min).txt |
17.05KB |
| 3 - 5 - The AES block cipher (14 min).mp4 |
14.52MB |
| 3 - 5 - The AES block cipher (14 min).srt |
20.26KB |
| 3 - 5 - The AES block cipher (14 min).txt |
13.87KB |
| 3 - 6 - Block ciphers from PRGs(12 min).mp4 |
12.88MB |
| 3 - 6 - Block ciphers from PRGs(12 min).srt |
17.48KB |
| 3 - 6 - Block ciphers from PRGs(12 min).txt |
11.99KB |
| 4 - 1 - Review_ PRPs and PRFs (12 min).mp4 |
12.72MB |
| 4 - 1 - Review_ PRPs and PRFs (12 min).srt |
16.86KB |
| 4 - 1 - Review_ PRPs and PRFs (12 min).txt |
11.55KB |
| 4 - 2 - Modes of operation_ one time key (8 min).mp4 |
7.98MB |
| 4 - 2 - Modes of operation_ one time key (8 min).srt |
11.81KB |
| 4 - 2 - Modes of operation_ one time key (8 min).txt |
8.09KB |
| 4 - 3 - Security for many-time key (23 min).mp4 |
24.92MB |
| 4 - 3 - Security for many-time key (23 min).srt |
34.34KB |
| 4 - 3 - Security for many-time key (23 min).txt |
23.43KB |
| 4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 |
17.96MB |
| 4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt |
22.57KB |
| 4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt |
15.41KB |
| 4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 |
10.44MB |
| 4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt |
14.14KB |
| 4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt |
9.69KB |
| 5 - 1 - Message Authentication Codes (16 min).mp4 |
16.55MB |
| 5 - 1 - Message Authentication Codes (16 min).srt |
23.41KB |
| 5 - 1 - Message Authentication Codes (16 min).txt |
15.83KB |
| 5 - 2 - MACs Based On PRFs (10 min).mp4 |
11.18MB |
| 5 - 2 - MACs Based On PRFs (10 min).srt |
15.36KB |
| 5 - 2 - MACs Based On PRFs (10 min).txt |
10.53KB |
| 5 - 3 - CBC-MAC and NMAC (20 min).mp4 |
22.34MB |
| 5 - 3 - CBC-MAC and NMAC (20 min).srt |
29.21KB |
| 5 - 3 - CBC-MAC and NMAC (20 min).txt |
20.00KB |
| 5 - 4 - MAC padding (9 min).mp4 |
9.30MB |
| 5 - 4 - MAC padding (9 min).srt |
13.19KB |
| 5 - 4 - MAC padding (9 min).txt |
9.03KB |
| 5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 |
17.06MB |
| 5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt |
24.36KB |
| 5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt |
16.68KB |
| 6 - 1 - Introduction (11 min).mp4 |
11.92MB |
| 6 - 1 - Introduction (11 min).srt |
16.70KB |
| 6 - 1 - Introduction (11 min).txt |
11.46KB |
| 6 - 2 - Generic birthday attack (16 min).mp4 |
16.14MB |
| 6 - 2 - Generic birthday attack (16 min).srt |
22.09KB |
| 6 - 2 - Generic birthday attack (16 min).txt |
15.15KB |
| 6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 |
12.58MB |
| 6 - 3 - The Merkle-Damgard Paradigm (12 min).srt |
17.53KB |
| 6 - 3 - The Merkle-Damgard Paradigm (12 min).txt |
12.04KB |
| 6 - 4 - Constructing compression functions (8 min).mp4 |
8.78MB |
| 6 - 4 - Constructing compression functions (8 min).srt |
12.89KB |
| 6 - 4 - Constructing compression functions (8 min).txt |
8.80KB |
| 6 - 5 - HMAC (7 min).mp4 |
7.83MB |
| 6 - 5 - HMAC (7 min).srt |
10.06KB |
| 6 - 5 - HMAC (7 min).txt |
6.89KB |
