Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
[TGx]Downloaded from torrentgalaxy.to .txt |
585б |
0 |
622.28Кб |
01-Part 1. Primitives - The ingredients of cryptography.mp4 |
6.00Мб |
02-Chapter 1. Introduction.mp4 |
50.30Мб |
03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp4 |
46.25Мб |
04-Chapter 1. Key exchanges or how to get a shared secret.mp4 |
59.29Мб |
05-Chapter 1. Classifying and abstracting cryptography.mp4 |
56.23Мб |
06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4 |
47.39Мб |
07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4 |
52.75Мб |
08-Chapter 2. Hash functions.mp4 |
63.46Мб |
09-Chapter 2. Security considerations for hash functions.mp4 |
71.06Мб |
1 |
11.38Кб |
10 |
119.79Кб |
10-Chapter 2. Standardized hash functions.mp4 |
50.95Мб |
11 |
269.69Кб |
11-Chapter 2. The SHA-3 hash function.mp4 |
65.67Мб |
12 |
709.78Кб |
12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4 |
62.31Мб |
13 |
888.21Кб |
13-Chapter 3. Message authentication codes.mp4 |
46.06Мб |
14 |
959.57Кб |
14-Chapter 3. Security properties of a MAC.mp4 |
68.03Мб |
15 |
958.41Кб |
15-Chapter 3. Integrity of cookies.mp4 |
59.87Мб |
16 |
995.61Кб |
16-Chapter 4. Authenticated encryption.mp4 |
63.29Мб |
17 |
1003.97Кб |
17-Chapter 4. The interface of AES.mp4 |
65.84Мб |
18 |
713.35Кб |
18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4 |
35.00Мб |
19 |
783.01Кб |
19-Chapter 4. The AES-GCM AEAD.mp4 |
53.05Мб |
2 |
472.54Кб |
20 |
494.08Кб |
20-Chapter 4. ChaCha20-Poly1305.mp4 |
40.89Мб |
21 |
979.72Кб |
21-Chapter 4. Other kinds of symmetric encryption.mp4 |
52.66Мб |
22 |
166.50Кб |
22-Chapter 5. Key exchanges.mp4 |
52.27Мб |
23 |
334.63Кб |
23-Chapter 5. Group theory.mp4 |
58.21Мб |
24 |
407.64Кб |
24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4 |
54.55Мб |
25 |
172.84Кб |
25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4 |
36.17Мб |
26 |
501.85Кб |
26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4 |
44.17Мб |
27 |
176.68Кб |
27-Chapter 5. Small subgroup attacks and other security considerations.mp4 |
73.42Мб |
28 |
556.83Кб |
28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4 |
44.12Мб |
29 |
639.33Кб |
29-Chapter 6. Hybrid encryption.mp4 |
37.13Мб |
3 |
475.66Кб |
30 |
723.05Кб |
30-Chapter 6. Textbook RSA.mp4 |
68.02Мб |
31 |
706.04Кб |
31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4 |
60.55Мб |
32 |
912.72Кб |
32-Chapter 7. Signatures and zero-knowledge proofs.mp4 |
57.64Мб |
33 |
133.92Кб |
33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4 |
60.66Мб |
34 |
323.90Кб |
34-Chapter 7. The signature algorithms you should use (or not).mp4 |
64.83Мб |
35 |
344.33Кб |
35-Chapter 7. RSA-PSS - A better standard.mp4 |
64.51Мб |
36 |
459.63Кб |
36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4 |
61.11Мб |
37 |
485.11Кб |
37-Chapter 7. Subtle behaviors of signature schemes.mp4 |
43.68Мб |
38 |
539.45Кб |
38-Chapter 8. Randomness and secrets.mp4 |
43.67Мб |
39 |
135.52Кб |
39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4 |
59.22Мб |
4 |
581.55Кб |
40 |
729.30Кб |
40-Chapter 8. Obtaining randomness in practice.mp4 |
70.06Мб |
41 |
761.94Кб |
41-Chapter 8. Public randomness.mp4 |
73.13Мб |
42 |
796.77Кб |
42-Chapter 8. Managing keys and secrets.mp4 |
67.30Мб |
43 |
140.61Кб |
43-Part 2. Protocols - The recipes of cryptography.mp4 |
20.07Мб |
44 |
809.17Кб |
44-Chapter 9. Secure transport.mp4 |
57.48Мб |
45 |
369.56Кб |
45-Chapter 9. How does the TLS protocol work.mp4 |
58.86Мб |
46 |
528.08Кб |
