Общая информация
Название [Coursera] Cryptrography I
Тип
Размер 1.05Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
_README.txt 2.38Кб
10 - 1 - Notation (15 min).mp4 15.70Мб
10 - 1 - Notation (15 min).srt 19.28Кб
10 - 2 - Fermat and Euler (18 min).mp4 20.06Мб
10 - 2 - Fermat and Euler (18 min).srt 25.59Кб
10 - 3 - Modular e_'th roots (17 min)14.mp4 19.09Мб
10 - 3 - Modular e'th roots (17 min)14.mp4 19.09Мб
10 - 3 - Modular e'th roots (17 min)14.srt 22.91Кб
10 - 4 - Arithmetic algorithms (13 min).mp4 13.89Мб
10 - 4 - Arithmetic algorithms (13 min).srt 18.07Кб
10 - 5 - Intractable problems (19 min).mp4 21.22Мб
10 - 5 - Intractable problems (19 min).srt 27.61Кб
11 - 1 - Definitions and security (16 min).mp4 17.22Мб
11 - 1 - Definitions and security (16 min).srt 24.21Кб
11 - 2 - Constructions (11 min) .mp4 11.29Мб
11 - 2 - Constructions (11 min) .srt 16.52Кб
11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82Мб
11 - 3 - The RSA trapdoor permutation (18 min).srt 26.14Кб
11 - 4 - PKCS 1 (23 min).mp4 23.40Мб
11 - 4 - PKCS 1 (23 min).srt 30.62Кб
11 - 5 - Is RSA a one-way function 26.84Кб
11 - 5 - Is RSA a one-way function_ (17 min).mp4 18.53Мб
11 - 6 - RSA in practice (14 min).mp4 15.63Мб
11 - 6 - RSA in practice (14 min).srt 20.95Кб
1 - 1 - Course Overview (11 min).mp4 11.72Мб
1 - 1 - Course Overview (11 min).srt 16.76Кб
12 - 1 - The ElGamal Public-key System (23 min).mp4 21.36Мб
12 - 1 - The ElGamal Public-key System (23 min).srt 37.11Кб
12 - 2 - ElGamal Security (14 min).mp4 14.53Мб
12 - 2 - ElGamal Security (14 min).srt 21.57Кб
12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27Мб
12 - 3 - ElGamal Variants With Better Security (11 min).srt 16.81Кб
12 - 4 - A Unifying Theme (12 min).mp4 12.93Мб
12 - 4 - A Unifying Theme (12 min).srt 17.78Кб
12 - 5 - Farewell (for now) (6 min).mp4 5.73Мб
12 - 5 - Farewell (for now) (6 min).srt 9.04Кб
1 - 2 - What is cryptography_ (15 min).mp4 17.01Мб
1 - 3 - History of cryptography (19 min).mp4 20.47Мб
1 - 3 - History of cryptography (19 min).srt 26.08Кб
1 - 4 - Discrete probability (Crash course) (18 min).mp4 19.82Мб
1 - 4 - Discrete probability (Crash course) (18 min).srt 25.35Кб
1 - 5 - Discrete probability (crash course, cont.) (14 min).mp4 14.64Мб
1 - 5 - Discrete probability (crash course, cont.) (14 min).srt 20.02Кб
2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20.04Мб
2 - 1 - Information theoretic security and the one time pad (19 min).srt 25.63Кб
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.17Мб
2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28.39Кб
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43Мб
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 34.80Кб
2 - 4 - Real-world stream ciphers (20 min).mp4 21.87Мб
2 - 4 - Real-world stream ciphers (20 min).srt 27.69Кб
2 - 5 - PRG Security Definitions (25 min).mp4 26.80Мб
2 - 5 - PRG Security Definitions (25 min).srt 35.79Кб
2 - 6 - Semantic Security (16 min).mp4 16.80Мб
2 - 6 - Semantic Security (16 min).srt 23.97Кб
2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 11.73Мб
2 - 7 - Stream ciphers are semantically secure (11 min) [optional].srt 16.21Кб
3 - 1 - What are block ciphers 24.94Кб
3 - 1 - What are block ciphers_ (17 min).mp4 18.67Мб
3 - 2 - The Data Encryption Standard (22 min).mp4 24.50Мб
3 - 2 - The Data Encryption Standard (22 min).srt 31.32Кб
3 - 3 - Exhaustive search attacks (20 min).mp4 21.91Мб
3 - 3 - Exhaustive search attacks (20 min).srt 27.31Кб
3 - 4 - More attacks on block ciphers (16 min).mp4 17.75Мб
3 - 4 - More attacks on block ciphers (16 min).srt 25.03Кб
3 - 5 - The AES block cipher (14 min).mp4 14.52Мб
3 - 5 - The AES block cipher (14 min).srt 20.24Кб
3 - 6 - Block ciphers from PRGs(12 min).mp4 12.88Мб
3 - 6 - Block ciphers from PRGs(12 min).srt 17.47Кб
4 - 1 - Review_ PRPs and PRFs (12 min).mp4 12.72Мб
4 - 1 - Review_ PRPs and PRFs (12 min).srt 16.80Кб
4 - 2 - Modes of operation_ one time key (8 min).mp4 7.98Мб
4 - 2 - Modes of operation_ one time key (8 min).srt 11.84Кб
4 - 3 - Security for many-time key (23 min).mp4 24.92Мб
4 - 3 - Security for many-time key (23 min).srt 34.34Кб
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 17.96Мб
4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 24.42Кб
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10.44Мб
4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14.15Кб
5 - 1 - Message Authentication Codes (16 min).mp4 16.55Мб
5 - 1 - Message Authentication Codes (16 min).srt 23.42Кб
5 - 2 - MACs Based On PRFs (10 min).mp4 11.18Мб
5 - 2 - MACs Based On PRFs (10 min).srt 15.36Кб
5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.34Мб
5 - 3 - CBC-MAC and NMAC (20 min).srt 29.15Кб
5 - 4 - MAC padding (9 min).mp4 9.30Мб
5 - 4 - MAC padding (9 min).srt 13.18Кб
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06Мб
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36Кб
6 - 1 - Introduction (11 min).mp4 11.92Мб
6 - 1 - Introduction (11 min).srt 16.70Кб
6 - 2 - Generic birthday attack (16 min).mp4 16.14Мб
6 - 2 - Generic birthday attack (16 min).srt 21.99Кб
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.58Мб
6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 17.34Кб
6 - 4 - Constructing compression functions (8 min).mp4 8.78Мб
6 - 4 - Constructing compression functions (8 min).srt 12.89Кб
6 - 5 - HMAC (7 min).mp4 7.83Мб
6 - 5 - HMAC (7 min).srt 10.06Кб
6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.39Мб
6 - 6 - Timing attacks on MAC verification (9 min).srt 13.35Кб
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.02Мб
7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 19.52Кб
7 - 2 - Definitions (6 min).mp4 5.61Мб
7 - 2 - Definitions (6 min).srt 8.27Кб
7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.04Мб
7 - 3 - Chosen ciphertext attacks (12 min).srt 18.70Кб
7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.84Мб
7 - 4 - Constructions from ciphers and MACs (21 min).srt 30.67Кб
7 - 5 - Case study_ TLS (18 min).mp4 18.96Мб
7 - 5 - Case study_ TLS (18 min).srt 26.38Кб
7 - 6 - CBC padding attacks (14 min).mp4 14.99Мб
7 - 6 - CBC padding attacks (14 min).srt 21.21Кб
7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.09Мб
7 - 7 - Attacking non-atomic decryption (10 min).srt 14.91Кб
8 - 1 - Key Derivation (14 min).mp4 14.57Мб
8 - 1 - Key Derivation (14 min).srt 21.44Кб
8 - 2 - Deterministic Encryption (15 min).mp4 15.62Мб
8 - 2 - Deterministic Encryption (15 min).srt 22.99Кб
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22.06Мб
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.87Кб
8 - 4 - Tweakable encryption (15 min).mp4 15.58Мб
8 - 4 - Tweakable encryption (15 min).srt 22.03Кб
8 - 5 - Format preserving encryption (13 min).mp4 13.21Мб
8 - 5 - Format preserving encryption (13 min).srt 18.54Кб
9 - 1 - Trusted 3rd parties (11 min).mp4 12.22Мб
9 - 1 - Trusted 3rd parties (11 min).srt 17.32Кб
9 - 2 - Merkle Puzzles (11 min).mp4 12.40Мб
9 - 2 - Merkle Puzzles (11 min).srt 19.67Кб
9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96Мб
9 - 3 - The Diffie-Hellman protocol (19 min).srt 29.20Кб
9 - 4 - Public-key encryption (11 min).mp4 11.83Мб
9 - 4 - Public-key encryption (11 min).srt 16.95Кб
Статистика распространения по странам
Всего 0
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент