FileMood

Download [ CoursePig.com ] Secret Key Cryptography, Video Edition

CoursePig com Secret Key Cryptography Video Edition

Name

[ CoursePig.com ] Secret Key Cryptography, Video Edition

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.8 GB

Total Files

111

Last Seen

2025-07-18 23:52

Hash

B60167940703B7D92F76FC2E52BF0BE7D0DD2F18

/

Get Bonus Downloads Here.url

0.2 KB

/~Get Your Files Here !/

001. Chapter 1. Introduction.mp4

19.2 MB

002. Chapter 2. What is cryptography.mp4

22.9 MB

003. Chapter 2. Types of cryptography.mp4

30.8 MB

004. Chapter 2. Mechanical vs. digital.mp4

32.5 MB

005. Chapter 2. Why choose Secret Key.mp4

26.9 MB

006. Chapter 3. Preliminary concepts.mp4

18.8 MB

007. Chapter 3. Number bases.mp4

19.9 MB

008. Chapter 3. Prime numbers.mp4

22.5 MB

009. Chapter 4. Cryptographer’s toolbox.mp4

30.7 MB

010. Chapter 4. Transposition.mp4

23.9 MB

011. Chapter 4. Chained digit generator.mp4

21.8 MB

012. Chapter 5. Substitution ciphers.mp4

14.9 MB

013. Chapter 5. Simple substitution.mp4

12.4 MB

014. Chapter 5. Mixing the alphabet.mp4

18.6 MB

015. Chapter 5. Nomenclators.mp4

19.7 MB

016. Chapter 5. The Kasiski method.mp4

25.4 MB

017. Chapter 5. Index of Coincidence.mp4

22.2 MB

018. Chapter 5. Solving a polyalphabetic cipher.mp4

21.9 MB

019. Chapter 5. Solving a general polyalphabetic cipher.mp4

22.5 MB

020. Chapter 5. Running key.mp4

30.7 MB

021. Chapter 5. Simulated rotor machines.mp4

24.2 MB

022. Chapter 5. Three-rotor machine.mp4

30.0 MB

023. Chapter 6. Countermeasures.mp4

20.5 MB

024. Chapter 6. Interrupted key.mp4

29.6 MB

025. Chapter 6. Bigram and trigram substitution.mp4

25.8 MB

026. Chapter 6. Adding null bits.mp4

34.0 MB

027. Chapter 7. Transposition.mp4

25.1 MB

028. Chapter 7. Columnar transposition.mp4

21.3 MB

029. Chapter 7. Double columnar transposition.mp4

29.7 MB

030. Chapter 7. Key transposition Part 1.mp4

19.8 MB

031. Chapter 7. Key transposition Part 2.mp4

17.3 MB

032. Chapter 8. Jefferson Wheel Cypher.mp4

38.2 MB

033. Chapter 8. Ciphertext-only solution.mp4

22.5 MB

034. Chapter 9. Fractionation.mp4

30.1 MB

035. Chapter 9. Solving a Playfair cipher.mp4

26.4 MB

036. Chapter 9. Three Square.mp4

26.1 MB

037. Chapter 9. Bifid.mp4

24.0 MB

038. Chapter 9. Diagonal bifid.mp4

24.8 MB

039. Chapter 9. Rectangular grids.mp4

26.5 MB

040. Chapter 9. Cyclic 8×N.mp4

20.1 MB

041. Chapter 10. Variable-length fractionation.mp4

22.7 MB

042. Chapter 10. Periodic lengths.mp4

24.3 MB

043. Chapter 10. Post tag systems.mp4

32.8 MB

044. Chapter 10. Different-length tags.mp4

31.2 MB

045. Chapter 10. Text compression.mp4

31.8 MB

046. Chapter 10. Arithmetic coding.mp4

29.9 MB

047. Chapter 10. Adaptive arithmetic coding.mp4

27.3 MB

048. Chapter 11. Block ciphers.mp4

36.1 MB

049. Chapter 11. Double DES.mp4

22.3 MB

050. Chapter 11. Matrix multiplication.mp4

27.5 MB

051. Chapter 11. Fixed vs. keyed substitution.mp4

23.9 MB

052. Chapter 11. Involutory block cipher.mp4

20.7 MB

053. Chapter 11. Ripple ciphers.mp4

27.7 MB

054. Chapter 11. Block chaining.mp4

24.1 MB

055. Chapter 11. Chaining mode summary.mp4

17.3 MB

056. Chapter 12. Principles for secure encryption.mp4

23.5 MB

057. Chapter 12. Confusion.mp4

36.0 MB

058. Chapter 12. Correlation coefficient.mp4

20.6 MB

059. Chapter 12. Base-26 linearity.mp4

31.9 MB

060. Chapter 12. Base-256 linearity.mp4

19.9 MB

061. Chapter 12. Adding a backdoor.mp4

19.6 MB

062. Chapter 12. Condensed linearity.mp4

21.3 MB

063. Chapter 12. Constructing an S-box.mp4

30.9 MB

064. Chapter 12. Diffusion.mp4

24.8 MB

065. Chapter 12. Saturation Part 1.mp4

18.8 MB

066. Chapter 12. Saturation Part 2.mp4

21.7 MB

067. Chapter 13. Stream ciphers.mp4

23.9 MB

068. Chapter 13. Multiplicative congruential generator Part 1.mp4

28.6 MB

069. Chapter 13. Multiplicative congruential generator Part 2.mp4

19.2 MB

070. Chapter 13. Linear congruential generator.mp4

24.7 MB

071. Chapter 13. Chained addition generator.mp4

21.4 MB

072. Chapter 13. Mersenne Twister.mp4

28.0 MB

073. Chapter 13. Estimating the period.mp4

25.4 MB

074. Chapter 13. Combining generators Part 1.mp4

25.3 MB

075. Chapter 13. Combining generators Part 2.mp4

24.3 MB

076. Chapter 13. True random numbers.mp4

19.3 MB

077. Chapter 13. Refreshing the random bytes.mp4

34.7 MB

078. Chapter 13. Hash functions.mp4

19.1 MB

079. Chapter 14. One-time pad.mp4

33.5 MB

080. Chapter 14. Key supply.mp4

35.5 MB

081. Chapter 14. Diffie-Hellman key exchange.mp4

38.4 MB

082. Chapter 14. Constructing large primes, new Part 1.mp4

36.8 MB

083. Chapter 14. Constructing large primes, new Part 2.mp4

32.6 MB

084. Chapter 15. Matrix methods.mp4

14.0 MB

085. Chapter 15. Transposition matrix.mp4

34.4 MB

086. Chapter 15. Hill cipher, computer versions.mp4

31.7 MB

087. Chapter 15. Large integer multiplication.mp4

24.7 MB

088. Chapter 15. Solving a linear congruence.mp4

19.0 MB

089. Chapter 15. Laddering.mp4

13.6 MB

090. Chapter 15. Large integer ciphers.mp4

27.6 MB

091. Chapter 15. Multiplication modulo P.mp4

24.1 MB

092. Chapter 15. Rings.mp4

21.2 MB

093. Chapter 15. Matrices over a ring.mp4

28.3 MB

094. Chapter 15. Finding an invertible matrix.mp4

15.5 MB

095. Chapter 16. Three pass protocol.mp4

32.0 MB

096. Chapter 16. Discrete logarithm.mp4

25.0 MB

097. Chapter 16. Factoring.mp4

26.7 MB

098. Chapter 16. Matrix three pass protocol.mp4

27.8 MB

099. Chapter 16. Maximum order.mp4

23.9 MB

100. Chapter 16. Solving bilinear equations.mp4

28.7 MB

101. Chapter 16. Two-sided three pass protocol.mp4

18.9 MB

102. Chapter 17. Codes.mp4

29.1 MB

103. Chapter 18. Quantum computers.mp4

31.3 MB

104. Chapter 18. Error correction.mp4

33.8 MB

105. Chapter 18. Equations.mp4

17.4 MB

106. Chapter 18. Minimization.mp4

39.0 MB

107. Chapter 18. Ultracomputers.mp4

25.1 MB

108. Chapter 18. Ultrasubstitution cipher US-A.mp4

15.7 MB

109. Epilogue.mp4

14.3 MB

Bonus Resources.txt

0.4 KB

 

Total files 111


Copyright © 2025 FileMood.com