FileMood

Download [Coursera] Cryptrography I

Coursera Cryptrography

Name

[Coursera] Cryptrography I

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

1.1 GB

Total Files

133

Last Seen

2025-07-21 23:46

Hash

CD8347690D4517CF6F98D9AA7096F37CFDB3582F

/

2 - 5 - PRG Security Definitions (25 min).mp4

28.1 MB

2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4

26.7 MB

4 - 3 - Security for many-time key (23 min).mp4

26.1 MB

3 - 2 - The Data Encryption Standard (22 min).mp4

25.7 MB

11 - 4 - PKCS 1 (23 min).mp4

24.5 MB

7 - 4 - Constructions from ciphers and MACs (21 min).mp4

24.0 MB

5 - 3 - CBC-MAC and NMAC (20 min).mp4

23.4 MB

8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4

23.1 MB

3 - 3 - Exhaustive search attacks (20 min).mp4

23.0 MB

2 - 4 - Real-world stream ciphers (20 min).mp4

22.9 MB

12 - 1 - The ElGamal Public-key System (23 min).mp4

22.4 MB

10 - 5 - Intractable problems (19 min).mp4

22.2 MB

2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4

22.2 MB

9 - 3 - The Diffie-Hellman protocol (19 min).mp4

22.0 MB

1 - 3 - History of cryptography (19 min).mp4

21.5 MB

10 - 2 - Fermat and Euler (18 min).mp4

21.0 MB

2 - 1 - Information theoretic security and the one time pad (19 min).mp4

21.0 MB

1 - 4 - Discrete probability (Crash course) (18 min).mp4

20.8 MB

11 - 3 - The RSA trapdoor permutation (18 min).mp4

20.8 MB

10 - 3 - Modular e'th roots (17 min)14.mp4

20.0 MB

10 - 3 - Modular e_'th roots (17 min)14.mp4

20.0 MB

7 - 5 - Case study_ TLS (18 min).mp4

19.9 MB

3 - 1 - What are block ciphers_ (17 min).mp4

19.6 MB

11 - 5 - Is RSA a one-way function_ (17 min).mp4

19.4 MB

4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4

18.8 MB

3 - 4 - More attacks on block ciphers (16 min).mp4

18.6 MB

11 - 1 - Definitions and security (16 min).mp4

18.1 MB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4

17.9 MB

1 - 2 - What is cryptography_ (15 min).mp4

17.8 MB

2 - 6 - Semantic Security (16 min).mp4

17.6 MB

5 - 1 - Message Authentication Codes (16 min).mp4

17.4 MB

6 - 2 - Generic birthday attack (16 min).mp4

16.9 MB

10 - 1 - Notation (15 min).mp4

16.5 MB

11 - 6 - RSA in practice (14 min).mp4

16.4 MB

8 - 2 - Deterministic Encryption (15 min).mp4

16.4 MB

8 - 4 - Tweakable encryption (15 min).mp4

16.3 MB

7 - 6 - CBC padding attacks (14 min).mp4

15.7 MB

1 - 5 - Discrete probability (crash course, cont.) (14 min).mp4

15.3 MB

8 - 1 - Key Derivation (14 min).mp4

15.3 MB

12 - 2 - ElGamal Security (14 min).mp4

15.2 MB

3 - 5 - The AES block cipher (14 min).mp4

15.2 MB

7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4

14.7 MB

10 - 4 - Arithmetic algorithms (13 min).mp4

14.6 MB

8 - 5 - Format preserving encryption (13 min).mp4

13.9 MB

7 - 3 - Chosen ciphertext attacks (12 min).mp4

13.7 MB

12 - 4 - A Unifying Theme (12 min).mp4

13.6 MB

3 - 6 - Block ciphers from PRGs(12 min).mp4

13.5 MB

4 - 1 - Review_ PRPs and PRFs (12 min).mp4

13.3 MB

6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4

13.2 MB

9 - 2 - Merkle Puzzles (11 min).mp4

13.0 MB

9 - 1 - Trusted 3rd parties (11 min).mp4

12.8 MB

6 - 1 - Introduction (11 min).mp4

12.5 MB

9 - 4 - Public-key encryption (11 min).mp4

12.4 MB

2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4

12.3 MB

1 - 1 - Course Overview (11 min).mp4

12.3 MB

11 - 2 - Constructions (11 min) .mp4

11.8 MB

12 - 3 - ElGamal Variants With Better Security (11 min).mp4

11.8 MB

5 - 2 - MACs Based On PRFs (10 min).mp4

11.7 MB

7 - 7 - Attacking non-atomic decryption (10 min).mp4

11.6 MB

4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4

10.9 MB

6 - 6 - Timing attacks on MAC verification (9 min).mp4

9.8 MB

5 - 4 - MAC padding (9 min).mp4

9.8 MB

6 - 4 - Constructing compression functions (8 min).mp4

9.2 MB

4 - 2 - Modes of operation_ one time key (8 min).mp4

8.4 MB

6 - 5 - HMAC (7 min).mp4

8.2 MB

12 - 5 - Farewell (for now) (6 min).mp4

6.0 MB

7 - 2 - Definitions (6 min).mp4

5.9 MB

12 - 1 - The ElGamal Public-key System (23 min).srt

38.0 KB

2 - 5 - PRG Security Definitions (25 min).srt

36.6 KB

2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt

35.6 KB

4 - 3 - Security for many-time key (23 min).srt

35.2 KB

3 - 2 - The Data Encryption Standard (22 min).srt

32.1 KB

8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt

31.6 KB

7 - 4 - Constructions from ciphers and MACs (21 min).srt

31.4 KB

11 - 4 - PKCS 1 (23 min).srt

31.4 KB

9 - 3 - The Diffie-Hellman protocol (19 min).srt

29.9 KB

5 - 3 - CBC-MAC and NMAC (20 min).srt

29.9 KB

2 - 2 - Stream ciphers and pseudo random generators (20 min).srt

29.1 KB

2 - 4 - Real-world stream ciphers (20 min).srt

28.4 KB

10 - 5 - Intractable problems (19 min).srt

28.3 KB

3 - 3 - Exhaustive search attacks (20 min).srt

28.0 KB

11 - 5 - Is RSA a one-way function

27.5 KB

7 - 5 - Case study_ TLS (18 min).srt

27.0 KB

11 - 3 - The RSA trapdoor permutation (18 min).srt

26.8 KB

1 - 3 - History of cryptography (19 min).srt

26.7 KB

2 - 1 - Information theoretic security and the one time pad (19 min).srt

26.2 KB

10 - 2 - Fermat and Euler (18 min).srt

26.2 KB

1 - 4 - Discrete probability (Crash course) (18 min).srt

26.0 KB

3 - 4 - More attacks on block ciphers (16 min).srt

25.6 KB

3 - 1 - What are block ciphers

25.5 KB

4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt

25.0 KB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt

24.9 KB

11 - 1 - Definitions and security (16 min).srt

24.8 KB

2 - 6 - Semantic Security (16 min).srt

24.5 KB

5 - 1 - Message Authentication Codes (16 min).srt

24.0 KB

8 - 2 - Deterministic Encryption (15 min).srt

23.5 KB

10 - 3 - Modular e'th roots (17 min)14.srt

23.5 KB

8 - 4 - Tweakable encryption (15 min).srt

22.6 KB

6 - 2 - Generic birthday attack (16 min).srt

22.5 KB

12 - 2 - ElGamal Security (14 min).srt

22.1 KB

8 - 1 - Key Derivation (14 min).srt

22.0 KB

7 - 6 - CBC padding attacks (14 min).srt

21.7 KB

11 - 6 - RSA in practice (14 min).srt

21.5 KB

3 - 5 - The AES block cipher (14 min).srt

20.7 KB

1 - 5 - Discrete probability (crash course, cont.) (14 min).srt

20.5 KB

9 - 2 - Merkle Puzzles (11 min).srt

20.1 KB

7 - 1 - Active attacks on CPA-secure encryption (13 min).srt

20.0 KB

10 - 1 - Notation (15 min).srt

19.7 KB

7 - 3 - Chosen ciphertext attacks (12 min).srt

19.1 KB

8 - 5 - Format preserving encryption (13 min).srt

19.0 KB

10 - 4 - Arithmetic algorithms (13 min).srt

18.5 KB

12 - 4 - A Unifying Theme (12 min).srt

18.2 KB

3 - 6 - Block ciphers from PRGs(12 min).srt

17.9 KB

6 - 3 - The Merkle-Damgard Paradigm (12 min).srt

17.8 KB

9 - 1 - Trusted 3rd parties (11 min).srt

17.7 KB

9 - 4 - Public-key encryption (11 min).srt

17.4 KB

12 - 3 - ElGamal Variants With Better Security (11 min).srt

17.2 KB

4 - 1 - Review_ PRPs and PRFs (12 min).srt

17.2 KB

1 - 1 - Course Overview (11 min).srt

17.2 KB

6 - 1 - Introduction (11 min).srt

17.1 KB

11 - 2 - Constructions (11 min) .srt

16.9 KB

2 - 7 - Stream ciphers are semantically secure (11 min) [optional].srt

16.6 KB

5 - 2 - MACs Based On PRFs (10 min).srt

15.7 KB

7 - 7 - Attacking non-atomic decryption (10 min).srt

15.3 KB

4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt

14.5 KB

6 - 6 - Timing attacks on MAC verification (9 min).srt

13.7 KB

5 - 4 - MAC padding (9 min).srt

13.5 KB

6 - 4 - Constructing compression functions (8 min).srt

13.2 KB

4 - 2 - Modes of operation_ one time key (8 min).srt

12.1 KB

6 - 5 - HMAC (7 min).srt

10.3 KB

12 - 5 - Farewell (for now) (6 min).srt

9.3 KB

7 - 2 - Definitions (6 min).srt

8.5 KB

_README.txt

2.4 KB

 

Total files 133


Copyright © 2025 FileMood.com