|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 001. Chapter 1. Introduction.mp4 |
22.60MB |
| 002. Chapter 1. How does cryptography work.mp4 |
17.48MB |
| 003. Chapter 1. Attacks on cryptographic theory vs. attacks on implementations.mp4 |
13.42MB |
| 004. Chapter 1. What will you learn in this book.mp4 |
16.72MB |
| 005. Chapter 1. Summary.mp4 |
4.30MB |
| 006. Chapter 2. Random number generators.mp4 |
46.01MB |
| 007. Chapter 2. Understanding different types of RNGs.mp4 |
138.99MB |
| 008. Chapter 2. Summary.mp4 |
8.38MB |
| 009. Chapter 3. Implementing and exploiting RNGs.mp4 |
51.94MB |
| 010. Chapter 3. Implementing and exploiting the Dual Elliptic Curve Deterministic Random Bit Generator.mp4 |
69.74MB |
| 011. Chapter 3. Summary.mp4 |
4.20MB |
| 012. Chapter 4. Stream ciphers.mp4 |
39.47MB |
| 013. Chapter 4. Linear feedback shift registers (LFSRs).mp4 |
63.97MB |
| 014. Chapter 4. RC4 encryption and Wi-Fi security.mp4 |
91.28MB |
| 015. Chapter 4. Summary.mp4 |
6.34MB |
| 016. Chapter 5. Block ciphers.mp4 |
14.06MB |
| 017. Chapter 5. Padding - Making data fit blocks neatly.mp4 |
10.30MB |
| 018. Chapter 5. Modes of operation for block ciphers.mp4 |
19.58MB |
| 019. Chapter 5. Padding oracles and how to attack them.mp4 |
97.36MB |
| 020. Chapter 5. Browser Exploit Against SSLTLS - The BEAST attack.mp4 |
60.06MB |
| 021. Chapter 5. Summary.mp4 |
5.68MB |
| 022. Chapter 6. Hash functions.mp4 |
13.22MB |
| 023. Chapter 6. Security properties of hash functions.mp4 |
13.35MB |
| 024. Chapter 6. Important hash functions.mp4 |
13.05MB |
| 025. Chapter 6. Attacks on hash functions.mp4 |
124.24MB |
| 026. Chapter 6. Summary.mp4 |
8.29MB |
| 027. Chapter 7. Message authentication codes.mp4 |
14.77MB |
| 028. Chapter 7. Different types of MACs.mp4 |
3.84MB |
| 029. Chapter 7. Secret-prefix MACs and length-extension attacks.mp4 |
121.34MB |
| 030. Chapter 7. Secret-suffix MACs and collision attacks.mp4 |
8.37MB |
| 031. Chapter 7. HMACs - Hash-based MACs.mp4 |
6.07MB |
| 032. Chapter 7. Summary.mp4 |
2.80MB |
| 033. Chapter 8. Public-key cryptography.mp4 |
33.35MB |
| 034. Chapter 8. Mathematical theory behind public-key cryptography.mp4 |
42.98MB |
| 035. Chapter 8. Types of public-key cryptography systems.mp4 |
102.54MB |
| 036. Chapter 8. Exploiting RSA.mp4 |
142.37MB |
| 037. Chapter 8. Summary.mp4 |
7.45MB |
| 038. Chapter 9. Digital signatures.mp4 |
9.12MB |
| 039. Chapter 9. Practical applications of digital signatures.mp4 |
24.26MB |
| 040. Chapter 9. Forgery attacks on digital signatures.mp4 |
4.94MB |
| 041. Chapter 9. Schoolbook RSA signatures.mp4 |
6.24MB |
| 042. Chapter 9. The elliptic curve digital signature algorithm (ECDSA).mp4 |
51.53MB |
| 043. Chapter 9. RSA signature forgery with Bleichenbacher s e = 3 attack.mp4 |
109.36MB |
| 044. Chapter 9. Summary.mp4 |
11.88MB |
| 045. Chapter 10. Guidelines and common pitfalls for cryptographic implementations.mp4 |
20.00MB |
| 046. Chapter 10. One vulnerability to rule them all - Poor-quality randomness.mp4 |
14.29MB |
| 047. Chapter 10. Padding - Challenges with fitting things neatly.mp4 |
11.16MB |
| 048. Chapter 10. Constant-time implementations and timing attacks.mp4 |
46.26MB |
| 049. Chapter 10. Control flow and secrets - A dangerous mix.mp4 |
26.34MB |
| 050. Chapter 10. Memory safety and buffer management.mp4 |
17.15MB |
| 051. Chapter 10. Type safety - Challenges with interpreting raw bytes.mp4 |
24.95MB |
| 052. Chapter 10. Miscellaneous considerations.mp4 |
21.85MB |
| 053. Chapter 10. Summary.mp4 |
5.42MB |
| Bonus Resources.txt |
70B |
| Get Bonus Downloads Here.url |
180B |