Общая информация
Название Cryprography
Тип
Размер 1.03Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01.1-intro-annotated.pdf 307.34Кб
01.1-intro-annotated.pptx 293.19Кб
01.2-intro-annotated.pdf 866.09Кб
01.2-intro-annotated.pptx 1.03Мб
01.3-intro-annotated.pdf 1.39Мб
01.3-intro-annotated.pptx 1.57Мб
01.4-intro-annotated.pdf 307.92Кб
01.4-intro-annotated.pptx 407.61Кб
02.1-stream-annotated.pdf 380.28Кб
02.1-stream-annotated.pptx 1.54Мб
02.2-stream-annotated.pdf 331.50Кб
02.2-stream-annotated.pptx 1.15Мб
02.3-stream-annotated.pdf 593.05Кб
02.3-stream-annotated.pptx 1.04Мб
02.4-stream-annotated.pdf 452.05Кб
02.4-stream-annotated.pptx 732.52Кб
02.5-stream-annotated.pdf 301.67Кб
02.5-stream-annotated.pptx 1.33Мб
02.6-stream-annotated.pdf 242.40Кб
02.6-stream-annotated.pptx 268.96Кб
02.7-stream-annotated.pdf 210.13Кб
02.7-stream-annotated.pptx 481.45Кб
03.1-block-annotated.pdf 290.57Кб
03.1-block-annotated.pptx 224.32Кб
03.2-block-annotated.pdf 1.06Мб
03.2-block-annotated.pptx 809.20Кб
03.3-block-annotated.pdf 467.89Кб
03.3-block-annotated.pptx 622.09Кб
03.4-block-annotated.pdf 419.63Кб
03.4-block-annotated.pptx 524.22Кб
03.5-block-annotated.pdf 808.05Кб
03.5-block-annotated.pptx 435.02Кб
03.6-block-annotated.pdf 434.19Кб
03.6-block-annotated.pptx 275.78Кб
04.1-using-block-annotated.pdf 259.45Кб
04.1-using-block-annotated.pptx 415.30Кб
04.2-using-block-annotated.pdf 387.28Кб
04.2-using-block-annotated.pptx 399.32Кб
04.3-using-block-annotated.pdf 316.89Кб
04.3-using-block-annotated.pptx 318.07Кб
04.4-using-block-annotated.pdf 263.42Кб
04.4-using-block-annotated.pptx 366.22Кб
04.5-using-block-annotated.pdf 204.65Кб
04.5-using-block-annotated.pptx 223.83Кб
05.1-integrity-message-authentication-codes.pdf 236.25Кб
05.1-integrity-message-authentication-codes.pptx 279.99Кб
05.2-integrity-macs-based-on-PRFs.pdf 194.29Кб
05.2-integrity-macs-based-on-PRFs.pptx 283.57Кб
05.3-integrity-cbc-mac-and-nmac.pdf 348.08Кб
05.3-integrity-cbc-mac-and-nmac.pptx 325.45Кб
05.4-integrity-mac-padding.pdf 199.94Кб
05.4-integrity-mac-padding.pptx 249.32Кб
05.5-integrity-a-parallel-mac.pdf 223.58Кб
05.5-integrity-a-parallel-mac.pptx 240.70Кб
06.1-collision-resistance-introduction.pdf 230.19Кб
06.1-collision-resistance-introduction.pptx 204.39Кб
06.2-collision-resistance-generic-birthday-attack.pdf 245.86Кб
06.2-collision-resistance-generic-birthday-attack.pptx 514.73Кб
06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 258.63Кб
06.3-collision-resistance-the-merkle-damgard-paradigm.pptx 817.76Кб
06.4-collision-resistance-constructing-compression-functions.pdf 232.22Кб
06.4-collision-resistance-constructing-compression-functions.pptx 240.14Кб
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 200.02Кб
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx 243.33Кб
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 267.74Кб
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx 325.72Кб
07.1-authenc-annotated.pdf 873.34Кб
07.1-authenc-annotated.pptx 547.85Кб
07.2-authenc-annotated.pdf 533.29Кб
07.2-authenc-annotated.pptx 222.28Кб
07.3-authenc-annotated.pdf 681.45Кб
07.3-authenc-annotated.pptx 261.90Кб