| 6 - 6 - Timing attacks on MAC verification (9 min).mp4 |
9.39MB |
| 6 - 6 - Timing attacks on MAC verification (9 min).srt |
13.35KB |
| 6 - 6 - Timing attacks on MAC verification (9 min).txt |
9.15KB |
| 7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 |
14.02MB |
| 7 - 1 - Active attacks on CPA-secure encryption (13 min).srt |
19.50KB |
| 7 - 1 - Active attacks on CPA-secure encryption (13 min).txt |
13.34KB |
| 7 - 2 - Definitions (6 min).mp4 |
5.61MB |
| 7 - 2 - Definitions (6 min).srt |
8.20KB |
| 7 - 2 - Definitions (6 min).txt |
5.61KB |
| 7 - 3 - Chosen ciphertext attacks (12 min).mp4 |
13.04MB |
| 7 - 3 - Chosen ciphertext attacks (12 min).srt |
18.72KB |
| 7 - 3 - Chosen ciphertext attacks (12 min).txt |
12.81KB |
| 7 - 4 - Constructions from ciphers and MACs (21 min).mp4 |
22.84MB |
| 7 - 4 - Constructions from ciphers and MACs (21 min).srt |
30.66KB |
| 7 - 4 - Constructions from ciphers and MACs (21 min).txt |
20.94KB |
| 7 - 5 - Case study_ TLS (18 min).mp4 |
18.96MB |
| 7 - 5 - Case study_ TLS (18 min).srt |
26.42KB |
| 7 - 5 - Case study_ TLS (18 min).txt |
18.11KB |
| 7 - 6 - CBC padding attacks (14 min).mp4 |
14.99MB |
| 7 - 6 - CBC padding attacks (14 min).srt |
21.20KB |
| 7 - 6 - CBC padding attacks (14 min).txt |
14.56KB |
| 7 - 7 - Attacking non-atomic decryption (10 min).mp4 |
11.09MB |
| 7 - 7 - Attacking non-atomic decryption (10 min).srt |
14.79KB |
| 7 - 7 - Attacking non-atomic decryption (10 min).txt |
10.14KB |
| 8 - 1 - Key Derivation (14 min).mp4 |
5.29MB |
| 8 - 1 - Key Derivation (14 min).srt |
21.53KB |
| 8 - 1 - Key Derivation (14 min).txt |
14.73KB |
| 8 - 2 - Deterministic Encryption (15 min).mp4 |
15.62MB |
| 8 - 2 - Deterministic Encryption (15 min).srt |
23.03KB |
| 8 - 2 - Deterministic Encryption (15 min).txt |
15.79KB |
| 8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 |
22.06MB |
| 8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt |
30.85KB |
| 8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt |
21.09KB |
| 8 - 4 - Tweakable encryption (15 min).mp4 |
15.58MB |
| 8 - 4 - Tweakable encryption (15 min).srt |
21.97KB |
| 8 - 4 - Tweakable encryption (15 min).txt |
15.03KB |
| 8 - 5 - Format preserving encryption (13 min).mp4 |
13.21MB |
| 8 - 5 - Format preserving encryption (13 min).srt |
18.57KB |
| 8 - 5 - Format preserving encryption (13 min).txt |
12.74KB |
| 9 - 1 - Trusted 3rd parties (11 min).mp4 |
12.22MB |
| 9 - 1 - Trusted 3rd parties (11 min).srt |
17.32KB |
| 9 - 1 - Trusted 3rd parties (11 min).txt |
11.90KB |
| 9 - 2 - Merkle Puzzles (11 min).mp4 |
12.40MB |
| 9 - 2 - Merkle Puzzles (11 min).srt |
19.66KB |
| 9 - 2 - Merkle Puzzles (11 min).txt |
11.83KB |
| 9 - 3 - The Diffie-Hellman protocol (19 min).mp4 |
20.96MB |
| 9 - 3 - The Diffie-Hellman protocol (19 min).srt |
29.18KB |
| 9 - 3 - The Diffie-Hellman protocol (19 min).txt |
19.97KB |
| 9 - 4 - Public-key encryption (11 min).mp4 |
11.83MB |
| 9 - 4 - Public-key encryption (11 min).srt |
16.95KB |
| 9 - 4 - Public-key encryption (11 min).txt |
11.60KB |