fileCoursera-Crypto-I-2FIu

Coursera Crypto I
  • MP4CR1 - 01 - 01 - Course Overview (11 min).mp411.72MB
  • MP4CR1 - 01 - 02 - What is cryptography (15 min).mp417.01MB
  • MP4CR1 - 01 - 03 - History of cryptography (19 min).mp420.47MB
  • MP4CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp419.82MB
  • MP4CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp414.64MB
  • MP4CR1 - 02 - 01 - Infortion theoretic security and the one time pad (19 min).mp420.04MB
  • MP4CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
  • MP4CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
  • MP4CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp421.87MB
  • MP4CR1 - 02 - 05 - PRG Security Definitions (25 min).mp426.80MB
  • MP4CR1 - 02 - 06 - Sentic Security (16 min).mp416.80MB
  • MP4CR1 - 02 - 07 - Stream ciphers are sentically secure (11 min) [optional].mp411.73MB
  • MP4CR1 - 03 - 01 - What are block ciphers (17 min).mp418.67MB
  • MP4CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp424.50MB
  • MP4CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp421.91MB
  • MP4CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp417.75MB
  • MP4CR1 - 03 - 05 - The AES block cipher (14 min).mp414.52MB
  • MP4CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp412.88MB
  • MP4CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp412.72MB
  • MP4CR1 - 04 - 02 - Modes of operation one time key (8 min).mp47.98MB
  • MP4CR1 - 04 - 03 - Security for ny-time key (23 min).mp424.92MB
  • MP4CR1 - 04 - 04 - Modes of operation ny time key (CBC) (16 min).mp417.96MB
  • MP4CR1 - 04 - 05 - Modes of operation ny time key (CTR) (10 min).mp410.44MB
  • MP4CR1 - 05 - 01 - Message Authentication Codes (16 min).mp416.55MB
  • MP4CR1 - 05 - 02 - Cs Based On PRFs (10 min).mp411.18MB
  • MP4CR1 - 05 - 03 - CBC-C and NMAC (20 min).mp422.34MB
  • MP4CR1 - 05 - 04 - C padding (9 min).mp49.30MB
  • MP4CR1 - 05 - 05 - PC and the Carter-Wegman MAC (16 min).mp417.06MB
  • MP4CR1 - 06 - 01 - Introduction (11 min).mp411.92MB
  • MP4CR1 - 06 - 02 - Generic birthday attack (16 min).mp416.14MB
  • MP4CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
  • MP4CR1 - 06 - 04 - Constructing compression functions (8 min).mp48.78MB
  • MP4CR1 - 06 - 05 - HC (7 min).mp47.83MB
  • MP4CR1 - 06 - 06 - Timing attacks on C verification (9 min).mp49.39MB
  • MP4CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
  • MP4CR1 - 07 - 02 - Definitions (6 min).mp45.61MB
  • MP4CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp413.04MB
  • MP4CR1 - 07 - 04 - Constructions from ciphers and Cs (21 min).mp422.84MB
  • MP4CR1 - 07 - 05 - Case study TLS (18 min).mp418.96MB
  • MP4CR1 - 07 - 06 - CBC padding attacks (14 min).mp414.99MB
  • MP4CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp411.09MB
  • MP4CR1 - 08 - 01 - Key Derivation (14 min).mp414.57MB
  • MP4CR1 - 08 - 02 - Deterministic Encryption (15 min).mp415.62MB
  • MP4CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06MB
  • MP4CR1 - 08 - 04 - Tweakable encryption (15 min).mp415.58MB
  • MP4CR1 - 08 - 05 - Fort preserving encryption (13 min).mp413.21MB
  • MP4CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp412.22MB
  • MP4CR1 - 09 - 02 - Merkle Puzzles (11 min).mp412.40MB
  • MP4CR1 - 09 - 03 - The Diffie-Helln protocol (19 min).mp420.96MB
  • MP4CR1 - 09 - 04 - Public-key encryption (11 min).mp411.83MB
  • MP4CR1 - 10 - 01 - Notation (15 min).mp415.70MB
  • MP4CR1 - 10 - 02 - Fert and Euler (18 min).mp420.06MB
  • MP4CR1 - 10 - 03 - Modular eth roots (17 min).mp419.09MB
  • MP4CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp413.89MB
  • MP4CR1 - 10 - 05 - Intractable problems (19 min).mp421.22MB
  • MP4CR1 - 11 - 01 - Definitions and security (16 min).mp417.22MB
  • MP4CR1 - 11 - 02 - Constructions (11 min) .mp411.29MB
  • MP4CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp419.82MB
  • MP4CR1 - 11 - 04 - PKCS 1 (23 min).mp423.40MB
  • MP4CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp418.53MB
  • MP4CR1 - 11 - 06 - RSA in practice (14 min).mp415.63MB
  • MP4CR1 - 12 - 01 - The ElGal Public-key System (23 min).mp421.36MB
  • MP4CR1 - 12 - 02 - ElGal Security (14 min).mp414.53MB
  • MP4CR1 - 12 - 03 - ElGal Variants With Better Security (11 min).mp411.27MB
  • MP4CR1 - 12 - 04 - A Unifying Theme (12 min).mp412.93MB
  • MP4CR1 - 12 - 05 - Farewell (for now) (6 min).mp45.73MB
  • PDFslides01-intro-v2-annotated.pdf2.70MB
  • PDFslides02-stream-v2-annotated.pdf6.64MB
  • PDFslides03-block-v2-annotated.pdf2.82MB
  • PDFslides04-using-block-v2-annotated.pdf909.19KB
  • PDFslides05-integrity-v2-annotated.pdf690.20KB
  • PDFslides06-collision-resistance-v2-annotated.pdf830.64KB
  • PDFslides07-authenc-v2-annotated.pdf1.54MB
  • PDFslides08-odds-and-ends-v2-annotated.pdf1.63MB
  • PDFslides09-basic-key-exchange-annotated.pdf804.43KB
  • PDFslides10-numth-annotated.pdf722.47KB
  • PDFslides11-pubkey-trapdoor-annotated.pdf1023.42KB
  • PDFslides12-pubkey-dh-annotated.pdf1.02MB
Latest Search: 1.MDBS-005   2.ONSD-591   3.MIBD-596   4.OPBD-077   5.DOKS-115   6.MGDV-060   7.XV-1000   8.KK-063   9.GD-859   10.TT-489   11.FETI-018   12.IMG-077   13.RAFT-002   14.EVO-055   15.SDMT-978   16.SHI-208   17.ALD-187   18.ZQR-004   19.VNDS-2698   20.JUX-353   21.RD-670   22.ASFB-165   23.SNIS-573   24.RCT-845   25.MDB-708   26.MIZD-041   27.AGEMIX-339   28.BOKD-078   29.SDEN-003   30.MKMP-172   31.MIAE-115   32.JKH-030   33.KMVR-422   34.BASX-040   35.DSVR-403   36.ATKD-278   37.EMAZ-388   38.VSED-118   39.GOPJ-318   40.12010   41.155   42.011   43.272   44.368   45.187   46.073   47.509   48.616   49.010   50.109   51.481   52.337   53.227   54.202   55.159   56.609   57.265   58.001   59.488   60.538   61.42   62.011   63.023   64.0   65.008   66.375   67.031   68.125   69.159   70.929   71.341   72.022   73.003   74.045   75.147   76.004   77.106   78.046   79.024   80.045   81.328   82.060   83.953   84.060   85.078