Coursera-Crypto-I-2FIu
- CR1 - 01 - 01 - Course Overview (11 min).mp411.72MB
- CR1 - 01 - 02 - What is cryptography (15 min).mp417.01MB
- CR1 - 01 - 03 - History of cryptography (19 min).mp420.47MB
- CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp419.82MB
- CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp414.64MB
- CR1 - 02 - 01 - Infortion theoretic security and the one time pad (19 min).mp420.04MB
- CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
- CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
- CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp421.87MB
- CR1 - 02 - 05 - PRG Security Definitions (25 min).mp426.80MB
- CR1 - 02 - 06 - Sentic Security (16 min).mp416.80MB
- CR1 - 02 - 07 - Stream ciphers are sentically secure (11 min) [optional].mp411.73MB
- CR1 - 03 - 01 - What are block ciphers (17 min).mp418.67MB
- CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp424.50MB
- CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp421.91MB
- CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp417.75MB
- CR1 - 03 - 05 - The AES block cipher (14 min).mp414.52MB
- CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp412.88MB
- CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp412.72MB
- CR1 - 04 - 02 - Modes of operation one time key (8 min).mp47.98MB
- CR1 - 04 - 03 - Security for ny-time key (23 min).mp424.92MB
- CR1 - 04 - 04 - Modes of operation ny time key (CBC) (16 min).mp417.96MB
- CR1 - 04 - 05 - Modes of operation ny time key (CTR) (10 min).mp410.44MB
- CR1 - 05 - 01 - Message Authentication Codes (16 min).mp416.55MB
- CR1 - 05 - 02 - Cs Based On PRFs (10 min).mp411.18MB
- CR1 - 05 - 03 - CBC-C and NMAC (20 min).mp422.34MB
- CR1 - 05 - 04 - C padding (9 min).mp49.30MB
- CR1 - 05 - 05 - PC and the Carter-Wegman MAC (16 min).mp417.06MB
- CR1 - 06 - 01 - Introduction (11 min).mp411.92MB
- CR1 - 06 - 02 - Generic birthday attack (16 min).mp416.14MB
- CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
- CR1 - 06 - 04 - Constructing compression functions (8 min).mp48.78MB
- CR1 - 06 - 05 - HC (7 min).mp47.83MB
- CR1 - 06 - 06 - Timing attacks on C verification (9 min).mp49.39MB
- CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
- CR1 - 07 - 02 - Definitions (6 min).mp45.61MB
- CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp413.04MB
- CR1 - 07 - 04 - Constructions from ciphers and Cs (21 min).mp422.84MB
- CR1 - 07 - 05 - Case study TLS (18 min).mp418.96MB
- CR1 - 07 - 06 - CBC padding attacks (14 min).mp414.99MB
- CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp411.09MB
- CR1 - 08 - 01 - Key Derivation (14 min).mp414.57MB
- CR1 - 08 - 02 - Deterministic Encryption (15 min).mp415.62MB
- CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06MB
- CR1 - 08 - 04 - Tweakable encryption (15 min).mp415.58MB
- CR1 - 08 - 05 - Fort preserving encryption (13 min).mp413.21MB
- CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp412.22MB
- CR1 - 09 - 02 - Merkle Puzzles (11 min).mp412.40MB
- CR1 - 09 - 03 - The Diffie-Helln protocol (19 min).mp420.96MB
- CR1 - 09 - 04 - Public-key encryption (11 min).mp411.83MB
- CR1 - 10 - 01 - Notation (15 min).mp415.70MB
- CR1 - 10 - 02 - Fert and Euler (18 min).mp420.06MB
- CR1 - 10 - 03 - Modular eth roots (17 min).mp419.09MB
- CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp413.89MB
- CR1 - 10 - 05 - Intractable problems (19 min).mp421.22MB
- CR1 - 11 - 01 - Definitions and security (16 min).mp417.22MB
- CR1 - 11 - 02 - Constructions (11 min) .mp411.29MB
- CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp419.82MB
- CR1 - 11 - 04 - PKCS 1 (23 min).mp423.40MB
- CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp418.53MB
- CR1 - 11 - 06 - RSA in practice (14 min).mp415.63MB
- CR1 - 12 - 01 - The ElGal Public-key System (23 min).mp421.36MB
- CR1 - 12 - 02 - ElGal Security (14 min).mp414.53MB
- CR1 - 12 - 03 - ElGal Variants With Better Security (11 min).mp411.27MB
- CR1 - 12 - 04 - A Unifying Theme (12 min).mp412.93MB
- CR1 - 12 - 05 - Farewell (for now) (6 min).mp45.73MB
- slides01-intro-v2-annotated.pdf2.70MB
- slides02-stream-v2-annotated.pdf6.64MB
- slides03-block-v2-annotated.pdf2.82MB
- slides04-using-block-v2-annotated.pdf909.19KB
- slides05-integrity-v2-annotated.pdf690.20KB
- slides06-collision-resistance-v2-annotated.pdf830.64KB
- slides07-authenc-v2-annotated.pdf1.54MB
- slides08-odds-and-ends-v2-annotated.pdf1.63MB
- slides09-basic-key-exchange-annotated.pdf804.43KB
- slides10-numth-annotated.pdf722.47KB
- slides11-pubkey-trapdoor-annotated.pdf1023.42KB
- slides12-pubkey-dh-annotated.pdf1.02MB
- CreateTime2017-01-25
- UpdateTime2017-08-03
- FileTotalCount144
- TotalSize1.05GBHotTimes8ViewTimes12DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.MDBS-005 2.ONSD-591 3.MIBD-596 4.OPBD-077 5.DOKS-115 6.MGDV-060 7.XV-1000 8.KK-063 9.GD-859 10.TT-489 11.FETI-018 12.IMG-077 13.RAFT-002 14.EVO-055 15.SDMT-978 16.SHI-208 17.ALD-187 18.ZQR-004 19.VNDS-2698 20.JUX-353 21.RD-670 22.ASFB-165 23.SNIS-573 24.RCT-845 25.MDB-708 26.MIZD-041 27.AGEMIX-339 28.BOKD-078 29.SDEN-003 30.MKMP-172 31.MIAE-115 32.JKH-030 33.KMVR-422 34.BASX-040 35.DSVR-403 36.ATKD-278 37.EMAZ-388 38.VSED-118 39.GOPJ-318 40.12010 41.155 42.011 43.272 44.368 45.187 46.073 47.509 48.616 49.010 50.109 51.481 52.337 53.227 54.202 55.159 56.609 57.265 58.001 59.488 60.538 61.42 62.011 63.023 64.0 65.008 66.375 67.031 68.125 69.159 70.929 71.341 72.022 73.003 74.045 75.147 76.004 77.106 78.046 79.024 80.045 81.328 82.060 83.953 84.060 85.078