Torrent Info
Title Cryprography
Category
Size 1.03GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01.1-intro-annotated.pdf 307.34KB
01.1-intro-annotated.pptx 293.19KB
01.2-intro-annotated.pdf 866.09KB
01.2-intro-annotated.pptx 1.03MB
01.3-intro-annotated.pdf 1.39MB
01.3-intro-annotated.pptx 1.57MB
01.4-intro-annotated.pdf 307.92KB
01.4-intro-annotated.pptx 407.61KB
02.1-stream-annotated.pdf 380.28KB
02.1-stream-annotated.pptx 1.54MB
02.2-stream-annotated.pdf 331.50KB
02.2-stream-annotated.pptx 1.15MB
02.3-stream-annotated.pdf 593.05KB
02.3-stream-annotated.pptx 1.04MB
02.4-stream-annotated.pdf 452.05KB
02.4-stream-annotated.pptx 732.52KB
02.5-stream-annotated.pdf 301.67KB
02.5-stream-annotated.pptx 1.33MB
02.6-stream-annotated.pdf 242.40KB
02.6-stream-annotated.pptx 268.96KB
02.7-stream-annotated.pdf 210.13KB
02.7-stream-annotated.pptx 481.45KB
03.1-block-annotated.pdf 290.57KB
03.1-block-annotated.pptx 224.32KB
03.2-block-annotated.pdf 1.06MB
03.2-block-annotated.pptx 809.20KB
03.3-block-annotated.pdf 467.89KB
03.3-block-annotated.pptx 622.09KB
03.4-block-annotated.pdf 419.63KB
03.4-block-annotated.pptx 524.22KB
03.5-block-annotated.pdf 808.05KB
03.5-block-annotated.pptx 435.02KB
03.6-block-annotated.pdf 434.19KB
03.6-block-annotated.pptx 275.78KB
04.1-using-block-annotated.pdf 259.45KB
04.1-using-block-annotated.pptx 415.30KB
04.2-using-block-annotated.pdf 387.28KB
04.2-using-block-annotated.pptx 399.32KB
04.3-using-block-annotated.pdf 316.89KB
04.3-using-block-annotated.pptx 318.07KB
04.4-using-block-annotated.pdf 263.42KB
04.4-using-block-annotated.pptx 366.22KB
04.5-using-block-annotated.pdf 204.65KB
04.5-using-block-annotated.pptx 223.83KB
05.1-integrity-message-authentication-codes.pdf 236.25KB
05.1-integrity-message-authentication-codes.pptx 279.99KB
05.2-integrity-macs-based-on-PRFs.pdf 194.29KB
05.2-integrity-macs-based-on-PRFs.pptx 283.57KB
05.3-integrity-cbc-mac-and-nmac.pdf 348.08KB
05.3-integrity-cbc-mac-and-nmac.pptx 325.45KB
05.4-integrity-mac-padding.pdf 199.94KB
05.4-integrity-mac-padding.pptx 249.32KB
05.5-integrity-a-parallel-mac.pdf 223.58KB
05.5-integrity-a-parallel-mac.pptx 240.70KB
06.1-collision-resistance-introduction.pdf 230.19KB
06.1-collision-resistance-introduction.pptx 204.39KB
06.2-collision-resistance-generic-birthday-attack.pdf 245.86KB
06.2-collision-resistance-generic-birthday-attack.pptx 514.73KB
06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 258.63KB
06.3-collision-resistance-the-merkle-damgard-paradigm.pptx 817.76KB
06.4-collision-resistance-constructing-compression-functions.pdf 232.22KB
06.4-collision-resistance-constructing-compression-functions.pptx 240.14KB
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 200.02KB
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx 243.33KB
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 267.74KB
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx 325.72KB
07.1-authenc-annotated.pdf 873.34KB
07.1-authenc-annotated.pptx 547.85KB
07.2-authenc-annotated.pdf 533.29KB
07.2-authenc-annotated.pptx 222.28KB
07.3-authenc-annotated.pdf 681.45KB
07.3-authenc-annotated.pptx 261.90KB
07.4-authenc-annotated.pdf 685.97KB
