FileMood

Download cryptography

Cryptography

Name

cryptography

 DOWNLOAD Copy Link

Total Size

1.0 GB

Total Files

65

Hash

6935B47CFBCE6A186BBD0E09EFEACA492BEDEC74

/1 - Intro History/

recoded_videos_[7550311e] 1.4.mp4

12.5 MB

recoded_videos_[9e7f04ed] 01.3-history-jan3.mp4

13.8 MB

recoded_videos_[ba6c988c] 1.2Final.mp4

11.5 MB

recoded_videos_[dba8062f] 1.1.mp4

8.7 MB

/10 - Number Theory/

10 - 1 - Notation (15 min).mp4

16.5 MB

10 - 2 - Fermat and Euler (18 min).mp4

21.0 MB

10 - 3 - Modular e_'th roots (17 min).mp4

20.0 MB

10 - 4 - Arithmetic algorithms (13 min).mp4

14.6 MB

10 - 5 - Intractable problems (19 min).mp4

22.2 MB

/11 - RSA/

11 - 1 - Definitions and security (16 min).mp4

18.1 MB

11 - 2 - Constructions (11 min) .mp4

11.8 MB

11 - 3 - The RSA trapdoor permutation (18 min).mp4

20.8 MB

11 - 4 - PKCS 1 (23 min).mp4

24.5 MB

11 - 5 - Is RSA a one-way function- (17 min).mp4

19.4 MB

11 - 6 - RSA in practice (14 min).mp4

16.4 MB

/12 - Diffie-Helman, ElGamal/

12 - 1 - The ElGamal Public-key System (23 min).mp4

22.4 MB

12 - 2 - ElGamal Security (14 min).mp4

15.2 MB

12 - 3 - ElGamal Variants With Better Security (11 min).mp4

11.8 MB

12 - 4 - A Unifying Theme (12 min).mp4

13.6 MB

12 - 5 - Farewell (for now) (6 min).mp4

6.0 MB

/2 - Stream Ciph/

recoded_videos_[231177b7] 02.2-stream-cipherExpt.mp4

14.3 MB

recoded_videos_[56938e6d] 2.4.mp4

15.3 MB

recoded_videos_[5e93a882] 2.7.mp4

8.1 MB

recoded_videos_[7fbc8e66] 2.6New.mp4

11.2 MB

recoded_videos_[825c5ecd] 02.1-otp-jan4-new.mp4

13.2 MB

recoded_videos_[9c39c61e] 2.3.mp4

17.1 MB

recoded_videos_[c31ad21a] 2.5.mp4

18.0 MB

/3 - Block Ciph/

1 - 1 - What are block ciphers- (17 min).mp4

19.6 MB

1 - 2 - The Data Encryption Standard (22 min).mp4

25.7 MB

1 - 3 - Exhaustive search attacks (20 min).mp4

23.0 MB

1 - 4 - More attacks on block ciphers (16 min).mp4

18.6 MB

1 - 5 - The AES block cipher (14 min).mp4

15.2 MB

1 - 6 - Block ciphers from PRGs(12 min).mp4

13.5 MB

/4 - Block Ciph Many Key/

2 - 1 - Review- PRPs and PRFs (12 min).mp4

13.3 MB

2 - 2 - Modes of operation- one time key (8 min).mp4

8.4 MB

2 - 3 - Security for many-time key (23 min).mp4

26.1 MB

2 - 4 - Modes of operation- many time key (CBC) (16 min).mp4

18.8 MB

2 - 5 - Modes of operation- many time key (CTR) (10 min).mp4

10.9 MB

/5 - MACs/

5 - 1 - Message Authentication Codes (16 min).mp4

17.4 MB

5 - 2 - MACs Based On PRFs (10 min).mp4

11.7 MB

5 - 3 - CBC-MAC and NMAC (20 min).mp4

23.4 MB

5 - 4 - MAC padding (9 min).mp4

9.8 MB

5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4

17.9 MB

/6 - MAC implem+attack Collision Resist/

6 - 1 - Introduction (11 min).mp4

12.5 MB

6 - 2 - Generic birthday attack (16 min).mp4

16.9 MB

6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4

13.2 MB

6 - 4 - Constructing compression functions (8 min).mp4

9.2 MB

6 - 5 - HMAC (7 min).mp4

8.2 MB

6 - 6 - Timing attacks on MAC verification (9 min).mp4

9.8 MB

/7 - Authen Encry/

7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4

14.7 MB

7 - 2 - Definitions (6 min).mp4

5.9 MB

7 - 3 - Chosen ciphertext attacks (12 min).mp4

13.7 MB

7 - 4 - Constructions from ciphers and MACs (21 min).mp4

24.0 MB

7 - 5 - Case study- TLS (18 min).mp4

19.9 MB

7 - 6 - CBC padding attacks (14 min).mp4

15.7 MB

7 - 7 - Attacking non-atomic decryption (10 min).mp4

11.6 MB

/8 - Key Deriv, Determ, Tweak, Fixed/

8 - 1 - Key Derivation (14 min).mp4

15.3 MB

8 - 2 - Deterministic Encryption (15 min).mp4

16.4 MB

8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4

23.1 MB

8 - 4 - Tweakable encryption (15 min).mp4

16.3 MB

8 - 5 - Format preserving encryption (13 min).mp4

13.9 MB

/9 - Key Exchanges/

9 - 1 - Trusted 3rd parties (11 min).mp4

12.8 MB

9 - 2 - Merkle Puzzles (11 min).mp4

13.0 MB

9 - 3 - The Diffie-Hellman protocol (19 min).mp4

22.0 MB

9 - 4 - Public-key encryption (11 min).mp4

12.4 MB

 

Total files 65


Copyright © 2024 FileMood.com