07.4-authenc-annotated.pdf 685.97Кб
07.4-authenc-annotated.pptx 246.32Кб
07.5-authenc-annotated.pdf 672.57Кб
07.5-authenc-annotated.pptx 351.07Кб
07.6-authenc-annotated.pdf 715.66Кб
07.6-authenc-annotated.pptx 380.94Кб
07.7-authenc-annotated.pdf 461.98Кб
07.7-authenc-annotated.pptx 237.26Кб
08.1-odds-and-ends.pdf 328.66Кб
08.1-odds-and-ends.pptx 205.82Кб
08.2-odds-and-ends.pdf 449.21Кб
08.2-odds-and-ends.pptx 264.10Кб
08.3-odds-and-ends.pdf 515.40Кб
08.3-odds-and-ends.pptx 512.96Кб
08.4-odds-and-ends.pdf 550.71Кб
08.4-odds-and-ends.pptx 449.88Кб
08.5-odds-and-ends.pdf 375.59Кб
08.5-odds-and-ends.pptx 239.28Кб
09.1-basic-key-exchange-annotated.pdf 223.10Кб
09.1-basic-key-exchange-annotated.pptx 602.48Кб
09.2-basic-key-exchange-annotated.pdf 229.86Кб
09.2-basic-key-exchange-annotated.pptx 210.22Кб
09.3-basic-key-exchange-annotated.pdf 434.87Кб
09.3-basic-key-exchange-annotated.pptx 735.20Кб
09.4-basic-key-exchange-annotated.pdf 268.92Кб
09.4-basic-key-exchange-annotated.pptx 478.41Кб
10.1-numth-annotated.pdf 241.83Кб
10.1-numth-annotated.pptx 521.77Кб
10.2-numth-annotated.pdf 187.29Кб
10.2-numth-annotated.pptx 205.79Кб
10.3-numth-annotated.pdf 287.45Кб
10.3-numth-annotated.pptx 464.10Кб
10.4-numth-annotated.pdf 269.58Кб
10.4-numth-annotated.pptx 224.15Кб
10.5-numth-annotated.pdf 236.15Кб
10.5-numth-annotated.pptx 234.48Кб
10 - 1 - Notation (15 min).mp4 15.70Мб
10 - 1 - Notation (15 min).srt 19.22Кб
10 - 1 - Notation (15 min).txt 13.02Кб
10 - 2 - Fermat and Euler (18 min).mp4 20.06Мб
10 - 2 - Fermat and Euler (18 min).srt 25.64Кб
10 - 2 - Fermat and Euler (18 min).txt 17.55Кб
10 - 3 - Modular e'th roots (17 min).mp4 19.09Мб
10 - 3 - Modular e'th roots (17 min).srt 22.89Кб
10 - 3 - Modular e'th roots (17 min).txt 15.47Кб
10 - 4 - Arithmetic algorithms (13 min).mp4 13.89Мб
10 - 4 - Arithmetic algorithms (13 min).srt 18.02Кб
10 - 4 - Arithmetic algorithms (13 min).txt 12.30Кб
10 - 5 - Intractable problems (19 min).mp4 21.22Мб
10 - 5 - Intractable problems (19 min).srt 27.14Кб
10 - 5 - Intractable problems (19 min).txt 18.08Кб
11.1-pubkey-trapdoor.pdf 549.58Кб
11.1-pubkey-trapdoor.pptx 351.32Кб
11.2-pubkey-trapdoor.pdf 211.62Кб
11.2-pubkey-trapdoor.pptx 186.90Кб
11.3-pubkey-trapdoor.pdf 239.02Кб
11.3-pubkey-trapdoor.pptx 199.52Кб
11.4-pubkey-trapdoor.pdf 264.40Кб
11.4-pubkey-trapdoor.pptx 204.47Кб
11.5-pubkey-trapdoor.pdf 166.27Кб
11.5-pubkey-trapdoor.pptx 181.70Кб
11.6-pubkey-trapdoor.pdf 184.75Кб
11.6-pubkey-trapdoor.pptx 185.20Кб
11 - 1 - Definitions and security (16 min).mp4 17.22Мб
11 - 1 - Definitions and security (16 min).srt 24.16Кб
11 - 1 - Definitions and security (16 min).txt 16.51Кб
11 - 2 - Constructions (11 min) .mp4 11.29Мб
11 - 2 - Constructions (11 min) .srt 16.45Кб
11 - 2 - Constructions (11 min) .txt 11.25Кб
11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82Мб
11 - 3 - The RSA trapdoor permutation (18 min).srt 26.18Кб
11 - 3 - The RSA trapdoor permutation (18 min).txt 17.94Кб
11 - 4 - PKCS 1 (23 min).mp4 23.40Мб
11 - 4 - PKCS 1 (23 min).srt 30.69Кб
11 - 4 - PKCS 1 (23 min).txt 21.00Кб
11 - 5 - Is RSA a one-way function_ (17 min).mp4 18.53Мб
11 - 5 - Is RSA a one-way function_ (17 min).srt 15.36Кб
11 - 5 - Is RSA a one-way function_ (17 min).txt 8.38Кб
11 - 6 - RSA in practice (14 min).mp4 15.63Мб
11 - 6 - RSA in practice (14 min).srt 3.61Кб
11 - 6 - RSA in practice (14 min).txt 2.06Кб
1 - 1 - Course Overview (11 min).mp4 11.72Мб
1 - 1 - Course Overview (11 min).srt 16.74Кб
1 - 1 - Course Overview (11 min).txt 11.46Кб
12.1-pubkey-dh.pdf 536.15Кб
12.1-pubkey-dh.pptx 308.88Кб
12.2-pubkey-dh.pdf 294.64Кб
12.2-pubkey-dh.pptx 194.14Кб
12.3-pubkey-dh.pdf 179.30Кб
12.3-pubkey-dh.pptx 186.18Кб
12.4-pubkey-dh.pdf 196.60Кб
12.4-pubkey-dh.pptx 191.08Кб
12.5-pubkey-dh.pdf 320.82Кб
12.5-pubkey-dh.pptx 180.23Кб
12 - 1 - The ElGamal Public-key System (23 min).mp4 1.66Мб
12 - 1 - The ElGamal Public-key System (23 min).srt 36.98Кб
12 - 1 - The ElGamal Public-key System (23 min).txt 21.24Кб
12 - 2 - ElGamal Security (14 min).mp4 4.69Мб
12 - 2 - ElGamal Security (14 min).srt 21.52Кб
12 - 2 - ElGamal Security (14 min).txt 14.69Кб
12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27Мб
12 - 3 - ElGamal Variants With Better Security (11 min).srt 16.81Кб
12 - 3 - ElGamal Variants With Better Security (11 min).txt 11.54Кб
12 - 4 - A Unifying Theme (12 min).mp4 12.93Мб
12 - 4 - A Unifying Theme (12 min).srt 17.83Кб
12 - 4 - A Unifying Theme (12 min).txt 12.23Кб
12 - 5 - Farewell (for now) (6 min).mp4 5.73Мб
12 - 5 - Farewell (for now) (6 min).srt 9.01Кб
12 - 5 - Farewell (for now) (6 min).txt 6.20Кб
1 - 2 - What is cryptography_ (15 min).mp4 17.01Мб
1 - 2 - What is cryptography_ (15 min).srt 25.42Кб
1 - 2 - What is cryptography_ (15 min).txt 17.37Кб
1 - 3 - History of cryptography (19 min).mp4 20.47Мб
1 - 3 - History of cryptography (19 min).srt 26.25Кб
1 - 3 - History of cryptography (19 min).txt 17.97Кб
1 - 4 - Discrete probability (16 min).mp4 17.46Мб
1 - 4 - Discrete probability (16 min).srt 23.05Кб
1 - 4 - Discrete probability (16 min).txt 15.74Кб
2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20.04Мб
2 - 1 - Information theoretic security and the one time pad (19 min).srt 25.71Кб
2 - 1 - Information theoretic security and the one time pad (19 min).txt 17.58Кб
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.17Мб
2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28.38Кб
2 - 2 - Stream ciphers and pseudo random generators (20 min).txt 19.39Кб
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43Мб
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 34.82Кб
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt 23.76Кб
2 - 4 - Real-world stream ciphers (20 min).mp4 21.87Мб
2 - 4 - Real-world stream ciphers (20 min).srt 27.70Кб
2 - 4 - Real-world stream ciphers (20 min).txt 18.90Кб
2 - 5 - PRG Security Definitions (25 min).mp4 26.80Мб
2 - 5 - PRG Security Definitions (25 min).srt 35.79Кб
2 - 5 - PRG Security Definitions (25 min).txt 24.35Кб
2 - 6 - Semantic Security (16 min).mp4 16.80Мб
2 - 6 - Semantic Security (16 min).srt 23.98Кб
2 - 6 - Semantic Security (16 min).txt 16.30Кб
2 - 7 - Stream ciphers are semantically secure (11 min).mp4 11.73Мб
2 - 7 - Stream ciphers are semantically secure (11 min).srt 16.21Кб
2 - 7 - Stream ciphers are semantically secure (11 min).txt 11.05Кб
3 - 1 - What are block ciphers_ (17 min).mp4 18.67Мб
3 - 1 - What are block ciphers_ (17 min).srt 24.94Кб
3 - 1 - What are block ciphers_ (17 min).txt 16.92Кб
3 - 2 - The Data Encryption Standard (22 min).mp4 24.50Мб
3 - 2 - The Data Encryption Standard (22 min).srt 31.00Кб
3 - 2 - The Data Encryption Standard (22 min).txt 21.13Кб
3 - 3 - Exhaustive search attacks (20 min).mp4 21.91Мб
3 - 3 - Exhaustive search attacks (20 min).srt 27.31Кб
3 - 3 - Exhaustive search attacks (20 min).txt 18.84Кб
3 - 4 - More attacks on block ciphers (16 min).mp4 16.17Мб
3 - 4 - More attacks on block ciphers (16 min).srt 25.03Кб
3 - 4 - More attacks on block ciphers (16 min).txt 17.05Кб
3 - 5 - The AES block cipher (14 min).mp4 14.52Мб
3 - 5 - The AES block cipher (14 min).srt 20.26Кб
3 - 5 - The AES block cipher (14 min).txt 13.87Кб
3 - 6 - Block ciphers from PRGs(12 min).mp4 12.88Мб
3 - 6 - Block ciphers from PRGs(12 min).srt 17.48Кб
3 - 6 - Block ciphers from PRGs(12 min).txt 11.99Кб
4 - 1 - Review_ PRPs and PRFs (12 min).mp4 12.72Мб
4 - 1 - Review_ PRPs and PRFs (12 min).srt 16.86Кб
4 - 1 - Review_ PRPs and PRFs (12 min).txt 11.55Кб
4 - 2 - Modes of operation_ one time key (8 min).mp4 7.98Мб
4 - 2 - Modes of operation_ one time key (8 min).srt 11.81Кб
4 - 2 - Modes of operation_ one time key (8 min).txt 8.09Кб
4 - 3 - Security for many-time key (23 min).mp4 24.92Мб
4 - 3 - Security for many-time key (23 min).srt 34.34Кб
4 - 3 - Security for many-time key (23 min).txt 23.43Кб
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 17.96Мб
4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 22.57Кб
4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt 15.41Кб
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10.44Мб
4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14.14Кб
4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt 9.69Кб
5 - 1 - Message Authentication Codes (16 min).mp4 16.55Мб
5 - 1 - Message Authentication Codes (16 min).srt 23.41Кб
5 - 1 - Message Authentication Codes (16 min).txt 15.83Кб
5 - 2 - MACs Based On PRFs (10 min).mp4 11.18Мб
5 - 2 - MACs Based On PRFs (10 min).srt 15.36Кб
5 - 2 - MACs Based On PRFs (10 min).txt 10.53Кб
5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.34Мб
5 - 3 - CBC-MAC and NMAC (20 min).srt 29.21Кб
5 - 3 - CBC-MAC and NMAC (20 min).txt 20.00Кб
5 - 4 - MAC padding (9 min).mp4 9.30Мб
5 - 4 - MAC padding (9 min).srt 13.19Кб
5 - 4 - MAC padding (9 min).txt 9.03Кб
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06Мб
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36Кб
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt 16.68Кб
6 - 1 - Introduction (11 min).mp4 11.92Мб
6 - 1 - Introduction (11 min).srt 16.70Кб
6 - 1 - Introduction (11 min).txt 11.46Кб
6 - 2 - Generic birthday attack (16 min).mp4 16.14Мб
6 - 2 - Generic birthday attack (16 min).srt 22.09Кб
6 - 2 - Generic birthday attack (16 min).txt 15.15Кб
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.58Мб
6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 17.53Кб
6 - 3 - The Merkle-Damgard Paradigm (12 min).txt 12.04Кб
6 - 4 - Constructing compression functions (8 min).mp4 8.78Мб
6 - 4 - Constructing compression functions (8 min).srt 12.89Кб
6 - 4 - Constructing compression functions (8 min).txt 8.80Кб
6 - 5 - HMAC (7 min).mp4 7.83Мб
6 - 5 - HMAC (7 min).srt 10.06Кб
6 - 5 - HMAC (7 min).txt 6.89Кб
6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.39Мб
6 - 6 - Timing attacks on MAC verification (9 min).srt 13.35Кб
6 - 6 - Timing attacks on MAC verification (9 min).txt 9.15Кб
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.02Мб
7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 19.50Кб
7 - 1 - Active attacks on CPA-secure encryption (13 min).txt 13.34Кб
7 - 2 - Definitions (6 min).mp4 5.61Мб
7 - 2 - Definitions (6 min).srt 8.20Кб
7 - 2 - Definitions (6 min).txt 5.61Кб
7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.04Мб
7 - 3 - Chosen ciphertext attacks (12 min).srt 18.72Кб
7 - 3 - Chosen ciphertext attacks (12 min).txt 12.81Кб
7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.84Мб
7 - 4 - Constructions from ciphers and MACs (21 min).srt 30.66Кб
7 - 4 - Constructions from ciphers and MACs (21 min).txt 20.94Кб
7 - 5 - Case study_ TLS (18 min).mp4 18.96Мб
7 - 5 - Case study_ TLS (18 min).srt 26.42Кб
7 - 5 - Case study_ TLS (18 min).txt 18.11Кб
7 - 6 - CBC padding attacks (14 min).mp4 14.99Мб
7 - 6 - CBC padding attacks (14 min).srt 21.20Кб
7 - 6 - CBC padding attacks (14 min).txt 14.56Кб
7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.09Мб
7 - 7 - Attacking non-atomic decryption (10 min).srt 14.79Кб
7 - 7 - Attacking non-atomic decryption (10 min).txt 10.14Кб
8 - 1 - Key Derivation (14 min).mp4 5.29Мб
8 - 1 - Key Derivation (14 min).srt 21.53Кб
8 - 1 - Key Derivation (14 min).txt 14.73Кб
8 - 2 - Deterministic Encryption (15 min).mp4 15.62Мб
8 - 2 - Deterministic Encryption (15 min).srt 23.03Кб
8 - 2 - Deterministic Encryption (15 min).txt 15.79Кб
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22.06Мб
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.85Кб
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt 21.09Кб
8 - 4 - Tweakable encryption (15 min).mp4 15.58Мб
8 - 4 - Tweakable encryption (15 min).srt 21.97Кб
8 - 4 - Tweakable encryption (15 min).txt 15.03Кб
8 - 5 - Format preserving encryption (13 min).mp4 13.21Мб
8 - 5 - Format preserving encryption (13 min).srt 18.57Кб
8 - 5 - Format preserving encryption (13 min).txt 12.74Кб
9 - 1 - Trusted 3rd parties (11 min).mp4 12.22Мб
9 - 1 - Trusted 3rd parties (11 min).srt 17.32Кб
9 - 1 - Trusted 3rd parties (11 min).txt 11.90Кб
9 - 2 - Merkle Puzzles (11 min).mp4 12.40Мб
9 - 2 - Merkle Puzzles (11 min).srt 19.66Кб
9 - 2 - Merkle Puzzles (11 min).txt 11.83Кб
9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96Мб
9 - 3 - The Diffie-Hellman protocol (19 min).srt 29.18Кб
9 - 3 - The Diffie-Hellman protocol (19 min).txt 19.97Кб
9 - 4 - Public-key encryption (11 min).mp4 11.83Мб
9 - 4 - Public-key encryption (11 min).srt 16.95Кб
9 - 4 - Public-key encryption (11 min).txt 11.60Кб
Статистика распространения по странам
Россия (RU) 3
Украина (UA) 2
Канада (CA) 2
Сербия (RS) 1
Казахстан (KZ) 1
Всего 9
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент