资源详情

返回首页 | 相关搜索
Cryprography
大小 1.03 GB
文件数 325
Info Hash: 0B1A028DA298554AEBE487991C114CD697173DAB
收录时间 2025-12-29 15:01:51
更新时间 2025-12-29 16:07:58
文件列表 (325)
2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4
26.8 MB
2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4
25.43 MB
4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4
24.92 MB
3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4
24.5 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4
23.4 MB
7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4
22.84 MB
5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4
22.34 MB
8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4
22.06 MB
3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4
21.91 MB
2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4
21.87 MB
10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4
21.22 MB
2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4
21.17 MB
9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4
20.96 MB
1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).mp4
20.47 MB
10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4
20.06 MB
2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4
20.04 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4
19.82 MB
10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).mp4
19.09 MB
7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).mp4
18.96 MB
3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).mp4
18.67 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).mp4
18.53 MB
4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4
17.96 MB
1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).mp4
17.46 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4
17.22 MB
5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4
17.06 MB
1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).mp4
17.01 MB
2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4
16.8 MB
5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4
16.55 MB
3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4
16.17 MB
6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4
16.14 MB
10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4
15.7 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4
15.63 MB
8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4
15.62 MB
8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4
15.58 MB
7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4
14.99 MB
3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4
14.52 MB
7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4
14.02 MB
10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4
13.89 MB
8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4
13.21 MB
7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4
13.04 MB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4
12.93 MB
3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4
12.88 MB
4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).mp4
12.72 MB
6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4
12.58 MB
9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4
12.4 MB
9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4
12.22 MB
6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4
11.92 MB
9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4
11.83 MB
2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).mp4
11.73 MB
1 Introduction (week 1)/1 - 1 - Course Overview (11 min).mp4
11.72 MB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4
11.29 MB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4
11.27 MB
5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4
11.18 MB
7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4
11.09 MB
4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4
10.44 MB
6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4
9.39 MB
5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4
9.3 MB
6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4
8.78 MB
4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).mp4
7.98 MB
6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4
7.83 MB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4
5.73 MB
7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4
5.61 MB
8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4
5.29 MB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4
4.69 MB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4
1.66 MB
1 Introduction (week 1)/01.3-intro-annotated.pptx
1.57 MB
2 Stream Ciphers (week 1)/02.1-stream-annotated.pptx
1.54 MB
1 Introduction (week 1)/01.3-intro-annotated.pdf
1.39 MB
2 Stream Ciphers (week 1)/02.5-stream-annotated.pptx
1.33 MB
2 Stream Ciphers (week 1)/02.2-stream-annotated.pptx
1.15 MB
3 Block Ciphers (week 2)/03.2-block-annotated.pdf
1.06 MB
2 Stream Ciphers (week 1)/02.3-stream-annotated.pptx
1.04 MB
1 Introduction (week 1)/01.2-intro-annotated.pptx
1.03 MB
7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf
873.34 KB
1 Introduction (week 1)/01.2-intro-annotated.pdf
866.09 KB
6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx
817.76 KB
3 Block Ciphers (week 2)/03.2-block-annotated.pptx
809.2 KB
3 Block Ciphers (week 2)/03.5-block-annotated.pdf
808.05 KB
9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx
735.2 KB
2 Stream Ciphers (week 1)/02.4-stream-annotated.pptx
732.52 KB
7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf
715.66 KB
7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf
685.97 KB
7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf
681.45 KB
7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf
672.57 KB
3 Block Ciphers (week 2)/03.3-block-annotated.pptx
622.09 KB
9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx
602.48 KB
2 Stream Ciphers (week 1)/02.3-stream-annotated.pdf
593.05 KB
8 Odds and ends (week 4)/08.4-odds-and-ends.pdf
550.71 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf
549.58 KB
7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pptx
547.85 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf
536.15 KB
7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf
533.29 KB
3 Block Ciphers (week 2)/03.4-block-annotated.pptx
524.22 KB
10 Intro. Number Theory (week 5)/10.1-numth-annotated.pptx
521.77 KB
8 Odds and ends (week 4)/08.3-odds-and-ends.pdf
515.4 KB
6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pptx
514.73 KB
8 Odds and ends (week 4)/08.3-odds-and-ends.pptx
512.96 KB
2 Stream Ciphers (week 1)/02.7-stream-annotated.pptx
481.45 KB
9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx
478.41 KB
3 Block Ciphers (week 2)/03.3-block-annotated.pdf
467.89 KB
10 Intro. Number Theory (week 5)/10.3-numth-annotated.pptx
464.1 KB
7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf
461.98 KB
2 Stream Ciphers (week 1)/02.4-stream-annotated.pdf
452.05 KB
8 Odds and ends (week 4)/08.4-odds-and-ends.pptx
449.88 KB
8 Odds and ends (week 4)/08.2-odds-and-ends.pdf
449.21 KB
3 Block Ciphers (week 2)/03.5-block-annotated.pptx
435.02 KB
9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf
434.87 KB
3 Block Ciphers (week 2)/03.6-block-annotated.pdf
434.19 KB
3 Block Ciphers (week 2)/03.4-block-annotated.pdf
419.63 KB
4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pptx
