FileMood

Download Cryprography

Cryprography

Name

Cryprography

 DOWNLOAD Copy Link

Total Size

1.1 GB

Total Files

325

Hash

0B1A028DA298554AEBE487991C114CD697173DAB

/2 Stream Ciphers (week 1)/

2 - 5 - PRG Security Definitions (25 min).mp4

28.1 MB

2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4

26.7 MB

2 - 4 - Real-world stream ciphers (20 min).mp4

22.9 MB

2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4

22.2 MB

2 - 1 - Information theoretic security and the one time pad (19 min).mp4

21.0 MB

2 - 6 - Semantic Security (16 min).mp4

17.6 MB

2 - 7 - Stream ciphers are semantically secure (11 min).mp4

12.3 MB

02.1-stream-annotated.pptx

1.6 MB

02.5-stream-annotated.pptx

1.4 MB

02.2-stream-annotated.pptx

1.2 MB

02.3-stream-annotated.pptx

1.1 MB

02.4-stream-annotated.pptx

750.1 KB

02.3-stream-annotated.pdf

607.3 KB

02.7-stream-annotated.pptx

493.0 KB

02.4-stream-annotated.pdf

462.9 KB

02.1-stream-annotated.pdf

389.4 KB

02.2-stream-annotated.pdf

339.5 KB

02.5-stream-annotated.pdf

308.9 KB

02.6-stream-annotated.pptx

275.4 KB

02.6-stream-annotated.pdf

248.2 KB

02.7-stream-annotated.pdf

215.2 KB

2 - 5 - PRG Security Definitions (25 min).srt

36.6 KB

2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt

35.7 KB

2 - 2 - Stream ciphers and pseudo random generators (20 min).srt

29.1 KB

2 - 4 - Real-world stream ciphers (20 min).srt

28.4 KB

2 - 1 - Information theoretic security and the one time pad (19 min).srt

26.3 KB

2 - 5 - PRG Security Definitions (25 min).txt

24.9 KB

2 - 6 - Semantic Security (16 min).srt

24.6 KB

2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt

24.3 KB

2 - 2 - Stream ciphers and pseudo random generators (20 min).txt

19.9 KB

2 - 4 - Real-world stream ciphers (20 min).txt

19.4 KB

2 - 1 - Information theoretic security and the one time pad (19 min).txt

18.0 KB

2 - 6 - Semantic Security (16 min).txt

16.7 KB

2 - 7 - Stream ciphers are semantically secure (11 min).srt

16.6 KB

2 - 7 - Stream ciphers are semantically secure (11 min).txt

11.3 KB

/4 Using Block Ciphers (week 2)/

4 - 3 - Security for many-time key (23 min).mp4

26.1 MB

4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4

18.8 MB

4 - 1 - Review_ PRPs and PRFs (12 min).mp4

13.3 MB

4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4

10.9 MB

4 - 2 - Modes of operation_ one time key (8 min).mp4

8.4 MB

04.1-using-block-annotated.pptx

425.3 KB

04.2-using-block-annotated.pptx

408.9 KB

04.2-using-block-annotated.pdf

396.6 KB

04.4-using-block-annotated.pptx

375.0 KB

04.3-using-block-annotated.pptx

325.7 KB

04.3-using-block-annotated.pdf

324.5 KB

04.4-using-block-annotated.pdf

269.7 KB

04.1-using-block-annotated.pdf

265.7 KB

04.5-using-block-annotated.pptx

229.2 KB

04.5-using-block-annotated.pdf

209.6 KB

4 - 3 - Security for many-time key (23 min).srt

35.2 KB

4 - 3 - Security for many-time key (23 min).txt

24.0 KB

4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt

23.1 KB

4 - 1 - Review_ PRPs and PRFs (12 min).srt

17.3 KB

4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt

15.8 KB

4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt

14.5 KB

4 - 2 - Modes of operation_ one time key (8 min).srt

12.1 KB

4 - 1 - Review_ PRPs and PRFs (12 min).txt

11.8 KB

4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt

9.9 KB

4 - 2 - Modes of operation_ one time key (8 min).txt

8.3 KB

/3 Block Ciphers (week 2)/

3 - 2 - The Data Encryption Standard (22 min).mp4

25.7 MB

3 - 3 - Exhaustive search attacks (20 min).mp4

23.0 MB

3 - 1 - What are block ciphers_ (17 min).mp4

19.6 MB

3 - 4 - More attacks on block ciphers (16 min).mp4

17.0 MB

3 - 5 - The AES block cipher (14 min).mp4

15.2 MB

3 - 6 - Block ciphers from PRGs(12 min).mp4

13.5 MB

03.2-block-annotated.pdf

1.1 MB

03.2-block-annotated.pptx

828.6 KB

03.5-block-annotated.pdf

827.4 KB

03.3-block-annotated.pptx

637.0 KB

03.4-block-annotated.pptx

536.8 KB

03.3-block-annotated.pdf

479.1 KB

03.5-block-annotated.pptx

445.5 KB

03.6-block-annotated.pdf

444.6 KB

03.4-block-annotated.pdf

429.7 KB

03.1-block-annotated.pdf

297.5 KB

03.6-block-annotated.pptx

282.4 KB

03.1-block-annotated.pptx

229.7 KB

3 - 2 - The Data Encryption Standard (22 min).srt

31.7 KB

3 - 3 - Exhaustive search attacks (20 min).srt

28.0 KB

3 - 4 - More attacks on block ciphers (16 min).srt

25.6 KB

3 - 1 - What are block ciphers_ (17 min).srt

25.5 KB

3 - 2 - The Data Encryption Standard (22 min).txt

21.6 KB

3 - 5 - The AES block cipher (14 min).srt

20.7 KB

3 - 3 - Exhaustive search attacks (20 min).txt

19.3 KB

3 - 6 - Block ciphers from PRGs(12 min).srt

17.9 KB

3 - 4 - More attacks on block ciphers (16 min).txt

17.5 KB

3 - 1 - What are block ciphers_ (17 min).txt

17.3 KB

3 - 5 - The AES block cipher (14 min).txt

14.2 KB

3 - 6 - Block ciphers from PRGs(12 min).txt

12.3 KB

/11 Public Key Encryption from trapdoor permutations (week 6)/

11 - 4 - PKCS 1 (23 min).mp4

24.5 MB

11 - 3 - The RSA trapdoor permutation (18 min).mp4

20.8 MB

11 - 5 - Is RSA a one-way function_ (17 min).mp4

19.4 MB

11 - 1 - Definitions and security (16 min).mp4

18.1 MB

11 - 6 - RSA in practice (14 min).mp4

16.4 MB

11 - 2 - Constructions (11 min) .mp4

11.8 MB

11.1-pubkey-trapdoor.pdf

562.8 KB

11.1-pubkey-trapdoor.pptx

359.8 KB

11.4-pubkey-trapdoor.pdf

270.7 KB

11.3-pubkey-trapdoor.pdf

244.8 KB

11.2-pubkey-trapdoor.pdf

216.7 KB

11.4-pubkey-trapdoor.pptx

209.4 KB

11.3-pubkey-trapdoor.pptx

204.3 KB

11.2-pubkey-trapdoor.pptx

191.4 KB

11.6-pubkey-trapdoor.pptx

189.6 KB

11.6-pubkey-trapdoor.pdf

189.2 KB

11.5-pubkey-trapdoor.pptx

186.1 KB

11.5-pubkey-trapdoor.pdf

170.3 KB

11 - 4 - PKCS 1 (23 min).srt

31.4 KB

11 - 3 - The RSA trapdoor permutation (18 min).srt

26.8 KB

11 - 1 - Definitions and security (16 min).srt

24.7 KB

11 - 4 - PKCS 1 (23 min).txt

21.5 KB

11 - 3 - The RSA trapdoor permutation (18 min).txt

18.4 KB

11 - 1 - Definitions and security (16 min).txt

16.9 KB

11 - 2 - Constructions (11 min) .srt

16.8 KB

11 - 5 - Is RSA a one-way function_ (17 min).srt

15.7 KB

11 - 2 - Constructions (11 min) .txt

11.5 KB

11 - 5 - Is RSA a one-way function_ (17 min).txt

8.6 KB

11 - 6 - RSA in practice (14 min).srt

3.7 KB

11 - 6 - RSA in practice (14 min).txt

2.1 KB

/7 Authenticated Encryption (week 4)/

7 - 4 - Constructions from ciphers and MACs (21 min).mp4

24.0 MB

7 - 5 - Case study_ TLS (18 min).mp4

19.9 MB

7 - 6 - CBC padding attacks (14 min).mp4

15.7 MB

7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4

14.7 MB

7 - 3 - Chosen ciphertext attacks (12 min).mp4

13.7 MB

7 - 7 - Attacking non-atomic decryption (10 min).mp4