07.4-authenc-annotated.pptx 246.32KB
07.5-authenc-annotated.pdf 672.57KB
07.5-authenc-annotated.pptx 351.07KB
07.6-authenc-annotated.pdf 715.66KB
07.6-authenc-annotated.pptx 380.94KB
07.7-authenc-annotated.pdf 461.98KB
07.7-authenc-annotated.pptx 237.26KB
08.1-odds-and-ends.pdf 328.66KB
08.1-odds-and-ends.pptx 205.82KB
08.2-odds-and-ends.pdf 449.21KB
08.2-odds-and-ends.pptx 264.10KB
08.3-odds-and-ends.pdf 515.40KB
08.3-odds-and-ends.pptx 512.96KB
08.4-odds-and-ends.pdf 550.71KB
08.4-odds-and-ends.pptx 449.88KB
08.5-odds-and-ends.pdf 375.59KB
08.5-odds-and-ends.pptx 239.28KB
09.1-basic-key-exchange-annotated.pdf 223.10KB
09.1-basic-key-exchange-annotated.pptx 602.48KB
09.2-basic-key-exchange-annotated.pdf 229.86KB
09.2-basic-key-exchange-annotated.pptx 210.22KB
09.3-basic-key-exchange-annotated.pdf 434.87KB
09.3-basic-key-exchange-annotated.pptx 735.20KB
09.4-basic-key-exchange-annotated.pdf 268.92KB
09.4-basic-key-exchange-annotated.pptx 478.41KB
10.1-numth-annotated.pdf 241.83KB
10.1-numth-annotated.pptx 521.77KB
10.2-numth-annotated.pdf 187.29KB
10.2-numth-annotated.pptx 205.79KB
10.3-numth-annotated.pdf 287.45KB
10.3-numth-annotated.pptx 464.10KB
10.4-numth-annotated.pdf 269.58KB
10.4-numth-annotated.pptx 224.15KB
10.5-numth-annotated.pdf 236.15KB
10.5-numth-annotated.pptx 234.48KB
10 - 1 - Notation (15 min).mp4 15.70MB
10 - 1 - Notation (15 min).srt 19.22KB
10 - 1 - Notation (15 min).txt 13.02KB
10 - 2 - Fermat and Euler (18 min).mp4 20.06MB
10 - 2 - Fermat and Euler (18 min).srt 25.64KB
10 - 2 - Fermat and Euler (18 min).txt 17.55KB
10 - 3 - Modular e'th roots (17 min).mp4 19.09MB
10 - 3 - Modular e'th roots (17 min).srt 22.89KB
10 - 3 - Modular e'th roots (17 min).txt 15.47KB
10 - 4 - Arithmetic algorithms (13 min).mp4 13.89MB
10 - 4 - Arithmetic algorithms (13 min).srt 18.02KB
10 - 4 - Arithmetic algorithms (13 min).txt 12.30KB
10 - 5 - Intractable problems (19 min).mp4 21.22MB
10 - 5 - Intractable problems (19 min).srt 27.14KB
10 - 5 - Intractable problems (19 min).txt 18.08KB
11.1-pubkey-trapdoor.pdf 549.58KB
11.1-pubkey-trapdoor.pptx 351.32KB
11.2-pubkey-trapdoor.pdf 211.62KB
11.2-pubkey-trapdoor.pptx 186.90KB
11.3-pubkey-trapdoor.pdf 239.02KB
11.3-pubkey-trapdoor.pptx 199.52KB
11.4-pubkey-trapdoor.pdf 264.40KB
11.4-pubkey-trapdoor.pptx 204.47KB
11.5-pubkey-trapdoor.pdf 166.27KB
11.5-pubkey-trapdoor.pptx 181.70KB
11.6-pubkey-trapdoor.pdf 184.75KB
11.6-pubkey-trapdoor.pptx 185.20KB
11 - 1 - Definitions and security (16 min).mp4 17.22MB
11 - 1 - Definitions and security (16 min).srt 24.16KB
11 - 1 - Definitions and security (16 min).txt 16.51KB
11 - 2 - Constructions (11 min) .mp4 11.29MB
11 - 2 - Constructions (11 min) .srt 16.45KB
11 - 2 - Constructions (11 min) .txt 11.25KB
11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82MB
11 - 3 - The RSA trapdoor permutation (18 min).srt 26.18KB
11 - 3 - The RSA trapdoor permutation (18 min).txt 17.94KB
11 - 4 - PKCS 1 (23 min).mp4 23.40MB
11 - 4 - PKCS 1 (23 min).srt 30.69KB
11 - 4 - PKCS 1 (23 min).txt 21.00KB
11 - 5 - Is RSA a one-way function_ (17 min).mp4 18.53MB
11 - 5 - Is RSA a one-way function_ (17 min).srt 15.36KB
11 - 5 - Is RSA a one-way function_ (17 min).txt 8.38KB
11 - 6 - RSA in practice (14 min).mp4 15.63MB
11 - 6 - RSA in practice (14 min).srt 3.61KB
11 - 6 - RSA in practice (14 min).txt 2.06KB
1 - 1 - Course Overview (11 min).mp4 11.72MB
1 - 1 - Course Overview (11 min).srt 16.74KB
1 - 1 - Course Overview (11 min).txt 11.46KB
12.1-pubkey-dh.pdf 536.15KB
12.1-pubkey-dh.pptx 308.88KB
12.2-pubkey-dh.pdf 294.64KB
12.2-pubkey-dh.pptx 194.14KB
12.3-pubkey-dh.pdf 179.30KB
12.3-pubkey-dh.pptx 186.18KB
12.4-pubkey-dh.pdf 196.60KB
12.4-pubkey-dh.pptx 191.08KB
12.5-pubkey-dh.pdf 320.82KB
12.5-pubkey-dh.pptx 180.23KB
12 - 1 - The ElGamal Public-key System (23 min).mp4 1.66MB
12 - 1 - The ElGamal Public-key System (23 min).srt 36.98KB
12 - 1 - The ElGamal Public-key System (23 min).txt 21.24KB
12 - 2 - ElGamal Security (14 min).mp4 4.69MB
12 - 2 - ElGamal Security (14 min).srt 21.52KB
12 - 2 - ElGamal Security (14 min).txt 14.69KB
12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27MB
12 - 3 - ElGamal Variants With Better Security (11 min).srt 16.81KB
12 - 3 - ElGamal Variants With Better Security (11 min).txt 11.54KB
12 - 4 - A Unifying Theme (12 min).mp4 12.93MB
12 - 4 - A Unifying Theme (12 min).srt 17.83KB
12 - 4 - A Unifying Theme (12 min).txt 12.23KB
12 - 5 - Farewell (for now) (6 min).mp4 5.73MB
12 - 5 - Farewell (for now) (6 min).srt 9.01KB
12 - 5 - Farewell (for now) (6 min).txt 6.20KB
1 - 2 - What is cryptography_ (15 min).mp4 17.01MB
1 - 2 - What is cryptography_ (15 min).srt 25.42KB
1 - 2 - What is cryptography_ (15 min).txt 17.37KB
1 - 3 - History of cryptography (19 min).mp4 20.47MB
1 - 3 - History of cryptography (19 min).srt 26.25KB
1 - 3 - History of cryptography (19 min).txt 17.97KB
1 - 4 - Discrete probability (16 min).mp4 17.46MB
1 - 4 - Discrete probability (16 min).srt 23.05KB
1 - 4 - Discrete probability (16 min).txt 15.74KB
2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20.04MB
2 - 1 - Information theoretic security and the one time pad (19 min).srt 25.71KB
2 - 1 - Information theoretic security and the one time pad (19 min).txt 17.58KB
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.17MB
2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28.38KB
2 - 2 - Stream ciphers and pseudo random generators (20 min).txt 19.39KB
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43MB
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 34.82KB
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt 23.76KB
2 - 4 - Real-world stream ciphers (20 min).mp4 21.87MB
2 - 4 - Real-world stream ciphers (20 min).srt 27.70KB
2 - 4 - Real-world stream ciphers (20 min).txt 18.90KB
2 - 5 - PRG Security Definitions (25 min).mp4 26.80MB
2 - 5 - PRG Security Definitions (25 min).srt 35.79KB
2 - 5 - PRG Security Definitions (25 min).txt 24.35KB
2 - 6 - Semantic Security (16 min).mp4 16.80MB
2 - 6 - Semantic Security (16 min).srt 23.98KB
2 - 6 - Semantic Security (16 min).txt 16.30KB
2 - 7 - Stream ciphers are semantically secure (11 min).mp4 11.73MB
2 - 7 - Stream ciphers are semantically secure (11 min).srt 16.21KB
2 - 7 - Stream ciphers are semantically secure (11 min).txt 11.05KB
3 - 1 - What are block ciphers_ (17 min).mp4 18.67MB
