Torrent Info
Title [ WebToolTip.com ] Hacking Cryptography, Video Edition
Category
Size 1.82GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001. Chapter 1. Introduction.mp4 22.60MB
002. Chapter 1. How does cryptography work.mp4 17.48MB
003. Chapter 1. Attacks on cryptographic theory vs. attacks on implementations.mp4 13.42MB
004. Chapter 1. What will you learn in this book.mp4 16.72MB
005. Chapter 1. Summary.mp4 4.30MB
006. Chapter 2. Random number generators.mp4 46.01MB
007. Chapter 2. Understanding different types of RNGs.mp4 138.99MB
008. Chapter 2. Summary.mp4 8.38MB
009. Chapter 3. Implementing and exploiting RNGs.mp4 51.94MB
010. Chapter 3. Implementing and exploiting the Dual Elliptic Curve Deterministic Random Bit Generator.mp4 69.74MB
011. Chapter 3. Summary.mp4 4.20MB
012. Chapter 4. Stream ciphers.mp4 39.47MB
013. Chapter 4. Linear feedback shift registers (LFSRs).mp4 63.97MB
014. Chapter 4. RC4 encryption and Wi-Fi security.mp4 91.28MB
015. Chapter 4. Summary.mp4 6.34MB
016. Chapter 5. Block ciphers.mp4 14.06MB
017. Chapter 5. Padding - Making data fit blocks neatly.mp4 10.30MB
018. Chapter 5. Modes of operation for block ciphers.mp4 19.58MB
019. Chapter 5. Padding oracles and how to attack them.mp4 97.36MB
020. Chapter 5. Browser Exploit Against SSLTLS - The BEAST attack.mp4 60.06MB
021. Chapter 5. Summary.mp4 5.68MB
022. Chapter 6. Hash functions.mp4 13.22MB
023. Chapter 6. Security properties of hash functions.mp4 13.35MB
024. Chapter 6. Important hash functions.mp4 13.05MB
025. Chapter 6. Attacks on hash functions.mp4 124.24MB
026. Chapter 6. Summary.mp4 8.29MB
027. Chapter 7. Message authentication codes.mp4 14.77MB
028. Chapter 7. Different types of MACs.mp4 3.84MB
029. Chapter 7. Secret-prefix MACs and length-extension attacks.mp4 121.34MB
030. Chapter 7. Secret-suffix MACs and collision attacks.mp4 8.37MB
031. Chapter 7. HMACs - Hash-based MACs.mp4 6.07MB
032. Chapter 7. Summary.mp4 2.80MB
033. Chapter 8. Public-key cryptography.mp4 33.35MB
034. Chapter 8. Mathematical theory behind public-key cryptography.mp4 42.98MB
035. Chapter 8. Types of public-key cryptography systems.mp4 102.54MB
036. Chapter 8. Exploiting RSA.mp4 142.37MB
037. Chapter 8. Summary.mp4 7.45MB
038. Chapter 9. Digital signatures.mp4 9.12MB
039. Chapter 9. Practical applications of digital signatures.mp4 24.26MB
040. Chapter 9. Forgery attacks on digital signatures.mp4 4.94MB
041. Chapter 9. Schoolbook RSA signatures.mp4 6.24MB
042. Chapter 9. The elliptic curve digital signature algorithm (ECDSA).mp4 51.53MB
043. Chapter 9. RSA signature forgery with Bleichenbacher s e = 3 attack.mp4 109.36MB
044. Chapter 9. Summary.mp4 11.88MB
045. Chapter 10. Guidelines and common pitfalls for cryptographic implementations.mp4 20.00MB
046. Chapter 10. One vulnerability to rule them all - Poor-quality randomness.mp4 14.29MB
047. Chapter 10. Padding - Challenges with fitting things neatly.mp4 11.16MB
048. Chapter 10. Constant-time implementations and timing attacks.mp4 46.26MB
049. Chapter 10. Control flow and secrets - A dangerous mix.mp4 26.34MB
050. Chapter 10. Memory safety and buffer management.mp4 17.15MB
051. Chapter 10. Type safety - Challenges with interpreting raw bytes.mp4 24.95MB
052. Chapter 10. Miscellaneous considerations.mp4 21.85MB
053. Chapter 10. Summary.mp4 5.42MB
Bonus Resources.txt 70B
Get Bonus Downloads Here.url 180B
Distribution statistics by country
Germany (DE) 4
Cameroon (CM) 2
Guinea (GN) 1
Poland (PL) 1
Egypt (EG) 1
Brazil (BR) 1
Australia (AU) 1
Portugal (PT) 1
India (IN) 1
Ukraine (UA) 1
France (FR) 1
Mexico (MX) 1
Singapore (SG) 1
United States (US) 1
Saudi Arabia (SA) 1
Total 19
IP List List of IP addresses which were distributed this torrent