11.6 MB

7 - 2 - Definitions (6 min).mp4

5.9 MB

07.1-authenc-annotated.pdf

894.3 KB

07.6-authenc-annotated.pdf

732.8 KB

07.4-authenc-annotated.pdf

702.4 KB

07.3-authenc-annotated.pdf

697.8 KB

07.5-authenc-annotated.pdf

688.7 KB

07.1-authenc-annotated.pptx

561.0 KB

07.2-authenc-annotated.pdf

546.1 KB

07.7-authenc-annotated.pdf

473.1 KB

07.6-authenc-annotated.pptx

390.1 KB

07.5-authenc-annotated.pptx

359.5 KB

07.3-authenc-annotated.pptx

268.2 KB

07.4-authenc-annotated.pptx

252.2 KB

07.7-authenc-annotated.pptx

243.0 KB

07.2-authenc-annotated.pptx

227.6 KB

7 - 4 - Constructions from ciphers and MACs (21 min).srt

31.4 KB

7 - 5 - Case study_ TLS (18 min).srt

27.1 KB

7 - 6 - CBC padding attacks (14 min).srt

21.7 KB

7 - 4 - Constructions from ciphers and MACs (21 min).txt

21.4 KB

7 - 1 - Active attacks on CPA-secure encryption (13 min).srt

20.0 KB

7 - 3 - Chosen ciphertext attacks (12 min).srt

19.2 KB

7 - 5 - Case study_ TLS (18 min).txt

18.5 KB

7 - 7 - Attacking non-atomic decryption (10 min).srt

15.1 KB

7 - 6 - CBC padding attacks (14 min).txt

14.9 KB

7 - 1 - Active attacks on CPA-secure encryption (13 min).txt

13.7 KB

7 - 3 - Chosen ciphertext attacks (12 min).txt

13.1 KB

7 - 7 - Attacking non-atomic decryption (10 min).txt

10.4 KB

7 - 2 - Definitions (6 min).srt

8.4 KB

7 - 2 - Definitions (6 min).txt

5.7 KB

/5 Message Integrity (week 3)/

5 - 3 - CBC-MAC and NMAC (20 min).mp4

23.4 MB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4

17.9 MB

5 - 1 - Message Authentication Codes (16 min).mp4

17.4 MB

5 - 2 - MACs Based On PRFs (10 min).mp4

11.7 MB

5 - 4 - MAC padding (9 min).mp4

9.8 MB

05.3-integrity-cbc-mac-and-nmac.pdf

356.4 KB

05.3-integrity-cbc-mac-and-nmac.pptx

333.3 KB

05.2-integrity-macs-based-on-PRFs.pptx

290.4 KB

05.1-integrity-message-authentication-codes.pptx

286.7 KB

05.4-integrity-mac-padding.pptx

255.3 KB

05.5-integrity-a-parallel-mac.pptx

246.5 KB

05.1-integrity-message-authentication-codes.pdf

241.9 KB

05.5-integrity-a-parallel-mac.pdf

228.9 KB

05.4-integrity-mac-padding.pdf

204.7 KB

05.2-integrity-macs-based-on-PRFs.pdf

199.0 KB

5 - 3 - CBC-MAC and NMAC (20 min).srt

29.9 KB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt

24.9 KB

5 - 1 - Message Authentication Codes (16 min).srt

24.0 KB

5 - 3 - CBC-MAC and NMAC (20 min).txt

20.5 KB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt

17.1 KB

5 - 1 - Message Authentication Codes (16 min).txt

16.2 KB

5 - 2 - MACs Based On PRFs (10 min).srt

15.7 KB

5 - 4 - MAC padding (9 min).srt

13.5 KB

5 - 2 - MACs Based On PRFs (10 min).txt

10.8 KB

5 - 4 - MAC padding (9 min).txt

9.2 KB

/8 Odds and ends (week 4)/

8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4

23.1 MB

8 - 2 - Deterministic Encryption (15 min).mp4

16.4 MB

8 - 4 - Tweakable encryption (15 min).mp4

16.3 MB

8 - 5 - Format preserving encryption (13 min).mp4

13.9 MB

8 - 1 - Key Derivation (14 min).mp4

5.5 MB

08.4-odds-and-ends.pdf

563.9 KB

08.3-odds-and-ends.pdf

527.8 KB

08.3-odds-and-ends.pptx

525.3 KB

08.4-odds-and-ends.pptx

460.7 KB

08.2-odds-and-ends.pdf

460.0 KB

08.5-odds-and-ends.pdf

384.6 KB

08.1-odds-and-ends.pdf

336.5 KB

08.2-odds-and-ends.pptx

270.4 KB

08.5-odds-and-ends.pptx

245.0 KB

08.1-odds-and-ends.pptx

210.8 KB

8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt

31.6 KB

8 - 2 - Deterministic Encryption (15 min).srt

23.6 KB

8 - 4 - Tweakable encryption (15 min).srt

22.5 KB

8 - 1 - Key Derivation (14 min).srt

22.0 KB

8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt

21.6 KB

8 - 5 - Format preserving encryption (13 min).srt

19.0 KB

8 - 2 - Deterministic Encryption (15 min).txt

16.2 KB

8 - 4 - Tweakable encryption (15 min).txt

15.4 KB

8 - 1 - Key Derivation (14 min).txt

15.1 KB

8 - 5 - Format preserving encryption (13 min).txt

13.0 KB

/10 Intro. Number Theory (week 5)/

10 - 5 - Intractable problems (19 min).mp4

22.2 MB

10 - 2 - Fermat and Euler (18 min).mp4

21.0 MB

10 - 3 - Modular e'th roots (17 min).mp4

20.0 MB

10 - 1 - Notation (15 min).mp4

16.5 MB

10 - 4 - Arithmetic algorithms (13 min).mp4

14.6 MB

10.1-numth-annotated.pptx

534.3 KB

10.3-numth-annotated.pptx

475.2 KB

10.3-numth-annotated.pdf

294.3 KB

10.4-numth-annotated.pdf

276.0 KB

10.1-numth-annotated.pdf

247.6 KB

10.5-numth-annotated.pdf

241.8 KB

10.5-numth-annotated.pptx

240.1 KB

10.4-numth-annotated.pptx

229.5 KB

10.2-numth-annotated.pptx

210.7 KB

10.2-numth-annotated.pdf

191.8 KB

10 - 5 - Intractable problems (19 min).srt

27.8 KB

10 - 2 - Fermat and Euler (18 min).srt

26.3 KB

10 - 3 - Modular e'th roots (17 min).srt

23.4 KB

10 - 1 - Notation (15 min).srt

19.7 KB

10 - 5 - Intractable problems (19 min).txt

18.5 KB

10 - 4 - Arithmetic algorithms (13 min).srt

18.5 KB

10 - 2 - Fermat and Euler (18 min).txt

18.0 KB

10 - 3 - Modular e'th roots (17 min).txt

15.8 KB

10 - 1 - Notation (15 min).txt

13.3 KB

10 - 4 - Arithmetic algorithms (13 min).txt

12.6 KB

/9 Basic key exchange (week 5)/

9 - 3 - The Diffie-Hellman protocol (19 min).mp4

22.0 MB

9 - 2 - Merkle Puzzles (11 min).mp4

13.0 MB

9 - 1 - Trusted 3rd parties (11 min).mp4

12.8 MB

9 - 4 - Public-key encryption (11 min).mp4

12.4 MB

09.3-basic-key-exchange-annotated.pptx

752.8 KB

09.1-basic-key-exchange-annotated.pptx

616.9 KB

09.4-basic-key-exchange-annotated.pptx

489.9 KB

09.3-basic-key-exchange-annotated.pdf

445.3 KB

09.4-basic-key-exchange-annotated.pdf

275.4 KB

09.2-basic-key-exchange-annotated.pdf

235.4 KB

09.1-basic-key-exchange-annotated.pdf

228.5 KB

09.2-basic-key-exchange-annotated.pptx

215.3 KB

9 - 3 - The Diffie-Hellman protocol (19 min).srt

29.9 KB

9 - 3 - The Diffie-Hellman protocol (19 min).txt

20.4 KB

9 - 2 - Merkle Puzzles (11 min).srt

20.1 KB

9 - 1 - Trusted 3rd parties (11 min).srt

17.7 KB

9 - 4 - Public-key encryption (11 min).srt

17.4 KB

9 - 1 - Trusted 3rd parties (11 min).txt

12.2 KB

9 - 2 - Merkle Puzzles (11 min).txt

12.1 KB

9 - 4 - Public-key encryption (11 min).txt

11.9 KB

/1 Introduction (week 1)/

1 - 3 - History of cryptography (19 min).mp4

21.5 MB

1 - 4 - Discrete probability (16 min).mp4

18.3 MB

1 - 2 - What is cryptography_ (15 min).mp4

17.8 MB

1 - 1 - Course Overview (11 min).mp4

12.3 MB

01.3-intro-annotated.pptx

1.6 MB

01.3-intro-annotated.pdf

1.5 MB

01.2-intro-annotated.pptx

1.1 MB

01.2-intro-annotated.pdf

886.9 KB

01.4-intro-annotated.pptx

417.4 KB

01.4-intro-annotated.pdf

315.3 KB

01.1-intro-annotated.pdf

314.7 KB

01.1-intro-annotated.pptx

300.2 KB

1 - 3 - History of cryptography (19 min).srt

26.9 KB

1 - 2 - What is cryptography_ (15 min).srt

26.0 KB

1 - 4 - Discrete probability (16 min).srt

23.6 KB

1 - 3 - History of cryptography (19 min).txt

18.4 KB

1 - 2 - What is cryptography_ (15 min).txt

17.8 KB

1 - 1 - Course Overview (11 min).srt

17.1 KB

1 - 4 - Discrete probability (16 min).txt

16.1 KB

1 - 1 - Course Overview (11 min).txt

11.7 KB

/6 Collision Resistance (week 3)/

6 - 2 - Generic birthday attack (16 min).mp4

16.9 MB

6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4

13.2 MB

6 - 1 - Introduction (11 min).mp4

12.5 MB

6 - 6 - Timing attacks on MAC verification (9 min).mp4

9.8 MB

6 - 4 - Constructing compression functions (8 min).mp4

9.2 MB

6 - 5 - HMAC (7 min).mp4

8.2 MB

06.3-collision-resistance-the-merkle-damgard-paradigm.pptx

837.4 KB

06.2-collision-resistance-generic-birthday-attack.pptx

527.1 KB

06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx

333.5 KB

06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf

274.2 KB

06.3-collision-resistance-the-merkle-damgard-paradigm.pdf

264.8 KB

06.2-collision-resistance-generic-birthday-attack.pdf

251.8 KB

06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx

249.2 KB

06.4-collision-resistance-constructing-compression-functions.pptx

245.9 KB

06.4-collision-resistance-constructing-compression-functions.pdf

237.8 KB

06.1-collision-resistance-introduction.pdf

235.7 KB

06.1-collision-resistance-introduction.pptx

209.3 KB

06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf

204.8 KB

6 - 2 - Generic birthday attack (16 min).srt

22.6 KB

6 - 3 - The Merkle-Damgard Paradigm (12 min).srt

18.0 KB

6 - 1 - Introduction (11 min).srt

17.1 KB

6 - 2 - Generic birthday attack (16 min).txt

15.5 KB

6 - 6 - Timing attacks on MAC verification (9 min).srt

13.7 KB

6 - 4 - Constructing compression functions (8 min).srt

13.2 KB

6 - 3 - The Merkle-Damgard Paradigm (12 min).txt

12.3 KB

6 - 1 - Introduction (11 min).txt

11.7 KB

6 - 5 - HMAC (7 min).srt

10.3 KB

6 - 6 - Timing attacks on MAC verification (9 min).txt

9.4 KB

6 - 4 - Constructing compression functions (8 min).txt

9.0 KB

6 - 5 - HMAC (7 min).txt

7.1 KB

/12 Public key encryption from Diffie-Hellman (week 6)/

12 - 4 - A Unifying Theme (12 min).mp4

13.6 MB

12 - 3 - ElGamal Variants With Better Security (11 min).mp4

11.8 MB

12 - 5 - Farewell (for now) (6 min).mp4

6.0 MB

12 - 2 - ElGamal Security (14 min).mp4

4.9 MB

12 - 1 - The ElGamal Public-key System (23 min).mp4

1.7 MB

12.1-pubkey-dh.pdf

549.0 KB

12.5-pubkey-dh.pdf

328.5 KB

12.1-pubkey-dh.pptx

316.3 KB

12.2-pubkey-dh.pdf

301.7 KB

12.4-pubkey-dh.pdf

201.3 KB

12.2-pubkey-dh.pptx

198.8 KB

12.4-pubkey-dh.pptx

195.7 KB

12.3-pubkey-dh.pptx

190.7 KB

12.5-pubkey-dh.pptx

184.6 KB

12.3-pubkey-dh.pdf

183.6 KB

12 - 1 - The ElGamal Public-key System (23 min).srt

37.9 KB

12 - 2 - ElGamal Security (14 min).srt

22.0 KB

12 - 1 - The ElGamal Public-key System (23 min).txt

21.7 KB

12 - 4 - A Unifying Theme (12 min).srt

18.3 KB

12 - 3 - ElGamal Variants With Better Security (11 min).srt

17.2 KB

12 - 2 - ElGamal Security (14 min).txt

15.0 KB

12 - 4 - A Unifying Theme (12 min).txt

12.5 KB

12 - 3 - ElGamal Variants With Better Security (11 min).txt

11.8 KB

12 - 5 - Farewell (for now) (6 min).srt

9.2 KB

12 - 5 - Farewell (for now) (6 min).txt

6.4 KB

 

Total files 325


Copyright © 2024 FileMood.com