46-Chapter 9. The TLS handshake - Part 1.mp4 |
66.04Мб |
47 |
322.63Кб |
47-Chapter 9. The TLS handshake - Part 2.mp4 |
54.79Мб |
48 |
500.14Кб |
48-Chapter 9. How TLS 1.3 encrypts application data.mp4 |
75.15Мб |
49 |
786.69Кб |
49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4 |
53.01Мб |
5 |
866.06Кб |
50 |
970.24Кб |
50-Chapter 10. End-to-end encryption.mp4 |
65.60Мб |
51 |
49.30Кб |
51-Chapter 10. The failure of encrypted email.mp4 |
51.81Мб |
52 |
79.35Кб |
52-Chapter 10. Key discovery is a real issue.mp4 |
67.24Мб |
53 |
218.01Кб |
53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4 |
55.95Мб |
54 |
456.15Кб |
54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp4 |
74.57Мб |
55 |
49.80Кб |
55-Chapter 11. User authentication.mp4 |
56.51Мб |
56 |
345.72Кб |
56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4 |
43.54Мб |
57 |
972.08Кб |
57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4 |
40.48Мб |
58 |
1010.05Кб |
58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp4 |
73.68Мб |
59 |
234.00Кб |
59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4 |
71.31Мб |
6 |
442.41Кб |
60 |
251.09Кб |
60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp4 |
52.63Мб |
61 |
352.13Кб |
61-Chapter 12. Crypto as in cryptocurrency.mp4 |
56.68Мб |
62 |
379.13Кб |
62-Chapter 12. A problem of trust Decentralization helps.mp4 |
60.47Мб |
63 |
746.86Кб |
63-Chapter 12. How does Bitcoin work.mp4 |
71.74Мб |
64 |
195.48Кб |
64-Chapter 12. Forking hell! Solving conflicts in mining.mp4 |
66.52Мб |
65 |
51.74Кб |
65-Chapter 12. A tour of cryptocurrencies.mp4 |
63.38Мб |
66 |
345.42Кб |
66-Chapter 12. A round in the DiemBFT protocol.mp4 |
60.87Мб |
67 |
717.92Кб |
67-Chapter 13. Hardware cryptography.mp4 |
59.26Мб |
68 |
311.45Кб |
68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp4 |
49.70Мб |
69 |
258.16Кб |
69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4 |
48.26Мб |
7 |
324.84Кб |
70 |
753.58Кб |
70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4 |
55.92Мб |
71 |
625.16Кб |
71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4 |
35.51Мб |
72 |
766.31Кб |
72-Chapter 13. What solution is good for me.mp4 |
77.43Мб |
73 |
966.92Кб |
73-Chapter 13. Constant-time programming.mp4 |
77.54Мб |
74 |
854.32Кб |
74-Chapter 14. Post-quantum cryptography.mp4 |
83.39Мб |
75 |
902.56Кб |
75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4 |
71.13Мб |
76 |
323.41Кб |
76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp4 |
35.24Мб |
77 |
341.75Кб |
77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4 |
53.95Мб |
78 |
472.65Кб |
78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4 |
48.75Мб |
79 |
491.27Кб |
79-Chapter 14. Kyber, a lattice-based key exchange.mp4 |
60.53Мб |
8 |
598.59Кб |
80 |
116.76Кб |
80-Chapter 14. Do I need to panic.mp4 |
53.66Мб |
81 |
529.09Кб |
81-Chapter 15. Is this it Next-generation cryptography.mp4 |
63.83Мб |
82 |
895.58Кб |
82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4 |
60.68Мб |
83 |
847.22Кб |
83-Chapter 15 Where is it used..mp4 |
79.54Мб |
84 |
498.36Кб |
84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4 |
52.77Мб |
85 |
775.50Кб |
85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4 |
71.88Мб |
86 |
1022.33Кб |
86-Chapter 16. When and where cryptography fails.mp4 |
79.99Мб |
87 |
947.55Кб |
87-Chapter 16. Where are the good libraries.mp4 |
50.66Мб |
88-Chapter 16. Cryptography is not an island.mp4 |
56.05Мб |
89-Appendix. Answers to exercises.mp4 |
43.52Мб |
9 |
891.61Кб |
TutsNode.com.txt |
63б |