3 - 1 - What are block ciphers_ (17 min).srt 24.94KB
3 - 1 - What are block ciphers_ (17 min).txt 16.92KB
3 - 2 - The Data Encryption Standard (22 min).mp4 24.50MB
3 - 2 - The Data Encryption Standard (22 min).srt 31.00KB
3 - 2 - The Data Encryption Standard (22 min).txt 21.13KB
3 - 3 - Exhaustive search attacks (20 min).mp4 21.91MB
3 - 3 - Exhaustive search attacks (20 min).srt 27.31KB
3 - 3 - Exhaustive search attacks (20 min).txt 18.84KB
3 - 4 - More attacks on block ciphers (16 min).mp4 16.17MB
3 - 4 - More attacks on block ciphers (16 min).srt 25.03KB
3 - 4 - More attacks on block ciphers (16 min).txt 17.05KB
3 - 5 - The AES block cipher (14 min).mp4 14.52MB
3 - 5 - The AES block cipher (14 min).srt 20.26KB
3 - 5 - The AES block cipher (14 min).txt 13.87KB
3 - 6 - Block ciphers from PRGs(12 min).mp4 12.88MB
3 - 6 - Block ciphers from PRGs(12 min).srt 17.48KB
3 - 6 - Block ciphers from PRGs(12 min).txt 11.99KB
4 - 1 - Review_ PRPs and PRFs (12 min).mp4 12.72MB
4 - 1 - Review_ PRPs and PRFs (12 min).srt 16.86KB
4 - 1 - Review_ PRPs and PRFs (12 min).txt 11.55KB
4 - 2 - Modes of operation_ one time key (8 min).mp4 7.98MB
4 - 2 - Modes of operation_ one time key (8 min).srt 11.81KB
4 - 2 - Modes of operation_ one time key (8 min).txt 8.09KB
4 - 3 - Security for many-time key (23 min).mp4 24.92MB
4 - 3 - Security for many-time key (23 min).srt 34.34KB
4 - 3 - Security for many-time key (23 min).txt 23.43KB
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 17.96MB
4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 22.57KB
4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt 15.41KB
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10.44MB
4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14.14KB
4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt 9.69KB
5 - 1 - Message Authentication Codes (16 min).mp4 16.55MB
5 - 1 - Message Authentication Codes (16 min).srt 23.41KB
5 - 1 - Message Authentication Codes (16 min).txt 15.83KB
5 - 2 - MACs Based On PRFs (10 min).mp4 11.18MB
5 - 2 - MACs Based On PRFs (10 min).srt 15.36KB
5 - 2 - MACs Based On PRFs (10 min).txt 10.53KB
5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.34MB
5 - 3 - CBC-MAC and NMAC (20 min).srt 29.21KB
5 - 3 - CBC-MAC and NMAC (20 min).txt 20.00KB
5 - 4 - MAC padding (9 min).mp4 9.30MB
5 - 4 - MAC padding (9 min).srt 13.19KB
5 - 4 - MAC padding (9 min).txt 9.03KB
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06MB
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36KB
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt 16.68KB
6 - 1 - Introduction (11 min).mp4 11.92MB
6 - 1 - Introduction (11 min).srt 16.70KB
6 - 1 - Introduction (11 min).txt 11.46KB
6 - 2 - Generic birthday attack (16 min).mp4 16.14MB
6 - 2 - Generic birthday attack (16 min).srt 22.09KB
6 - 2 - Generic birthday attack (16 min).txt 15.15KB
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.58MB
6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 17.53KB
6 - 3 - The Merkle-Damgard Paradigm (12 min).txt 12.04KB
6 - 4 - Constructing compression functions (8 min).mp4 8.78MB
6 - 4 - Constructing compression functions (8 min).srt 12.89KB
6 - 4 - Constructing compression functions (8 min).txt 8.80KB
6 - 5 - HMAC (7 min).mp4 7.83MB
6 - 5 - HMAC (7 min).srt 10.06KB
6 - 5 - HMAC (7 min).txt 6.89KB
6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.39MB
6 - 6 - Timing attacks on MAC verification (9 min).srt 13.35KB
6 - 6 - Timing attacks on MAC verification (9 min).txt 9.15KB
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.02MB
7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 19.50KB
7 - 1 - Active attacks on CPA-secure encryption (13 min).txt 13.34KB
7 - 2 - Definitions (6 min).mp4 5.61MB
7 - 2 - Definitions (6 min).srt 8.20KB
7 - 2 - Definitions (6 min).txt 5.61KB
7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.04MB
7 - 3 - Chosen ciphertext attacks (12 min).srt 18.72KB
7 - 3 - Chosen ciphertext attacks (12 min).txt 12.81KB
7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.84MB
7 - 4 - Constructions from ciphers and MACs (21 min).srt 30.66KB
7 - 4 - Constructions from ciphers and MACs (21 min).txt 20.94KB
7 - 5 - Case study_ TLS (18 min).mp4 18.96MB
7 - 5 - Case study_ TLS (18 min).srt 26.42KB
7 - 5 - Case study_ TLS (18 min).txt 18.11KB
7 - 6 - CBC padding attacks (14 min).mp4 14.99MB
7 - 6 - CBC padding attacks (14 min).srt 21.20KB
7 - 6 - CBC padding attacks (14 min).txt 14.56KB
7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.09MB
7 - 7 - Attacking non-atomic decryption (10 min).srt 14.79KB
7 - 7 - Attacking non-atomic decryption (10 min).txt 10.14KB
8 - 1 - Key Derivation (14 min).mp4 5.29MB
8 - 1 - Key Derivation (14 min).srt 21.53KB
8 - 1 - Key Derivation (14 min).txt 14.73KB
8 - 2 - Deterministic Encryption (15 min).mp4 15.62MB
8 - 2 - Deterministic Encryption (15 min).srt 23.03KB
8 - 2 - Deterministic Encryption (15 min).txt 15.79KB
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22.06MB
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.85KB
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt 21.09KB
8 - 4 - Tweakable encryption (15 min).mp4 15.58MB
8 - 4 - Tweakable encryption (15 min).srt 21.97KB
8 - 4 - Tweakable encryption (15 min).txt 15.03KB
8 - 5 - Format preserving encryption (13 min).mp4 13.21MB
8 - 5 - Format preserving encryption (13 min).srt 18.57KB
8 - 5 - Format preserving encryption (13 min).txt 12.74KB
9 - 1 - Trusted 3rd parties (11 min).mp4 12.22MB
9 - 1 - Trusted 3rd parties (11 min).srt 17.32KB
9 - 1 - Trusted 3rd parties (11 min).txt 11.90KB
9 - 2 - Merkle Puzzles (11 min).mp4 12.40MB
9 - 2 - Merkle Puzzles (11 min).srt 19.66KB
9 - 2 - Merkle Puzzles (11 min).txt 11.83KB
9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96MB
9 - 3 - The Diffie-Hellman protocol (19 min).srt 29.18KB
9 - 3 - The Diffie-Hellman protocol (19 min).txt 19.97KB
9 - 4 - Public-key encryption (11 min).mp4 11.83MB
9 - 4 - Public-key encryption (11 min).srt 16.95KB
9 - 4 - Public-key encryption (11 min).txt 11.60KB
Distribution statistics by country
Russia (RU) 6
Kazakhstan (KZ) 2
Belgium (BE) 1
Thailand (TH) 1
Republic of Korea (KR) 1
Belarus (BY) 1
Ukraine (UA) 1
Netherlands (NL) 1
China (CN) 1
Canada (CA) 1
Total 16
IP List List of IP addresses which were distributed this torrent