415.3 KB
1 Introduction (week 1)/01.4-intro-annotated.pptx
407.61 KB
4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pptx
399.32 KB
4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf
387.28 KB
7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pptx
380.94 KB
2 Stream Ciphers (week 1)/02.1-stream-annotated.pdf
380.28 KB
8 Odds and ends (week 4)/08.5-odds-and-ends.pdf
375.59 KB
4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pptx
366.22 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx
351.32 KB
7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pptx
351.07 KB
5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf
348.08 KB
2 Stream Ciphers (week 1)/02.2-stream-annotated.pdf
331.5 KB
8 Odds and ends (week 4)/08.1-odds-and-ends.pdf
328.66 KB
6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx
325.72 KB
5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pptx
325.45 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf
320.82 KB
4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pptx
318.07 KB
4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf
316.89 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx
308.88 KB
1 Introduction (week 1)/01.4-intro-annotated.pdf
307.92 KB
1 Introduction (week 1)/01.1-intro-annotated.pdf
307.34 KB
2 Stream Ciphers (week 1)/02.5-stream-annotated.pdf
301.67 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf
294.64 KB
1 Introduction (week 1)/01.1-intro-annotated.pptx
293.19 KB
3 Block Ciphers (week 2)/03.1-block-annotated.pdf
290.57 KB
10 Intro. Number Theory (week 5)/10.3-numth-annotated.pdf
287.45 KB
5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pptx
283.57 KB
5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pptx
279.99 KB
3 Block Ciphers (week 2)/03.6-block-annotated.pptx
275.78 KB
10 Intro. Number Theory (week 5)/10.4-numth-annotated.pdf
269.58 KB
2 Stream Ciphers (week 1)/02.6-stream-annotated.pptx
268.96 KB
9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf
268.92 KB
6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf
267.74 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf
264.4 KB
8 Odds and ends (week 4)/08.2-odds-and-ends.pptx
264.1 KB
4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf
263.42 KB
7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pptx
261.9 KB
4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf
259.45 KB
6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf
258.63 KB
5 Message Integrity (week 3)/05.4-integrity-mac-padding.pptx
249.32 KB
7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pptx
246.32 KB
6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf
245.86 KB
6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx
243.33 KB
2 Stream Ciphers (week 1)/02.6-stream-annotated.pdf
242.4 KB
10 Intro. Number Theory (week 5)/10.1-numth-annotated.pdf
241.83 KB
5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pptx
240.7 KB
6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pptx
240.14 KB
8 Odds and ends (week 4)/08.5-odds-and-ends.pptx
239.28 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf
239.02 KB
7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pptx
237.26 KB
5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf
236.25 KB
10 Intro. Number Theory (week 5)/10.5-numth-annotated.pdf
236.15 KB
10 Intro. Number Theory (week 5)/10.5-numth-annotated.pptx
234.48 KB
6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf
232.22 KB
6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf
230.19 KB
9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf
229.86 KB
3 Block Ciphers (week 2)/03.1-block-annotated.pptx
224.32 KB
10 Intro. Number Theory (week 5)/10.4-numth-annotated.pptx
224.15 KB
4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pptx
223.83 KB
5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf
223.58 KB
9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf
223.1 KB
7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pptx
222.28 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf
211.62 KB
9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx
210.22 KB
2 Stream Ciphers (week 1)/02.7-stream-annotated.pdf
210.13 KB
8 Odds and ends (week 4)/08.1-odds-and-ends.pptx
205.82 KB
10 Intro. Number Theory (week 5)/10.2-numth-annotated.pptx
205.79 KB
4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf
204.65 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx
204.47 KB
6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pptx
204.39 KB
6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf
200.02 KB
5 Message Integrity (week 3)/05.4-integrity-mac-padding.pdf
199.94 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx
199.52 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf
196.6 KB
5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf
194.29 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx
194.14 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx
191.08 KB
10 Intro. Number Theory (week 5)/10.2-numth-annotated.pdf
187.29 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx
186.9 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx
186.18 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx
185.2 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf
184.75 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx
181.7 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx
180.23 KB
12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf
179.3 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf
166.27 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).srt
36.98 KB
2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).srt
35.79 KB
2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt
34.82 KB
4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).srt
34.34 KB
3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).srt
31 KB
8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt
30.85 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).srt
30.69 KB
7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).srt
30.66 KB
5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).srt
29.21 KB
9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).srt
29.18 KB
2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).srt
28.38 KB
2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).srt
27.7 KB
3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).srt
27.31 KB
10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).srt
27.14 KB
7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).srt
26.42 KB
1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).srt
26.25 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).srt
26.18 KB
2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).srt
25.71 KB
10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).srt
25.64 KB
1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).srt
25.42 KB
3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).srt
25.03 KB
3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).srt
24.94 KB
5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt
24.36 KB
2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).txt
24.35 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).srt
24.16 KB
2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).srt
23.98 KB
2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt
23.76 KB
4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).txt
23.43 KB
5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).srt
23.41 KB
1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).srt
23.05 KB
8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).srt
23.03 KB
10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).srt
22.89 KB
4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt
22.57 KB
6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).srt
22.09 KB
8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).srt
21.97 KB
8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).srt
21.53 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).srt
21.52 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).txt
21.24 KB
7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).srt
21.2 KB
3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).txt
21.13 KB
8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt
21.09 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).txt
21 KB
7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).txt
20.94 KB
3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).srt
20.26 KB
5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).txt
20 KB
9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).txt
19.97 KB
9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).srt
19.66 KB
7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).srt
19.5 KB
2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt
19.39 KB
10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).srt
19.22 KB
2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).txt
18.9 KB
3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).txt
18.84 KB
7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).srt
18.72 KB
8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).srt
18.57 KB
7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).txt
18.11 KB
10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).txt
18.08 KB
10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).srt
18.02 KB
1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).txt
17.97 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).txt
17.94 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).srt
17.83 KB
2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).txt
17.58 KB
10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).txt
17.55 KB
6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).srt
17.53 KB
3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).srt
17.48 KB
1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).txt
17.37 KB
9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).srt
17.32 KB
3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).txt
17.05 KB
9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).srt
16.95 KB
3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).txt
16.92 KB
4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).srt
16.86 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).srt
16.81 KB
1 Introduction (week 1)/1 - 1 - Course Overview (11 min).srt
16.74 KB
6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).srt
16.7 KB
5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt
16.68 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).txt
16.51 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .srt
16.45 KB
2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).txt
16.3 KB
2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).srt
16.21 KB
5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).txt
15.83 KB
8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).txt
15.79 KB
1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).txt
15.74 KB
10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).txt
15.47 KB
4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt
15.41 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).srt
15.36 KB
5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).srt
15.36 KB
6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).txt
15.15 KB
8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).txt
15.03 KB
7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).srt
14.79 KB
8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).txt
14.73 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).txt
14.69 KB
7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).txt
14.56 KB
4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt
14.14 KB
3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).txt
13.87 KB
6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).srt
13.35 KB
7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt
13.34 KB
5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).srt
13.19 KB
10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).txt
13.02 KB
6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).srt
12.89 KB
7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).txt
12.81 KB
8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).txt
12.74 KB
10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).txt
12.3 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).txt
12.23 KB
6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt
12.04 KB
3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).txt
11.99 KB
9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).txt
11.9 KB
9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).txt
11.83 KB
4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).srt
11.81 KB
9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).txt
11.6 KB
4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).txt
11.55 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).txt
11.54 KB
1 Introduction (week 1)/1 - 1 - Course Overview (11 min).txt
11.46 KB
6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).txt
11.46 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .txt
11.25 KB
2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).txt
11.05 KB
5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).txt
10.53 KB
7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).txt
10.14 KB
6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).srt
10.06 KB
4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt
9.69 KB
6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).txt
9.15 KB
5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).txt
9.03 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).srt
9.01 KB
6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).txt
8.8 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).txt
8.38 KB
7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).srt
8.2 KB
4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).txt
8.09 KB
6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).txt
6.89 KB
12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).txt
6.2 KB
7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).txt
5.61 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).srt
3.61 KB
11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).txt
2.06 KB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。