Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
01-intro-v2-annotated.pdf |
2.70Мб |
02-stream-v2-annotated.pdf |
6.64Мб |
03-block-v2-annotated.pdf |
2.82Мб |
04-using-block-v2-annotated.pdf |
909.19Кб |
05-integrity-v2-annotated.pdf |
690.20Кб |
06-collision-resistance-v2-annotated.pdf |
830.64Кб |
07-authenc-v2-annotated.pdf |
1.54Мб |
08-odds-and-ends-v2-annotated.pdf |
1.63Мб |
09-basic-key-exchange-annotated.pdf |
804.43Кб |
10-numth-annotated.pdf |
722.47Кб |
11-pubkey-trapdoor-annotated.pdf |
1023.42Кб |
12-pubkey-dh-annotated.pdf |
1.02Мб |
CR1 - 01 - 01 - Course Overview (11 min).mp4 |
11.72Мб |
CR1 - 01 - 01 - Course Overview (11 min).srt |
16.76Кб |
CR1 - 01 - 02 - What is cryptography (15 min).mp4 |
17.01Мб |
CR1 - 01 - 02 - What is cryptography (15 min).srt |
25.42Кб |
CR1 - 01 - 03 - History of cryptography (19 min).mp4 |
20.47Мб |
CR1 - 01 - 03 - History of cryptography (19 min).srt |
26.08Кб |
CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp4 |
19.82Мб |
CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).srt |
25.35Кб |
CR1 - 01 - 05 - Discrete probability (crash course, cont.) (14 min).srt |
20.02Кб |
CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp4 |
14.64Мб |
CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp4 |
20.04Мб |
CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).srt |
25.63Кб |
CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp4 |
21.17Мб |
CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).srt |
28.40Кб |
CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp4 |
25.43Мб |
CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).srt |
34.80Кб |
CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp4 |
21.87Мб |
CR1 - 02 - 04 - Real-world stream ciphers (20 min).srt |
27.69Кб |
CR1 - 02 - 05 - PRG Security Definitions (25 min).mp4 |
26.80Мб |
CR1 - 02 - 05 - PRG Security Definitions (25 min).srt |
35.79Кб |
CR1 - 02 - 06 - Semantic Security (16 min).mp4 |
16.80Мб |
CR1 - 02 - 06 - Semantic Security (16 min).srt |
23.97Кб |
CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].mp4 |
11.73Мб |
CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].srt |
16.21Кб |
CR1 - 03 - 01 - What are block ciphers_ (17 min).srt |
24.94Кб |
CR1 - 03 - 01 - What are block ciphers (17 min).mp4 |
18.67Мб |
CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp4 |
24.50Мб |
CR1 - 03 - 02 - The Data Encryption Standard (22 min).srt |
31.32Кб |
CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp4 |
21.91Мб |
CR1 - 03 - 03 - Exhaustive search attacks (20 min).srt |
27.31Кб |
CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp4 |
17.75Мб |
CR1 - 03 - 04 - More attacks on block ciphers (16 min).srt |
25.03Кб |
CR1 - 03 - 05 - The AES block cipher (14 min).mp4 |
14.52Мб |
CR1 - 03 - 05 - The AES block cipher (14 min).srt |
20.24Кб |
CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp4 |
12.88Мб |
CR1 - 03 - 06 - Block ciphers from PRGs(12 min).srt |
17.47Кб |
CR1 - 04 - 01 - Review_ PRPs and PRFs (12 min).srt |
16.80Кб |
CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp4 |
12.72Мб |
CR1 - 04 - 02 - Modes of operation_ one time key (8 min).srt |
11.84Кб |
CR1 - 04 - 02 - Modes of operation one time key (8 min).mp4 |
7.98Мб |
CR1 - 04 - 03 - Security for many-time key (23 min).mp4 |
24.92Мб |
CR1 - 04 - 03 - Security for many-time key (23 min).srt |
34.34Кб |
CR1 - 04 - 04 - Modes of operation_ many time key (CBC) (16 min).srt |
24.42Кб |
CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp4 |
17.96Мб |
CR1 - 04 - 05 - Modes of operation_ many time key (CTR) (10 min).srt |
14.15Кб |
CR1 - 04 - 05 - Modes of operation many time key (CTR) (10 min).mp4 |
10.44Мб |
CR1 - 05 - 01 - Message Authentication Codes (16 min).mp4 |
16.55Мб |
CR1 - 05 - 01 - Message Authentication Codes (16 min).srt |
23.43Кб |
CR1 - 05 - 02 - MACs Based On PRFs (10 min).mp4 |
11.18Мб |
CR1 - 05 - 02 - MACs Based On PRFs (10 min).srt |
15.36Кб |
CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp4 |
22.34Мб |
CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).srt |
29.15Кб |
CR1 - 05 - 04 - MAC padding (9 min).mp4 |
9.30Мб |
CR1 - 05 - 04 - MAC padding (9 min).srt |
13.19Кб |
CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp4 |
17.06Мб |
CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).srt |
24.36Кб |
CR1 - 06 - 01 - Introduction (11 min).mp4 |
11.92Мб |
CR1 - 06 - 01 - Introduction (11 min).srt |
16.70Кб |
CR1 - 06 - 02 - Generic birthday attack (16 min).mp4 |
16.14Мб |
CR1 - 06 - 02 - Generic birthday attack (16 min).srt |
21.99Кб |
CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp4 |
12.58Мб |
CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).srt |
17.34Кб |
CR1 - 06 - 04 - Constructing compression functions (8 min).mp4 |
8.78Мб |
CR1 - 06 - 04 - Constructing compression functions (8 min).srt |
12.89Кб |
CR1 - 06 - 05 - HMAC (7 min).mp4 |
7.83Мб |
CR1 - 06 - 05 - HMAC (7 min).srt |
10.06Кб |
CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).mp4 |
9.39Мб |
CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).srt |
13.35Кб |
CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp4 |
14.02Мб |
CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).srt |
19.52Кб |
CR1 - 07 - 02 - Definitions (6 min).mp4 |
5.61Мб |
CR1 - 07 - 02 - Definitions (6 min).srt |
8.27Кб |
CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp4 |
13.04Мб |
CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).srt |
18.70Кб |
CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp4 |
22.84Мб |
CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).srt |
30.67Кб |
CR1 - 07 - 05 - Case study_ TLS (18 min).srt |
26.38Кб |
CR1 - 07 - 05 - Case study TLS (18 min).mp4 |
18.96Мб |
CR1 - 07 - 06 - CBC padding attacks (14 min).mp4 |
14.99Мб |
CR1 - 07 - 06 - CBC padding attacks (14 min).srt |
21.21Кб |
CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp4 |
11.09Мб |
CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).srt |
14.91Кб |
CR1 - 08 - 01 - Key Derivation (14 min).mp4 |
14.57Мб |
CR1 - 08 - 01 - Key Derivation (14 min).srt |
21.44Кб |
CR1 - 08 - 02 - Deterministic Encryption (15 min).mp4 |
15.62Мб |
CR1 - 08 - 02 - Deterministic Encryption (15 min).srt |
22.99Кб |
CR1 - 08 - 03 - Deterministic Encryption_SIV and wide PRP (21 min).srt |
30.87Кб |
CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 |
22.06Мб |
CR1 - 08 - 04 - Tweakable encryption (15 min).mp4 |
15.58Мб |
CR1 - 08 - 04 - Tweakable encryption (15 min).srt |
22.03Кб |
CR1 - 08 - 05 - Format preserving encryption (13 min).mp4 |
13.21Мб |
CR1 - 08 - 05 - Format preserving encryption (13 min).srt |
18.54Кб |
CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp4 |
12.22Мб |
CR1 - 09 - 01 - Trusted 3rd parties (11 min).srt |
17.33Кб |
CR1 - 09 - 02 - Merkle Puzzles (11 min).mp4 |
12.40Мб |
CR1 - 09 - 02 - Merkle Puzzles (11 min).srt |
19.67Кб |
CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp4 |
20.96Мб |
CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).srt |
29.20Кб |
CR1 - 09 - 04 - Public-key encryption (11 min).mp4 |
11.83Мб |
CR1 - 09 - 04 - Public-key encryption (11 min).srt |
16.95Кб |
CR1 - 10 - 01 - Notation (15 min).mp4 |
15.70Мб |
CR1 - 10 - 01 - Notation (15 min).srt |
19.28Кб |
CR1 - 10 - 02 - Fermat and Euler (18 min).mp4 |
20.06Мб |
CR1 - 10 - 02 - Fermat and Euler (18 min).srt |
25.59Кб |
CR1 - 10 - 03 - Modular e'th roots (17 min).srt |
22.91Кб |
CR1 - 10 - 03 - Modular eth roots (17 min).mp4 |
19.09Мб |
CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp4 |
13.89Мб |
CR1 - 10 - 04 - Arithmetic algorithms (13 min).srt |
18.07Кб |
CR1 - 10 - 05 - Intractable problems (19 min).mp4 |
21.22Мб |
CR1 - 10 - 05 - Intractable problems (19 min).srt |
27.61Кб |
CR1 - 11 - 01 - Definitions and security (16 min).mp4 |
17.22Мб |
CR1 - 11 - 01 - Definitions and security (16 min).srt |
24.21Кб |
CR1 - 11 - 02 - Constructions (11 min) .mp4 |
11.29Мб |
CR1 - 11 - 02 - Constructions (11 min) .srt |
16.52Кб |
CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp4 |
19.82Мб |
CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).srt |
26.14Кб |
CR1 - 11 - 04 - PKCS 1 (23 min).mp4 |
23.40Мб |
CR1 - 11 - 04 - PKCS 1 (23 min).srt |
30.62Кб |
CR1 - 11 - 05 - Is RSA a one-way function_ (17 min).srt |
26.84Кб |
CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp4 |
18.53Мб |
CR1 - 11 - 06 - RSA in practice (14 min).mp4 |
15.63Мб |
CR1 - 11 - 06 - RSA in practice (14 min).srt |
20.95Кб |
CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp4 |
21.36Мб |
CR1 - 12 - 01 - The ElGamal Public-key System (23 min).srt |
37.11Кб |
CR1 - 12 - 02 - ElGamal Security (14 min).mp4 |
14.53Мб |
CR1 - 12 - 02 - ElGamal Security (14 min).srt |
21.57Кб |
CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).mp4 |
11.27Мб |
CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).srt |
16.81Кб |
CR1 - 12 - 04 - A Unifying Theme (12 min).mp4 |
12.93Мб |
CR1 - 12 - 04 - A Unifying Theme (12 min).srt |
17.78Кб |
CR1 - 12 - 05 - Farewell (for now) (6 min).mp4 |
5.73Мб |
CR1 - 12 - 05 - Farewell (for now) (6 min).srt |
9.04Кб |