Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
01.1-intro-annotated.pdf |
307.34Кб |
01.1-intro-annotated.pptx |
293.19Кб |
01.2-intro-annotated.pdf |
866.09Кб |
01.2-intro-annotated.pptx |
1.03Мб |
01.3-intro-annotated.pdf |
1.39Мб |
01.3-intro-annotated.pptx |
1.57Мб |
01.4-intro-annotated.pdf |
307.92Кб |
01.4-intro-annotated.pptx |
407.61Кб |
02.1-stream-annotated.pdf |
380.28Кб |
02.1-stream-annotated.pptx |
1.54Мб |
02.2-stream-annotated.pdf |
331.50Кб |
02.2-stream-annotated.pptx |
1.15Мб |
02.3-stream-annotated.pdf |
593.05Кб |
02.3-stream-annotated.pptx |
1.04Мб |
02.4-stream-annotated.pdf |
452.05Кб |
02.4-stream-annotated.pptx |
732.52Кб |
02.5-stream-annotated.pdf |
301.67Кб |
02.5-stream-annotated.pptx |
1.33Мб |
02.6-stream-annotated.pdf |
242.40Кб |
02.6-stream-annotated.pptx |
268.96Кб |
02.7-stream-annotated.pdf |
210.13Кб |
02.7-stream-annotated.pptx |
481.45Кб |
03.1-block-annotated.pdf |
290.57Кб |
03.1-block-annotated.pptx |
224.32Кб |
03.2-block-annotated.pdf |
1.06Мб |
03.2-block-annotated.pptx |
809.20Кб |
03.3-block-annotated.pdf |
467.89Кб |
03.3-block-annotated.pptx |
622.09Кб |
03.4-block-annotated.pdf |
419.63Кб |
03.4-block-annotated.pptx |
524.22Кб |
03.5-block-annotated.pdf |
808.05Кб |
03.5-block-annotated.pptx |
435.02Кб |
03.6-block-annotated.pdf |
434.19Кб |
03.6-block-annotated.pptx |
275.78Кб |
04.1-using-block-annotated.pdf |
259.45Кб |
04.1-using-block-annotated.pptx |
415.30Кб |
04.2-using-block-annotated.pdf |
387.28Кб |
04.2-using-block-annotated.pptx |
399.32Кб |
04.3-using-block-annotated.pdf |
316.89Кб |
04.3-using-block-annotated.pptx |
318.07Кб |
04.4-using-block-annotated.pdf |
263.42Кб |
04.4-using-block-annotated.pptx |
366.22Кб |
04.5-using-block-annotated.pdf |
204.65Кб |
04.5-using-block-annotated.pptx |
223.83Кб |
05.1-integrity-message-authentication-codes.pdf |
236.25Кб |
05.1-integrity-message-authentication-codes.pptx |
279.99Кб |
05.2-integrity-macs-based-on-PRFs.pdf |
194.29Кб |
05.2-integrity-macs-based-on-PRFs.pptx |
283.57Кб |
05.3-integrity-cbc-mac-and-nmac.pdf |
348.08Кб |
05.3-integrity-cbc-mac-and-nmac.pptx |
325.45Кб |
05.4-integrity-mac-padding.pdf |
199.94Кб |
05.4-integrity-mac-padding.pptx |
249.32Кб |
05.5-integrity-a-parallel-mac.pdf |
223.58Кб |
05.5-integrity-a-parallel-mac.pptx |
240.70Кб |
06.1-collision-resistance-introduction.pdf |
230.19Кб |
06.1-collision-resistance-introduction.pptx |
204.39Кб |
06.2-collision-resistance-generic-birthday-attack.pdf |
245.86Кб |
06.2-collision-resistance-generic-birthday-attack.pptx |
514.73Кб |
06.3-collision-resistance-the-merkle-damgard-paradigm.pdf |
258.63Кб |
06.3-collision-resistance-the-merkle-damgard-paradigm.pptx |
817.76Кб |
06.4-collision-resistance-constructing-compression-functions.pdf |
232.22Кб |
06.4-collision-resistance-constructing-compression-functions.pptx |
240.14Кб |
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf |
200.02Кб |
06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx |
243.33Кб |
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf |
267.74Кб |
06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx |
325.72Кб |
07.1-authenc-annotated.pdf |
873.34Кб |
07.1-authenc-annotated.pptx |
547.85Кб |
07.2-authenc-annotated.pdf |
533.29Кб |
07.2-authenc-annotated.pptx |
222.28Кб |
07.3-authenc-annotated.pdf |
681.45Кб |
07.3-authenc-annotated.pptx |
261.90Кб |
07.4-authenc-annotated.pdf |
685.97Кб |
07.4-authenc-annotated.pptx |
246.32Кб |
07.5-authenc-annotated.pdf |
672.57Кб |
07.5-authenc-annotated.pptx |
351.07Кб |
07.6-authenc-annotated.pdf |
715.66Кб |
07.6-authenc-annotated.pptx |
380.94Кб |
07.7-authenc-annotated.pdf |
461.98Кб |
07.7-authenc-annotated.pptx |
237.26Кб |
08.1-odds-and-ends.pdf |
328.66Кб |
08.1-odds-and-ends.pptx |
205.82Кб |
08.2-odds-and-ends.pdf |
449.21Кб |
08.2-odds-and-ends.pptx |
264.10Кб |
08.3-odds-and-ends.pdf |
515.40Кб |
08.3-odds-and-ends.pptx |
512.96Кб |
08.4-odds-and-ends.pdf |
550.71Кб |
08.4-odds-and-ends.pptx |
449.88Кб |
08.5-odds-and-ends.pdf |
375.59Кб |
08.5-odds-and-ends.pptx |
239.28Кб |
09.1-basic-key-exchange-annotated.pdf |
223.10Кб |
09.1-basic-key-exchange-annotated.pptx |
602.48Кб |
09.2-basic-key-exchange-annotated.pdf |
229.86Кб |
09.2-basic-key-exchange-annotated.pptx |
210.22Кб |
09.3-basic-key-exchange-annotated.pdf |
434.87Кб |
09.3-basic-key-exchange-annotated.pptx |
735.20Кб |
09.4-basic-key-exchange-annotated.pdf |
268.92Кб |
09.4-basic-key-exchange-annotated.pptx |
478.41Кб |
10.1-numth-annotated.pdf |
241.83Кб |
10.1-numth-annotated.pptx |
521.77Кб |
10.2-numth-annotated.pdf |
187.29Кб |
10.2-numth-annotated.pptx |
205.79Кб |
10.3-numth-annotated.pdf |
287.45Кб |
10.3-numth-annotated.pptx |
464.10Кб |
10.4-numth-annotated.pdf |
269.58Кб |
10.4-numth-annotated.pptx |
224.15Кб |
10.5-numth-annotated.pdf |
236.15Кб |
10.5-numth-annotated.pptx |
234.48Кб |
10 - 1 - Notation (15 min).mp4 |
15.70Мб |
10 - 1 - Notation (15 min).srt |
19.22Кб |
10 - 1 - Notation (15 min).txt |
13.02Кб |
10 - 2 - Fermat and Euler (18 min).mp4 |
20.06Мб |
10 - 2 - Fermat and Euler (18 min).srt |
25.64Кб |
10 - 2 - Fermat and Euler (18 min).txt |
17.55Кб |
10 - 3 - Modular e'th roots (17 min).mp4 |
19.09Мб |
10 - 3 - Modular e'th roots (17 min).srt |
22.89Кб |
10 - 3 - Modular e'th roots (17 min).txt |
15.47Кб |
10 - 4 - Arithmetic algorithms (13 min).mp4 |
13.89Мб |
10 - 4 - Arithmetic algorithms (13 min).srt |
18.02Кб |
10 - 4 - Arithmetic algorithms (13 min).txt |
12.30Кб |
10 - 5 - Intractable problems (19 min).mp4 |
21.22Мб |
10 - 5 - Intractable problems (19 min).srt |
27.14Кб |
10 - 5 - Intractable problems (19 min).txt |
18.08Кб |
11.1-pubkey-trapdoor.pdf |
549.58Кб |
11.1-pubkey-trapdoor.pptx |
351.32Кб |
11.2-pubkey-trapdoor.pdf |
211.62Кб |
11.2-pubkey-trapdoor.pptx |
186.90Кб |
11.3-pubkey-trapdoor.pdf |
239.02Кб |
11.3-pubkey-trapdoor.pptx |
199.52Кб |
11.4-pubkey-trapdoor.pdf |
264.40Кб |
11.4-pubkey-trapdoor.pptx |
204.47Кб |
11.5-pubkey-trapdoor.pdf |
166.27Кб |
11.5-pubkey-trapdoor.pptx |
181.70Кб |
11.6-pubkey-trapdoor.pdf |
184.75Кб |
11.6-pubkey-trapdoor.pptx |
185.20Кб |
11 - 1 - Definitions and security (16 min).mp4 |
17.22Мб |
11 - 1 - Definitions and security (16 min).srt |
24.16Кб |
11 - 1 - Definitions and security (16 min).txt |
16.51Кб |
11 - 2 - Constructions (11 min) .mp4 |
11.29Мб |
11 - 2 - Constructions (11 min) .srt |
16.45Кб |
11 - 2 - Constructions (11 min) .txt |
11.25Кб |
11 - 3 - The RSA trapdoor permutation (18 min).mp4 |
19.82Мб |
11 - 3 - The RSA trapdoor permutation (18 min).srt |
26.18Кб |
11 - 3 - The RSA trapdoor permutation (18 min).txt |
17.94Кб |
11 - 4 - PKCS 1 (23 min).mp4 |
23.40Мб |
11 - 4 - PKCS 1 (23 min).srt |
30.69Кб |
11 - 4 - PKCS 1 (23 min).txt |
21.00Кб |
11 - 5 - Is RSA a one-way function_ (17 min).mp4 |
18.53Мб |
11 - 5 - Is RSA a one-way function_ (17 min).srt |
15.36Кб |
11 - 5 - Is RSA a one-way function_ (17 min).txt |
8.38Кб |
11 - 6 - RSA in practice (14 min).mp4 |
15.63Мб |
11 - 6 - RSA in practice (14 min).srt |
3.61Кб |
11 - 6 - RSA in practice (14 min).txt |
2.06Кб |
1 - 1 - Course Overview (11 min).mp4 |
11.72Мб |
1 - 1 - Course Overview (11 min).srt |
16.74Кб |
1 - 1 - Course Overview (11 min).txt |
11.46Кб |
12.1-pubkey-dh.pdf |
536.15Кб |
12.1-pubkey-dh.pptx |
308.88Кб |
12.2-pubkey-dh.pdf |
294.64Кб |
12.2-pubkey-dh.pptx |
194.14Кб |
12.3-pubkey-dh.pdf |
179.30Кб |
12.3-pubkey-dh.pptx |
186.18Кб |
12.4-pubkey-dh.pdf |
196.60Кб |
12.4-pubkey-dh.pptx |
191.08Кб |
12.5-pubkey-dh.pdf |
320.82Кб |
12.5-pubkey-dh.pptx |
180.23Кб |
12 - 1 - The ElGamal Public-key System (23 min).mp4 |
1.66Мб |
12 - 1 - The ElGamal Public-key System (23 min).srt |
36.98Кб |
12 - 1 - The ElGamal Public-key System (23 min).txt |
21.24Кб |
12 - 2 - ElGamal Security (14 min).mp4 |
4.69Мб |
12 - 2 - ElGamal Security (14 min).srt |
21.52Кб |
12 - 2 - ElGamal Security (14 min).txt |
14.69Кб |
12 - 3 - ElGamal Variants With Better Security (11 min).mp4 |
11.27Мб |
12 - 3 - ElGamal Variants With Better Security (11 min).srt |
16.81Кб |
12 - 3 - ElGamal Variants With Better Security (11 min).txt |
11.54Кб |
12 - 4 - A Unifying Theme (12 min).mp4 |
12.93Мб |
12 - 4 - A Unifying Theme (12 min).srt |
17.83Кб |
12 - 4 - A Unifying Theme (12 min).txt |
12.23Кб |
12 - 5 - Farewell (for now) (6 min).mp4 |
5.73Мб |
12 - 5 - Farewell (for now) (6 min).srt |
9.01Кб |
12 - 5 - Farewell (for now) (6 min).txt |
6.20Кб |
1 - 2 - What is cryptography_ (15 min).mp4 |
17.01Мб |
1 - 2 - What is cryptography_ (15 min).srt |
25.42Кб |
1 - 2 - What is cryptography_ (15 min).txt |
17.37Кб |
1 - 3 - History of cryptography (19 min).mp4 |
20.47Мб |
1 - 3 - History of cryptography (19 min).srt |
26.25Кб |
1 - 3 - History of cryptography (19 min).txt |
17.97Кб |
1 - 4 - Discrete probability (16 min).mp4 |
17.46Мб |
1 - 4 - Discrete probability (16 min).srt |
23.05Кб |
1 - 4 - Discrete probability (16 min).txt |
15.74Кб |
2 - 1 - Information theoretic security and the one time pad (19 min).mp4 |
20.04Мб |
2 - 1 - Information theoretic security and the one time pad (19 min).srt |
25.71Кб |
2 - 1 - Information theoretic security and the one time pad (19 min).txt |
17.58Кб |
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 |
21.17Мб |
2 - 2 - Stream ciphers and pseudo random generators (20 min).srt |
28.38Кб |
2 - 2 - Stream ciphers and pseudo random generators (20 min).txt |
19.39Кб |
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 |
25.43Мб |
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt |
34.82Кб |
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt |
23.76Кб |
2 - 4 - Real-world stream ciphers (20 min).mp4 |
21.87Мб |
2 - 4 - Real-world stream ciphers (20 min).srt |
27.70Кб |
2 - 4 - Real-world stream ciphers (20 min).txt |
18.90Кб |
2 - 5 - PRG Security Definitions (25 min).mp4 |
26.80Мб |
2 - 5 - PRG Security Definitions (25 min).srt |
35.79Кб |
2 - 5 - PRG Security Definitions (25 min).txt |
24.35Кб |
2 - 6 - Semantic Security (16 min).mp4 |
16.80Мб |
2 - 6 - Semantic Security (16 min).srt |
23.98Кб |
2 - 6 - Semantic Security (16 min).txt |
16.30Кб |
2 - 7 - Stream ciphers are semantically secure (11 min).mp4 |
11.73Мб |
2 - 7 - Stream ciphers are semantically secure (11 min).srt |
16.21Кб |
2 - 7 - Stream ciphers are semantically secure (11 min).txt |
11.05Кб |
3 - 1 - What are block ciphers_ (17 min).mp4 |
18.67Мб |
3 - 1 - What are block ciphers_ (17 min).srt |
24.94Кб |
3 - 1 - What are block ciphers_ (17 min).txt |
16.92Кб |
3 - 2 - The Data Encryption Standard (22 min).mp4 |
24.50Мб |
3 - 2 - The Data Encryption Standard (22 min).srt |
31.00Кб |
3 - 2 - The Data Encryption Standard (22 min).txt |
21.13Кб |
3 - 3 - Exhaustive search attacks (20 min).mp4 |
21.91Мб |
3 - 3 - Exhaustive search attacks (20 min).srt |
27.31Кб |
3 - 3 - Exhaustive search attacks (20 min).txt |
18.84Кб |
3 - 4 - More attacks on block ciphers (16 min).mp4 |
16.17Мб |
3 - 4 - More attacks on block ciphers (16 min).srt |
25.03Кб |
3 - 4 - More attacks on block ciphers (16 min).txt |
17.05Кб |
3 - 5 - The AES block cipher (14 min).mp4 |
14.52Мб |
3 - 5 - The AES block cipher (14 min).srt |
20.26Кб |
3 - 5 - The AES block cipher (14 min).txt |
13.87Кб |
3 - 6 - Block ciphers from PRGs(12 min).mp4 |
12.88Мб |
3 - 6 - Block ciphers from PRGs(12 min).srt |
17.48Кб |
3 - 6 - Block ciphers from PRGs(12 min).txt |
11.99Кб |
4 - 1 - Review_ PRPs and PRFs (12 min).mp4 |
12.72Мб |
4 - 1 - Review_ PRPs and PRFs (12 min).srt |
16.86Кб |
4 - 1 - Review_ PRPs and PRFs (12 min).txt |
11.55Кб |
4 - 2 - Modes of operation_ one time key (8 min).mp4 |
7.98Мб |
4 - 2 - Modes of operation_ one time key (8 min).srt |
11.81Кб |
4 - 2 - Modes of operation_ one time key (8 min).txt |
8.09Кб |
4 - 3 - Security for many-time key (23 min).mp4 |
24.92Мб |
4 - 3 - Security for many-time key (23 min).srt |
34.34Кб |
4 - 3 - Security for many-time key (23 min).txt |
23.43Кб |
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 |
17.96Мб |
4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt |
22.57Кб |
4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt |
15.41Кб |
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 |
10.44Мб |
4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt |
14.14Кб |
4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt |
9.69Кб |
5 - 1 - Message Authentication Codes (16 min).mp4 |
16.55Мб |
5 - 1 - Message Authentication Codes (16 min).srt |
23.41Кб |
5 - 1 - Message Authentication Codes (16 min).txt |
15.83Кб |
5 - 2 - MACs Based On PRFs (10 min).mp4 |
11.18Мб |
5 - 2 - MACs Based On PRFs (10 min).srt |
15.36Кб |
5 - 2 - MACs Based On PRFs (10 min).txt |
10.53Кб |
5 - 3 - CBC-MAC and NMAC (20 min).mp4 |
22.34Мб |
5 - 3 - CBC-MAC and NMAC (20 min).srt |
29.21Кб |
5 - 3 - CBC-MAC and NMAC (20 min).txt |
20.00Кб |
5 - 4 - MAC padding (9 min).mp4 |
9.30Мб |
5 - 4 - MAC padding (9 min).srt |
13.19Кб |
5 - 4 - MAC padding (9 min).txt |
9.03Кб |
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 |
17.06Мб |
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt |
24.36Кб |
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt |
16.68Кб |
6 - 1 - Introduction (11 min).mp4 |
11.92Мб |
6 - 1 - Introduction (11 min).srt |
16.70Кб |
6 - 1 - Introduction (11 min).txt |
11.46Кб |
6 - 2 - Generic birthday attack (16 min).mp4 |
16.14Мб |
6 - 2 - Generic birthday attack (16 min).srt |
22.09Кб |
6 - 2 - Generic birthday attack (16 min).txt |
15.15Кб |
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 |
12.58Мб |
6 - 3 - The Merkle-Damgard Paradigm (12 min).srt |
17.53Кб |
6 - 3 - The Merkle-Damgard Paradigm (12 min).txt |
12.04Кб |
6 - 4 - Constructing compression functions (8 min).mp4 |
8.78Мб |
6 - 4 - Constructing compression functions (8 min).srt |
12.89Кб |
6 - 4 - Constructing compression functions (8 min).txt |
8.80Кб |
6 - 5 - HMAC (7 min).mp4 |
7.83Мб |
6 - 5 - HMAC (7 min).srt |
10.06Кб |
6 - 5 - HMAC (7 min).txt |
6.89Кб |
6 - 6 - Timing attacks on MAC verification (9 min).mp4 |
9.39Мб |
6 - 6 - Timing attacks on MAC verification (9 min).srt |
13.35Кб |
6 - 6 - Timing attacks on MAC verification (9 min).txt |
9.15Кб |
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 |
14.02Мб |
7 - 1 - Active attacks on CPA-secure encryption (13 min).srt |
19.50Кб |
7 - 1 - Active attacks on CPA-secure encryption (13 min).txt |
13.34Кб |
7 - 2 - Definitions (6 min).mp4 |
5.61Мб |
7 - 2 - Definitions (6 min).srt |
8.20Кб |
7 - 2 - Definitions (6 min).txt |
5.61Кб |
7 - 3 - Chosen ciphertext attacks (12 min).mp4 |
13.04Мб |
7 - 3 - Chosen ciphertext attacks (12 min).srt |
18.72Кб |
7 - 3 - Chosen ciphertext attacks (12 min).txt |
12.81Кб |
7 - 4 - Constructions from ciphers and MACs (21 min).mp4 |
22.84Мб |
7 - 4 - Constructions from ciphers and MACs (21 min).srt |
30.66Кб |
7 - 4 - Constructions from ciphers and MACs (21 min).txt |
20.94Кб |
7 - 5 - Case study_ TLS (18 min).mp4 |
18.96Мб |
7 - 5 - Case study_ TLS (18 min).srt |
26.42Кб |
7 - 5 - Case study_ TLS (18 min).txt |
18.11Кб |
7 - 6 - CBC padding attacks (14 min).mp4 |
14.99Мб |
7 - 6 - CBC padding attacks (14 min).srt |
21.20Кб |
7 - 6 - CBC padding attacks (14 min).txt |
14.56Кб |
7 - 7 - Attacking non-atomic decryption (10 min).mp4 |
11.09Мб |
7 - 7 - Attacking non-atomic decryption (10 min).srt |
14.79Кб |
7 - 7 - Attacking non-atomic decryption (10 min).txt |
10.14Кб |
8 - 1 - Key Derivation (14 min).mp4 |
5.29Мб |
8 - 1 - Key Derivation (14 min).srt |
21.53Кб |
8 - 1 - Key Derivation (14 min).txt |
14.73Кб |
8 - 2 - Deterministic Encryption (15 min).mp4 |
15.62Мб |
8 - 2 - Deterministic Encryption (15 min).srt |
23.03Кб |
8 - 2 - Deterministic Encryption (15 min).txt |
15.79Кб |
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 |
22.06Мб |
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt |
30.85Кб |
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt |
21.09Кб |
8 - 4 - Tweakable encryption (15 min).mp4 |
15.58Мб |
8 - 4 - Tweakable encryption (15 min).srt |
21.97Кб |
8 - 4 - Tweakable encryption (15 min).txt |
15.03Кб |
8 - 5 - Format preserving encryption (13 min).mp4 |
13.21Мб |
8 - 5 - Format preserving encryption (13 min).srt |
18.57Кб |
8 - 5 - Format preserving encryption (13 min).txt |
12.74Кб |
9 - 1 - Trusted 3rd parties (11 min).mp4 |
12.22Мб |
9 - 1 - Trusted 3rd parties (11 min).srt |
17.32Кб |
9 - 1 - Trusted 3rd parties (11 min).txt |
11.90Кб |
9 - 2 - Merkle Puzzles (11 min).mp4 |
12.40Мб |
9 - 2 - Merkle Puzzles (11 min).srt |
19.66Кб |
9 - 2 - Merkle Puzzles (11 min).txt |
11.83Кб |
9 - 3 - The Diffie-Hellman protocol (19 min).mp4 |
20.96Мб |
9 - 3 - The Diffie-Hellman protocol (19 min).srt |
29.18Кб |
9 - 3 - The Diffie-Hellman protocol (19 min).txt |
19.97Кб |
9 - 4 - Public-key encryption (11 min).mp4 |
11.83Мб |
9 - 4 - Public-key encryption (11 min).srt |
16.95Кб |
9 - 4 - Public-key encryption (11 min).txt |
11.60Кб |