Общая информация
Название Real-World Cryptography
Тип
Размер 5.02Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 622.28Кб
01-Part 1. Primitives - The ingredients of cryptography.mp4 6.00Мб
02-Chapter 1. Introduction.mp4 50.30Мб
03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp4 46.25Мб
04-Chapter 1. Key exchanges or how to get a shared secret.mp4 59.29Мб
05-Chapter 1. Classifying and abstracting cryptography.mp4 56.23Мб
06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4 47.39Мб
07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4 52.75Мб
08-Chapter 2. Hash functions.mp4 63.46Мб
09-Chapter 2. Security considerations for hash functions.mp4 71.06Мб
1 11.38Кб
10 119.79Кб
10-Chapter 2. Standardized hash functions.mp4 50.95Мб
11 269.69Кб
11-Chapter 2. The SHA-3 hash function.mp4 65.67Мб
12 709.78Кб
12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4 62.31Мб
13 888.21Кб
13-Chapter 3. Message authentication codes.mp4 46.06Мб
14 959.57Кб
14-Chapter 3. Security properties of a MAC.mp4 68.03Мб
15 958.41Кб
15-Chapter 3. Integrity of cookies.mp4 59.87Мб
16 995.61Кб
16-Chapter 4. Authenticated encryption.mp4 63.29Мб
17 1003.97Кб
17-Chapter 4. The interface of AES.mp4 65.84Мб
18 713.35Кб
18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4 35.00Мб
19 783.01Кб
19-Chapter 4. The AES-GCM AEAD.mp4 53.05Мб
2 472.54Кб
20 494.08Кб
20-Chapter 4. ChaCha20-Poly1305.mp4 40.89Мб
21 979.72Кб
21-Chapter 4. Other kinds of symmetric encryption.mp4 52.66Мб
22 166.50Кб
22-Chapter 5. Key exchanges.mp4 52.27Мб
23 334.63Кб
23-Chapter 5. Group theory.mp4 58.21Мб
24 407.64Кб
24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4 54.55Мб
25 172.84Кб
25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4 36.17Мб
26 501.85Кб
26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4 44.17Мб
27 176.68Кб
27-Chapter 5. Small subgroup attacks and other security considerations.mp4 73.42Мб
28 556.83Кб
28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4 44.12Мб
29 639.33Кб
29-Chapter 6. Hybrid encryption.mp4 37.13Мб
3 475.66Кб
30 723.05Кб
30-Chapter 6. Textbook RSA.mp4 68.02Мб
31 706.04Кб
31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4 60.55Мб
32 912.72Кб
32-Chapter 7. Signatures and zero-knowledge proofs.mp4 57.64Мб
33 133.92Кб
33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4 60.66Мб
34 323.90Кб
34-Chapter 7. The signature algorithms you should use (or not).mp4 64.83Мб
35 344.33Кб
35-Chapter 7. RSA-PSS - A better standard.mp4 64.51Мб
36 459.63Кб
36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4 61.11Мб
37 485.11Кб
37-Chapter 7. Subtle behaviors of signature schemes.mp4 43.68Мб
38 539.45Кб
38-Chapter 8. Randomness and secrets.mp4 43.67Мб
39 135.52Кб
39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4 59.22Мб
4 581.55Кб
40 729.30Кб
40-Chapter 8. Obtaining randomness in practice.mp4 70.06Мб
41 761.94Кб
41-Chapter 8. Public randomness.mp4 73.13Мб
42 796.77Кб
42-Chapter 8. Managing keys and secrets.mp4 67.30Мб
43 140.61Кб
43-Part 2. Protocols - The recipes of cryptography.mp4 20.07Мб
44 809.17Кб
44-Chapter 9. Secure transport.mp4 57.48Мб
45 369.56Кб
45-Chapter 9. How does the TLS protocol work.mp4 58.86Мб
46 528.08Кб
46-Chapter 9. The TLS handshake - Part 1.mp4 66.04Мб
47 322.63Кб
47-Chapter 9. The TLS handshake - Part 2.mp4 54.79Мб
48 500.14Кб
48-Chapter 9. How TLS 1.3 encrypts application data.mp4 75.15Мб
49 786.69Кб
49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4 53.01Мб
5 866.06Кб
50 970.24Кб
50-Chapter 10. End-to-end encryption.mp4 65.60Мб
51 49.30Кб
51-Chapter 10. The failure of encrypted email.mp4 51.81Мб
52 79.35Кб
52-Chapter 10. Key discovery is a real issue.mp4 67.24Мб
53 218.01Кб
53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4 55.95Мб
54 456.15Кб
54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp4 74.57Мб
55 49.80Кб
55-Chapter 11. User authentication.mp4 56.51Мб
56 345.72Кб
56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4 43.54Мб
57 972.08Кб
57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4 40.48Мб
58 1010.05Кб
58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp4 73.68Мб
59 234.00Кб
59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4 71.31Мб
6 442.41Кб
60 251.09Кб
60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp4 52.63Мб
61 352.13Кб
61-Chapter 12. Crypto as in cryptocurrency.mp4 56.68Мб
62 379.13Кб
62-Chapter 12. A problem of trust Decentralization helps.mp4 60.47Мб
63 746.86Кб
63-Chapter 12. How does Bitcoin work.mp4 71.74Мб
64 195.48Кб
64-Chapter 12. Forking hell! Solving conflicts in mining.mp4 66.52Мб
65 51.74Кб
65-Chapter 12. A tour of cryptocurrencies.mp4 63.38Мб
66 345.42Кб
66-Chapter 12. A round in the DiemBFT protocol.mp4 60.87Мб
67 717.92Кб
67-Chapter 13. Hardware cryptography.mp4 59.26Мб
68 311.45Кб
68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp4 49.70Мб
69 258.16Кб
69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4 48.26Мб
7 324.84Кб
70 753.58Кб
70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4 55.92Мб
71 625.16Кб
71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4 35.51Мб
72 766.31Кб
72-Chapter 13. What solution is good for me.mp4 77.43Мб
73 966.92Кб
73-Chapter 13. Constant-time programming.mp4 77.54Мб
74 854.32Кб
74-Chapter 14. Post-quantum cryptography.mp4 83.39Мб
75 902.56Кб
75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4 71.13Мб
76 323.41Кб
76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp4 35.24Мб
77 341.75Кб
77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4 53.95Мб
78 472.65Кб
78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4 48.75Мб
79 491.27Кб
79-Chapter 14. Kyber, a lattice-based key exchange.mp4 60.53Мб
8 598.59Кб
80 116.76Кб
80-Chapter 14. Do I need to panic.mp4 53.66Мб
81 529.09Кб
81-Chapter 15. Is this it Next-generation cryptography.mp4 63.83Мб
82 895.58Кб
82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4 60.68Мб
83 847.22Кб
83-Chapter 15 Where is it used..mp4 79.54Мб
84 498.36Кб
84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4 52.77Мб
85 775.50Кб
85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4 71.88Мб
86 1022.33Кб
86-Chapter 16. When and where cryptography fails.mp4 79.99Мб
87 947.55Кб
87-Chapter 16. Where are the good libraries.mp4 50.66Мб
88-Chapter 16. Cryptography is not an island.mp4 56.05Мб
89-Appendix. Answers to exercises.mp4 43.52Мб
9 891.61Кб
TutsNode.com.txt 63б
Статистика распространения по странам
Индия (IN) 3
Мексика (MX) 2
Китай (CN) 1
Россия (RU) 1
Словения (SI) 1
Бразилия (BR) 1
Франция (FR) 1
Всего 10
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент