FileMood

Download Udacity - Applied Cryptography Videos

Udacity Applied Cryptography Videos

Name

Udacity - Applied Cryptography Videos

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

4.6 GB

Total Files

764

Hash

D5DC80A90FF5F355AB520D29705645CE6160D90C

/Interview on GSM Cracking/

3 - Countermeasures.mp4

84.7 MB

2 - Timememory.mp4

63.2 MB

1 - Demo.mp4

48.3 MB

4 - Ethics.mp4

27.2 MB

/Q & A Session 1/

3 - Open Discussion.mp4

62.3 MB

2 - Otp And Quantum Crypto.mp4

26.1 MB

1 - Mathematics And Programming.mp4

7.7 MB

/Lesson 1/

43 - Colossus.mp4

57.7 MB

35 - Lorenz Cipher Machine.mp4

51.5 MB

44 - Modern Symmetric Ciphers.mp4

45.4 MB

42 - Guessing Keys Solution.mp4

39.2 MB

13 - One Time Pad.mp4

30.6 MB

32 - Lorenz Cipher.mp4

29.7 MB

34 - Intercepting Messages Solution.mp4

28.8 MB

31 - Perfect Cipher Is Impractical Solution.mp4

25.4 MB

29 - Otp Is A Perfect Cipher Pt 3.mp4

24.5 MB

36 - Lorenz Cipher Machine Solution.mp4

22.7 MB

04 - Do Not Implement Your Own Crypto.mp4

22.4 MB

30 - Perfect Cipher Is Impractical.mp4

21.6 MB

02 - Introduction Solution.mp4

21.6 MB

10 - Correctness And Security Solution.mp4

21.3 MB

28 - Otp Is A Perfect Cipher Pt 2.mp4

21.2 MB

16 - Proving Security Solution.mp4

20.9 MB

45 - Advanced Encryption Standard.mp4

20.8 MB

07 - Keys And Kerchoffs Principle.mp4

20.6 MB

09 - Correctness And Security.mp4

20.5 MB

17 - Probability Review Pt 1.mp4

20.2 MB

06 - Symmetric Cryptosystems.mp4

20.0 MB

33 - Intercepting Messages.mp4

19.3 MB

03 - Course Overview.mp4

17.3 MB

14 - One Time Pad Solution.mp4

16.7 MB

21 - Probability Review Pt 3.mp4

16.6 MB

22 - Probability Review Pt 3 Solution.mp4

16.4 MB

46 - Summary.mp4

16.3 MB

23 - Perfect Cipher.mp4

14.8 MB

01 - Introduction.mp4

14.4 MB

26 - Otp Is A Perfect Cipher Pt 1 Solution.mp4

14.2 MB

41 - Guessing Keys.mp4

14.0 MB

12 - Xor Function Solution.mp4

12.3 MB

15 - Proving Security.mp4

11.8 MB

20 - Probability Review Pt 2 Solution.mp4

11.2 MB

24 - Perfect Cipher Solution.mp4

11.0 MB

40 - Weakness In Keys Solution.mp4

10.6 MB

11 - Xor Function.mp4

10.6 MB

19 - Probability Review Pt 2.mp4

9.0 MB

25 - Otp Is A Perfect Cipher Pt 1.mp4

8.4 MB

39 - Weakness In Keys.mp4

6.8 MB

38 - Importance Of Keys Solution.mp4

6.6 MB

37 - Importance Of Keys.mp4

5.6 MB

18 - Probability Review Pt 1 Solution.mp4

3.9 MB

08 - Keys And Kerchoffs Principle Solution.mp4

3.8 MB

27 - Otp Is A Perfect Cipher Pt 2.mp4

3.7 MB

05 - Do Not Implement Your Own Crypto Solution.mp4

722.6 KB

/Lesson 2/

39 - Strong Collision Resistance.mp4

41.8 MB

03 - Randomness Quiz Solution.mp4

32.7 MB

42 - Early Unix Implementation.mp4

29.1 MB

31 - Cryptographic Hash Function.mp4

28.4 MB

50 - Hotel Door Locks.mp4

27.7 MB

21 - Cipher Feedback Mode.mp4

27.6 MB

18 - Counter Mode.mp4

26.5 MB

07 - Sources Of Randomness.mp4

25.5 MB

26 - Protocols.mp4

25.2 MB

04 - Kolmogorov Complexity.mp4

24.0 MB

14 - File Encryption Solution.mp4

23.7 MB

40 - Storing Passwords.mp4

21.6 MB

11 - PRNG Implementation Solution.mp4

21.3 MB

05 - Kolmogorov Complexity Solution.mp4

20.4 MB

17 - Cbc Initialization Vector Solution.mp4

20.1 MB

27 - Mutual Distrust.mp4

19.8 MB

32 - Cryptographic Hash Function Solution.mp4

19.6 MB

41 - Storing Passwords Solution.mp4

18.7 MB

25 - Properties Of Modes Solution.mp4

18.3 MB

52 - Summary.mp4

17.2 MB

49 - Hash Chain Solution.mp4

16.3 MB

15 - Cipher Block Chaining Mode.mp4

16.0 MB

43 - Salted Password Scheme.mp4

15.7 MB

01 - Applications Of Symmetric Ciphers.mp4

14.1 MB

38 - Weak Collision Resistance Solution.mp4

13.9 MB

06 - Unpredictability.mp4

13.9 MB

08 - Pseudo Random Number Generator.mp4

13.8 MB

30 - Padding Solution.mp4

13.4 MB

48 - Hash Chain.mp4

11.7 MB

47 - Password Reuse.mp4

11.3 MB

09 - Pseudo Random Number Generator Solution.mp4

11.2 MB

28 - Mutual Distrust Solution.mp4

10.8 MB

10 - Prng Implementation.mp4

10.1 MB

35 - Coin Tossing Again.mp4

8.3 MB

29 - Padding.mp4

7.7 MB

37 - Weak Collision Resistance.mp4

7.5 MB

20 - Parallel Processing Solution.mp4

6.8 MB

34 - Random Oracle Solution.mp4

6.5 MB

51 - Hotel Door Locks Solution.mp4

6.4 MB

12 - Weak PRNGs.mp4

6.3 MB

36 - Coin Tossing Again Solution.mp4

6.1 MB

22 - Cfb Decryption.mp4

6.1 MB

33 - Random Oracle.mp4

5.9 MB

24 - Properties Of Modes.mp4

5.8 MB

16 - Cbc Initialization Vector.mp4

4.6 MB

23 - Cfb Decryption Solution.mp4

4.4 MB

02 - Randomness Quiz.mp4

4.1 MB

46 - Thwarting Dictionary Attacks Solution.mp4

3.5 MB

19 - Parallel Processing.mp4

3.4 MB

44 - Salted Password Scheme Solution.mp4

3.3 MB

45 - Thwarting Dictionary Attacks.mp4

2.5 MB

/Q & A Session 2/

1 - Questions And Answers.mp4

37.5 MB

/Lesson 3/

15 - Discrete Log Problem.mp4

37.4 MB

06 - Merkles Puzzles.mp4

31.4 MB

30 - Faster Primality Test.mp4

25.8 MB

09 - Secret Paint Mixing.mp4

17.8 MB

17 - DH Security.mp4

16.1 MB

04 - Trusted Third Party.mp4

15.2 MB

01 - Introduction.mp4

14.7 MB

34 - Diffie Hellman Summary.mp4

14.0 MB

11 - Key Exchange.mp4

13.9 MB

19 - Implementing Dh Solution.mp4

12.6 MB

03 - Pairwise Distribution Solution.mp4

12.6 MB

08 - Diffie Hellman.mp4

12.3 MB

21 - Modular Exponentiation Quiz Solution.mp4

11.3 MB

28 - Primality Test.mp4

10.2 MB

02 - Pairwise Distribution.mp4

9.7 MB

33 - Diffie Hellman Summary.mp4

9.7 MB

16 - Discrete Log Problem Solution.mp4

9.5 MB

10 - Properties Of Multiplication.mp4

9.2 MB

05 - Trusted Third Party Solution.mp4

9.2 MB

23 - Finding Large Primes Solution.mp4

8.3 MB

25 - Infinite Primes Solution.mp4

8.3 MB

07 - Merkles Puzzles Solution.mp4

7.5 MB

18 - Implementing Dh.mp4

7.3 MB

13 - Passive Eavesdropper.mp4

7.3 MB

12 - Key Exchange Solution.mp4

6.8 MB

35 - Summary.mp4

6.8 MB

14 - Passive Eavesdropper Solution.mp4

6.0 MB

26 - Density Of Primes.mp4

6.0 MB

27 - Density Of Primes Solution.mp4

4.2 MB

29 - Primality Test Solution.mp4

3.5 MB

20 - Modular Exponentiation Quiz.mp4

2.5 MB

24 - Infinite Primes.mp4

2.5 MB

31 - Primality Quiz.mp4

1.5 MB

32 - Primality Quiz Solution.mp4

1.4 MB

/Q & A Session 3/

4 - Question 3.mp4

35.8 MB

3 - Question 2.mp4

25.9 MB

2 - Question 1.mp4

16.2 MB

1 - Welcome.mp4

13.0 MB

/Lesson 5/

37 - TLS Record Protocol.mp4

35.0 MB

21 - Master Secret.mp4

33.6 MB

38 - TLS Record Protocol Solution.mp4

29.5 MB

34 - Signature Validation Solution.mp4

26.3 MB

33 - Signature Validation.mp4

25.2 MB

10 - Secure Shell.mp4

24.0 MB

04 - Encrypted Key Exchange.mp4

23.9 MB

39 - CBC Attack.mp4

23.6 MB

17 - Basic TLS.mp4

21.5 MB

14 - Ssh Authentication In Practice.mp4

20.9 MB

01 - Threat Model.mp4

19.0 MB

25 - Looking At A Certificate.mp4

15.5 MB

41 - TLS Information Leak Solution.mp4

15.3 MB

28 - Certificate Details.mp4

14.7 MB

20 - What Could Go Wrong Solution.mp4

14.3 MB

15 - Transport Layer Security.mp4

14.3 MB

13 - SSH Authentication Solution.mp4

13.1 MB

05 - Encrypted Key Exchange Solution.mp4

12.3 MB

18 - Basic Tls Solution.mp4

11.9 MB

24 - Trusting A Server Solution.mp4

10.5 MB

09 - Eke Authentication Implementation Solution.mp4

9.9 MB

08 - Eke Authentication Implementation.mp4

9.6 MB

11 - Secure Shell Solution.mp4

9.1 MB

31 - Certificates And Signatures.mp4

9.0 MB

02 - Threat Model Solution.mp4

8.8 MB

03 - Overview.mp4

8.6 MB

42 - Summary.mp4

8.1 MB

23 - Trusting A Server.mp4

8.1 MB

27 - Certificates Solution.mp4

7.8 MB

36 - Handshake Recap.mp4

7.0 MB

07 - EKE Authentication Solution.mp4

6.8 MB

22 - Weak Ciphers.mp4

5.7 MB

32 - Certificates And Signatures Solution.mp4

5.1 MB

35 - Interesting Certificate Chains.mp4

5.0 MB

26 - Certificates.mp4

5.0 MB

16 - Transport Layer Security Solution.mp4

4.9 MB

06 - EKE Authentication.mp4

3.6 MB

19 - What Could Go Wrong.mp4

3.5 MB

12 - SSH Authentication.mp4

3.3 MB

30 - Convincing Solution.mp4

3.3 MB

40 - TLS Information Leak.mp4

3.1 MB

29 - Convincing.mp4

1.2 MB

/Lesson 6/

55 - Longest Block Chain.mp4

31.7 MB

53 - Double Hash.mp4

31.4 MB

10 - Eavesdropper Solution.mp4

23.5 MB

51 - Provide Scarcity.mp4

20.7 MB

04 - Envelopes Solution.mp4

20.4 MB

36 - Blindfolded Signatures.mp4

19.8 MB

47 - Identity Challenges.mp4

19.6 MB

35 - Digital Cash Solution.mp4

18.6 MB

33 - Money Solution.mp4

16.9 MB

08 - The First Hop Solution.mp4

16.5 MB

05 - Onion Routing.mp4

15.1 MB

49 - Bitcoin.mp4

14.6 MB

02 - Traffic Analysis.mp4

13.7 MB

01 - Solving Problems.mp4

13.7 MB

13 - Voting.mp4

13.5 MB

34 - Digital Cash.mp4

13.4 MB

37 - RSA Blind Signatures.mp4

13.1 MB

12 - Tor Solution.mp4

12.9 MB

03 - Envelopes.mp4

12.9 MB

29 - Getting Caught Solution.mp4

12.8 MB

42 - Blind Signatures Protocol Solution.mp4

12.6 MB

14 - Apple Blue Crazy.mp4

12.3 MB

56 - Summary.mp4

11.7 MB

32 - Money.mp4

11.3 MB

20 - Crazy Crazy.mp4

10.4 MB

24 - Auditing Mixes.mp4

10.2 MB

25 - Auditing Mixes Solution.mp4

9.5 MB

45 - Identity List.mp4

8.8 MB

38 - Rsa Blind Signatures Solution.mp4

8.5 MB

23 - Prove A Vote Solution.mp4

8.0 MB

06 - Onion Routing Solution.mp4

7.8 MB

17 - Mixnet Solution.mp4

7.8 MB

27 - Auditing Tradeoffs Solution.mp4

7.6 MB

41 - Blind Signatures Protocol.mp4

7.2 MB

16 - Mixnet.mp4

6.5 MB

31 - Observing A Vote Solution.mp4

6.3 MB

46 - Identity List Solution.mp4

6.1 MB

21 - Crazy Crazy Solution.mp4

5.9 MB

19 - Voter Identity Solution.mp4

5.1 MB

54 - Double Hash Solution.mp4

5.0 MB

52 - Provide Scarcity Solution.mp4

4.9 MB

30 - Observing A Vote.mp4

4.8 MB

18 - Voter Identity.mp4

4.5 MB

09 - Eavesdropper.mp4

4.4 MB

48 - Identity Challenges Solution.mp4

3.9 MB

40 - Worry Solution.mp4

3.6 MB

11 - Tor.mp4

3.3 MB

43 - Deanonymizing Double Spenders.mp4

3.2 MB

15 - Apple Blue Crazy Solution.mp4

3.0 MB

44 - Deanonymizing Double Spenders Solution.mp4

2.9 MB

50 - Bitcoin Solution.mp4

2.7 MB

22 - Prove A Vote.mp4

1.8 MB

07 - The First Hop.mp4

1.3 MB

28 - Getting Caught.mp4

1.2 MB

26 - Auditing Tradeoffs.mp4

858.4 KB

39 - Worry.mp4

326.6 KB

/Lesson 7/

01 - Summary.mp4

29.2 MB

12 - Oblivious Transfer.mp4

20.7 MB

04 - Logic Gate.mp4

19.5 MB

10 - Garbled Circuit Protocol.mp4

12.2 MB

02 - Secure Computation.mp4

11.6 MB

13 - Oblivious Transfer Solution.mp4

10.8 MB

07 - Encrypt Outputs Solution.mp4

10.5 MB

16 - Putting It All Together.mp4

10.1 MB

05 - Logic Gate Solution.mp4

9.2 MB

08 - Permute Outputs.mp4

8.2 MB

06 - Encrypt Outputs.mp4

6.7 MB

15 - Wire Labels Solution.mp4

6.0 MB

11 - Garbled Circuit Protocol Solution.mp4

5.5 MB

14 - Wire Labels.mp4

4.9 MB

09 - Permute Outputs Solution.mp4

4.4 MB

03 - Secure Computation Solution.mp4

4.3 MB

17 - Congratulations.mp4

2.1 MB

/Problem Set 6 Solutions/

3 - Cut and Choose.mp4

28.4 MB

8 - TOR Extended 5.mp4

11.6 MB

5 - TOR Extended 2.mp4

9.7 MB

6 - TOR Extended 3.mp4

8.3 MB

1 - Onion Routing.mp4

7.6 MB

7 - TOR Extended 4.mp4

6.5 MB

2 - Voting.mp4

4.7 MB

4 - TOR Extended 1.mp4

2.5 MB

/Lesson 4/

35 - Factoring Is Still Hard.mp4

28.3 MB

07 - RSA Cryptosystem.mp4

21.1 MB

01 - Asymmetric Cryptosystems.mp4

19.1 MB

28 - Security Of RSA.mp4

18.5 MB

17 - Proving Eulers Theorem Pt1 Solution.mp4

16.4 MB

15 - Totient Function Solution.mp4

16.3 MB

45 - Summary.mp4

16.3 MB

37 - Optional Complexity Solution.mp4

16.0 MB

31 - Totient and Factoring.mp4

15.6 MB

19 - Proving Eulers Theorem Pt2 Solution.mp4

15.5 MB

41 - Small Messages Solution.mp4

13.6 MB

09 - Small M Solution.mp4

13.5 MB

33 - 40 Quadrillion Years.mp4

13.3 MB

04 - Signatures.mp4

11.9 MB

32 - Computing D Still Hard.mp4

10.6 MB

11 - Correctness Of Rsa Solution.mp4

10.4 MB

06 - One Way Function.mp4

10.2 MB

44 - Back To Signatures Solution.mp4

10.2 MB

21 - Invertibility Of RSA Solution.mp4

10.1 MB

43 - Back To Signatures.mp4

10.0 MB

42 - Thwarting Guessing.mp4

9.8 MB

02 - Private Messages.mp4

9.7 MB

30 - Totient and Factoring.mp4

7.5 MB

39 - Insecurity In Practice.mp4

7.4 MB

20 - Invertibility Of RSA.mp4

7.3 MB

16 - Proving Eulers Theorem Pt1.mp4

7.3 MB

05 - Signatures Solution.mp4

7.2 MB

12 - Eulers Theorem.mp4

7.2 MB

24 - Compute E.mp4

6.8 MB

38 - Insecurity In Practice.mp4

6.3 MB

29 - Security Of Rsa Solution.mp4

6.2 MB

18 - Proving Eulers Theorem Pt2.mp4

5.8 MB

27 - Compute D Solution.mp4

5.6 MB

23 - Picking E And D Solution.mp4

5.1 MB

08 - Small M.mp4

4.6 MB

34 - 40 Quadrillion Years Solution.mp4

4.4 MB

40 - Small Messages.mp4

4.3 MB

22 - Picking E And D.mp4

4.0 MB

03 - Private Messages Solution.mp4

3.5 MB

10 - Correctness Of RSA.mp4

3.1 MB

13 - Eulers Theorem Solution.mp4

2.5 MB

26 - Compute D.mp4

2.5 MB

36 - Optional Complexity.mp4

2.3 MB

25 - Compute E Solution.mp4

1.6 MB

14 - Totient Function.mp4

431.1 KB

/Problem Set 2/

04 - Decrpytion In Parallel Solution.mp4

14.8 MB

06 - Output Feedback Mode Solution.mp4

13.5 MB

10 - Hash Collision Solution.mp4

12.9 MB

02 - Randomness Solution.mp4

9.4 MB

05 - Output Feedback Mode.mp4

7.5 MB

07 - CBC Implementation.mp4

7.4 MB

09 - Hash Collision.mp4

6.8 MB

03 - Decrpytion In Parallel.mp4

4.7 MB

01 - Randomness.mp4

4.6 MB

08 - Cbc Implementation Solution.mp4

4.0 MB

11 - Challenge Question.mp4

3.9 MB

/Problem Set 1/

16 - Challenge Question.mp4

14.7 MB

01 - Introduction.mp4

11.7 MB

08 - One Time Pad.mp4

11.2 MB

09 - One Time Pad Solution.mp4

10.8 MB

14 - Secret Sharing.mp4

10.8 MB

07 - Conditional Probability 3 Solution.mp4

8.0 MB

11 - Toy Substitution Cipher 1 Solution.mp4

7.7 MB

02 - Conditional Probability 1.mp4

6.6 MB

10 - Toy Substitution Cipher 1.mp4

6.3 MB

05 - Conditional Probability 2 Solution.mp4

5.2 MB

15 - Secret Sharing Solution.mp4

4.1 MB

13 - Toy Substitution Cipher 2 Solution.mp4

2.5 MB

03 - Conditional Probability 1 Solution.mp4

1.7 MB

12 - Toy Substitution Cipher 2.mp4

1.6 MB

06 - Conditional Probability 3.mp4

836.4 KB

04 - Conditional Probability 2.mp4

794.5 KB

/Problem Set 3/

6 - Timing Side Channel.mp4

12.5 MB

8 - Rabin Miller Primality Test Solution.mp4

8.8 MB

2 - Diffie Hellman Solution.mp4

6.7 MB

7 - Rabin Miller Primality Test.mp4

6.6 MB

1 - Diffie Hellman.mp4

6.2 MB

9 - Challenge Question.mp4

4.2 MB

5 - Timing Side Channel.mp4

4.2 MB

4 - Primitive Roots Solution.mp4

4.0 MB

3 - Primitive Roots.mp4

3.0 MB

/Problem Set 6/

7 - Tor Extended 5.mp4

10.2 MB

4 - Tor Extended 2.mp4

7.1 MB

6 - Tor Extended 4.mp4

6.2 MB

1 - Onion Routing.mp4

3.8 MB

5 - Tor Extended 3.mp4

3.7 MB

3 - Tor Extended 1.mp4

3.3 MB

2 - Voting.mp4

2.9 MB

/Problem Set 4/

08 - OAEP.mp4

7.8 MB

02 - Public Key Cryptography Solution.mp4

5.5 MB

09 - Oaep Solution.mp4

4.5 MB

07 - RSA Signature.mp4

4.4 MB

10 - RSA SIgnature Solution.mp4

4.3 MB

06 - Rsa Encryption Solution.mp4

4.1 MB

04 - Totient Solution.mp4

4.1 MB

05 - Rsa Encryption.mp4

3.3 MB

01 - Public Key Cryptography.mp4

3.2 MB

03 - Totient.mp4

558.9 KB

/Final Assessment/

9 - Proofs Of Work.mp4

7.4 MB

3 - Perfect Ciphers.mp4

7.2 MB

8 - Garbled Circuits.mp4

6.2 MB

4 - Symmetric Ciphers.mp4

5.8 MB

7 - Signing Certificates.mp4

5.2 MB

1 - One Time Pad.mp4

4.0 MB

2 - Biased Generator.mp4

3.4 MB

5 - Key Distribution.mp4

3.4 MB

6 - Rsa.mp4

2.2 MB

/Problem Set 5/

6 - Useful Certificates Solution.mp4

7.2 MB

3 - Hashing And EKE.mp4

6.3 MB

4 - Hashing And EKE Solution.mp4

4.0 MB

7 - Signing.mp4

3.9 MB

8 - Signing Solution.mp4

3.8 MB

2 - One Time Pad Reborn Solution.mp4

3.8 MB

1 - One Time Pad Reborn.mp4

3.4 MB

5 - Useful Certificates.mp4

3.1 MB

/.../Interview on GSM Cracking/

3 - Countermeasures.srt

12.8 KB

2 - Timememory.srt

9.0 KB

1 - Demo.srt

8.1 KB

4 - Ethics.srt

4.4 KB

/Q & A Session 1/

3 - Open Discussion.srt

12.3 KB

2 - Otp And Quantum Crypto.srt

5.8 KB

1 - Mathematics And Programming.srt

1.9 KB

/Lesson 1/

43 - Colossus.srt

11.1 KB

35 - Lorenz Cipher Machine.srt

8.7 KB

44 - Modern Symmetric Ciphers.srt

7.9 KB

42 - Guessing Keys Solution.srt

6.9 KB

13 - One Time Pad.srt

6.6 KB

32 - Lorenz Cipher.srt

5.5 KB

04 - Do Not Implement Your Own Crypto.srt

5.4 KB

34 - Intercepting Messages Solution.srt

5.2 KB

02 - Introduction Solution.srt

5.1 KB

31 - Perfect Cipher Is Impractical Solution.srt

4.9 KB

16 - Proving Security Solution.srt

4.7 KB

29 - Otp Is A Perfect Cipher Pt 3.srt

4.6 KB

36 - Lorenz Cipher Machine Solution.srt

4.2 KB

30 - Perfect Cipher Is Impractical.srt

4.2 KB

28 - Otp Is A Perfect Cipher Pt 2.srt

4.1 KB

07 - Keys And Kerchoffs Principle.srt

4.1 KB

10 - Correctness And Security Solution.srt

4.0 KB

09 - Correctness And Security.srt

4.0 KB

06 - Symmetric Cryptosystems.srt

3.7 KB

14 - One Time Pad Solution.srt

3.6 KB

17 - Probability Review Pt 1.srt

3.6 KB

45 - Advanced Encryption Standard.srt

3.5 KB

33 - Intercepting Messages.srt

3.5 KB

03 - Course Overview.srt

3.5 KB

01 - Introduction.srt

3.5 KB

46 - Summary.srt

3.3 KB

23 - Perfect Cipher.srt

3.1 KB

21 - Probability Review Pt 3.srt

2.9 KB

26 - Otp Is A Perfect Cipher Pt 1 Solution.srt

2.7 KB

22 - Probability Review Pt 3 Solution.srt

2.7 KB

15 - Proving Security.srt

2.6 KB

41 - Guessing Keys.srt

2.5 KB

24 - Perfect Cipher Solution.srt

2.2 KB

11 - Xor Function.srt

1.9 KB

40 - Weakness In Keys Solution.srt

1.8 KB

12 - Xor Function Solution.srt

1.8 KB

20 - Probability Review Pt 2 Solution.srt

1.8 KB

25 - Otp Is A Perfect Cipher Pt 1.srt

1.6 KB

19 - Probability Review Pt 2.srt

1.4 KB

38 - Importance Of Keys Solution.srt

1.3 KB

37 - Importance Of Keys.srt

1.0 KB

39 - Weakness In Keys.srt

1.0 KB

08 - Keys And Kerchoffs Principle Solution.srt

0.8 KB

27 - Otp Is A Perfect Cipher Pt 2.srt

0.7 KB

18 - Probability Review Pt 1 Solution.srt

0.7 KB

05 - Do Not Implement Your Own Crypto Solution.srt

0.2 KB

/Lesson 3/

15 - Discrete Log Problem.srt

8.7 KB

06 - Merkles Puzzles.srt

6.3 KB

30 - Faster Primality Test.srt

4.8 KB

09 - Secret Paint Mixing.srt

3.5 KB

17 - DH Security.srt

3.5 KB

01 - Introduction.srt

3.3 KB

22 - Finding Large Primes.srt

3.2 KB

08 - Diffie Hellman.srt

2.9 KB

11 - Key Exchange.srt

2.9 KB

04 - Trusted Third Party.srt

2.9 KB

34 - Diffie Hellman Summary.srt

2.8 KB

16 - Discrete Log Problem Solution.srt

2.4 KB

28 - Primality Test.srt

2.1 KB

05 - Trusted Third Party Solution.srt

2.1 KB

03 - Pairwise Distribution Solution.srt

2.1 KB

02 - Pairwise Distribution.srt

2.1 KB

21 - Modular Exponentiation Quiz Solution.srt

2.1 KB

33 - Diffie Hellman Summary.srt

2.0 KB

10 - Properties Of Multiplication.srt

1.9 KB

07 - Merkles Puzzles Solution.srt

1.7 KB

25 - Infinite Primes Solution.srt

1.7 KB

23 - Finding Large Primes Solution.srt

1.6 KB

19 - Implementing Dh Solution.srt

1.6 KB

13 - Passive Eavesdropper.srt

1.5 KB

14 - Passive Eavesdropper Solution.srt

1.4 KB

18 - Implementing Dh.srt

1.4 KB

35 - Summary.srt

1.4 KB

12 - Key Exchange Solution.srt

1.4 KB

26 - Density Of Primes.srt

1.3 KB

27 - Density Of Primes Solution.srt

0.8 KB

29 - Primality Test Solution.srt

0.7 KB

24 - Infinite Primes.srt

0.5 KB

20 - Modular Exponentiation Quiz.srt

0.5 KB

31 - Primality Quiz.srt

0.3 KB

32 - Primality Quiz Solution.srt

0.2 KB

/Q & A Session 3/

4 - Question 3.srt

8.1 KB

3 - Question 2.srt

4.9 KB

2 - Question 1.srt

2.9 KB

1 - Welcome.srt

2.5 KB

/Q & A Session 2/

1 - Questions And Answers.srt

7.8 KB

/Lesson 2/

39 - Strong Collision Resistance.srt

7.7 KB

03 - Randomness Quiz Solution.srt

6.9 KB

31 - Cryptographic Hash Function.srt

5.8 KB

50 - Hotel Door Locks.srt

5.5 KB

42 - Early Unix Implementation.srt

5.5 KB

21 - Cipher Feedback Mode.srt

5.1 KB

26 - Protocols.srt

4.9 KB

07 - Sources Of Randomness.srt

4.8 KB

04 - Kolmogorov Complexity.srt

4.8 KB

05 - Kolmogorov Complexity Solution.srt

4.7 KB

18 - Counter Mode.srt

4.6 KB

40 - Storing Passwords.srt

4.6 KB

14 - File Encryption Solution.srt

4.6 KB

11 - PRNG Implementation Solution.srt

4.5 KB

32 - Cryptographic Hash Function Solution.srt

4.2 KB

13 - File Encryption.srt

4.1 KB

41 - Storing Passwords Solution.srt

4.0 KB

25 - Properties Of Modes Solution.srt

3.8 KB

17 - Cbc Initialization Vector Solution.srt

3.7 KB

27 - Mutual Distrust.srt

3.5 KB

52 - Summary.srt

3.4 KB

49 - Hash Chain Solution.srt

3.3 KB

15 - Cipher Block Chaining Mode.srt

3.1 KB

06 - Unpredictability.srt

3.1 KB

43 - Salted Password Scheme.srt

3.0 KB

01 - Applications Of Symmetric Ciphers.srt

2.9 KB

30 - Padding Solution.srt

2.7 KB

08 - Pseudo Random Number Generator.srt

2.6 KB

38 - Weak Collision Resistance Solution.srt

2.6 KB

47 - Password Reuse.srt

2.4 KB

48 - Hash Chain.srt

2.3 KB

09 - Pseudo Random Number Generator Solution.srt

2.3 KB

28 - Mutual Distrust Solution.srt

2.1 KB

35 - Coin Tossing Again.srt

1.6 KB

29 - Padding.srt

1.5 KB

20 - Parallel Processing Solution.srt

1.5 KB

51 - Hotel Door Locks Solution.srt

1.4 KB

12 - Weak PRNGs.srt

1.4 KB

10 - Prng Implementation.srt

1.4 KB

34 - Random Oracle Solution.srt

1.4 KB

37 - Weak Collision Resistance.srt

1.3 KB

22 - Cfb Decryption.srt

1.2 KB

36 - Coin Tossing Again Solution.srt

1.2 KB

33 - Random Oracle.srt

1.2 KB

24 - Properties Of Modes.srt

1.1 KB

02 - Randomness Quiz.srt

0.9 KB

23 - Cfb Decryption Solution.srt

0.9 KB

16 - Cbc Initialization Vector.srt

0.8 KB

46 - Thwarting Dictionary Attacks Solution.srt

0.8 KB

19 - Parallel Processing.srt

0.7 KB

44 - Salted Password Scheme Solution.srt

0.7 KB

45 - Thwarting Dictionary Attacks.srt

0.5 KB

/Lesson 6/

55 - Longest Block Chain.srt

6.7 KB

53 - Double Hash.srt

6.4 KB

10 - Eavesdropper Solution.srt

5.2 KB

51 - Provide Scarcity.srt

4.3 KB

04 - Envelopes Solution.srt

4.0 KB

47 - Identity Challenges.srt

4.0 KB

36 - Blindfolded Signatures.srt

3.9 KB

35 - Digital Cash Solution.srt

3.8 KB

33 - Money Solution.srt

3.2 KB

01 - Solving Problems.srt

3.2 KB

49 - Bitcoin.srt

3.1 KB

05 - Onion Routing.srt

3.0 KB

08 - The First Hop Solution.srt

3.0 KB

13 - Voting.srt

3.0 KB

02 - Traffic Analysis.srt

2.9 KB

56 - Summary.srt

2.7 KB

03 - Envelopes.srt

2.7 KB

12 - Tor Solution.srt

2.6 KB

34 - Digital Cash.srt

2.5 KB

42 - Blind Signatures Protocol Solution.srt

2.5 KB

14 - Apple Blue Crazy.srt

2.4 KB

32 - Money.srt

2.2 KB

37 - RSA Blind Signatures.srt

2.2 KB

29 - Getting Caught Solution.srt

2.2 KB

20 - Crazy Crazy.srt

1.8 KB

23 - Prove A Vote Solution.srt

1.6 KB

17 - Mixnet Solution.srt

1.6 KB

25 - Auditing Mixes Solution.srt

1.6 KB

06 - Onion Routing Solution.srt

1.6 KB

24 - Auditing Mixes.srt

1.6 KB

45 - Identity List.srt

1.5 KB

27 - Auditing Tradeoffs Solution.srt

1.5 KB

16 - Mixnet.srt

1.4 KB

38 - Rsa Blind Signatures Solution.srt

1.3 KB

41 - Blind Signatures Protocol.srt

1.2 KB

46 - Identity List Solution.srt

1.1 KB

31 - Observing A Vote Solution.srt

1.0 KB

21 - Crazy Crazy Solution.srt

1.0 KB

19 - Voter Identity Solution.srt

1.0 KB

52 - Provide Scarcity Solution.srt

1.0 KB

54 - Double Hash Solution.srt

0.9 KB

18 - Voter Identity.srt

0.9 KB

30 - Observing A Vote.srt

0.8 KB

48 - Identity Challenges Solution.srt

0.7 KB

15 - Apple Blue Crazy Solution.srt

0.7 KB

09 - Eavesdropper.srt

0.6 KB

11 - Tor.srt

0.6 KB

43 - Deanonymizing Double Spenders.srt

0.6 KB

44 - Deanonymizing Double Spenders Solution.srt

0.6 KB

50 - Bitcoin Solution.srt

0.6 KB

40 - Worry Solution.srt

0.6 KB

22 - Prove A Vote.srt

0.3 KB

07 - The First Hop.srt

0.2 KB

28 - Getting Caught.srt

0.2 KB

26 - Auditing Tradeoffs.srt

0.1 KB

39 - Worry.srt

0.1 KB

/Lesson 5/

37 - TLS Record Protocol.srt

6.7 KB

21 - Master Secret.srt

6.5 KB

34 - Signature Validation Solution.srt

5.6 KB

04 - Encrypted Key Exchange.srt

5.0 KB

38 - TLS Record Protocol Solution.srt

5.0 KB

33 - Signature Validation.srt

4.7 KB

10 - Secure Shell.srt

4.5 KB

39 - CBC Attack.srt

4.5 KB

14 - Ssh Authentication In Practice.srt

4.1 KB

17 - Basic TLS.srt

3.8 KB

01 - Threat Model.srt

3.8 KB

41 - TLS Information Leak Solution.srt

3.4 KB

20 - What Could Go Wrong Solution.srt

3.0 KB

28 - Certificate Details.srt

3.0 KB

15 - Transport Layer Security.srt

3.0 KB

25 - Looking At A Certificate.srt

2.9 KB

13 - SSH Authentication Solution.srt

2.7 KB

05 - Encrypted Key Exchange Solution.srt

2.5 KB

18 - Basic Tls Solution.srt

2.4 KB

24 - Trusting A Server Solution.srt

2.2 KB

02 - Threat Model Solution.srt

2.1 KB

09 - Eke Authentication Implementation Solution.srt

2.0 KB

08 - Eke Authentication Implementation.srt

1.9 KB

03 - Overview.srt

1.9 KB

11 - Secure Shell Solution.srt

1.8 KB

31 - Certificates And Signatures.srt

1.8 KB

23 - Trusting A Server.srt

1.7 KB

42 - Summary.srt

1.6 KB

36 - Handshake Recap.srt

1.5 KB

07 - EKE Authentication Solution.srt

1.5 KB

27 - Certificates Solution.srt

1.4 KB

22 - Weak Ciphers.srt

1.2 KB

16 - Transport Layer Security Solution.srt

1.0 KB

35 - Interesting Certificate Chains.srt

1.0 KB

32 - Certificates And Signatures Solution.srt

1.0 KB

26 - Certificates.srt

1.0 KB

19 - What Could Go Wrong.srt

0.7 KB

06 - EKE Authentication.srt

0.7 KB

30 - Convincing Solution.srt

0.7 KB

40 - TLS Information Leak.srt

0.7 KB

12 - SSH Authentication.srt

0.6 KB

29 - Convincing.srt

0.3 KB

/Lesson 7/

01 - Summary.srt

5.7 KB

12 - Oblivious Transfer.srt

3.8 KB

04 - Logic Gate.srt

3.8 KB

10 - Garbled Circuit Protocol.srt

2.7 KB

02 - Secure Computation.srt

2.5 KB

16 - Putting It All Together.srt

2.0 KB

13 - Oblivious Transfer Solution.srt

2.0 KB

07 - Encrypt Outputs Solution.srt

1.9 KB

05 - Logic Gate Solution.srt

1.7 KB

08 - Permute Outputs.srt

1.7 KB

06 - Encrypt Outputs.srt

1.4 KB

11 - Garbled Circuit Protocol Solution.srt

1.1 KB

15 - Wire Labels Solution.srt

1.0 KB

09 - Permute Outputs Solution.srt

0.9 KB

03 - Secure Computation Solution.srt

0.9 KB

14 - Wire Labels.srt

0.8 KB

17 - Congratulations.srt

0.4 KB

/.../Problem Set 6 Solutions/

3 - Cut and Choose.srt

5.6 KB

8 - TOR Extended 5.srt

2.3 KB

5 - TOR Extended 2.srt

2.0 KB

1 - Onion Routing.srt

1.9 KB

6 - TOR Extended 3.srt

1.8 KB

7 - TOR Extended 4.srt

1.2 KB

2 - Voting.srt

0.8 KB

4 - TOR Extended 1.srt

0.5 KB

/Lesson 4/

35 - Factoring Is Still Hard.srt

5.4 KB

07 - RSA Cryptosystem.srt

4.0 KB

01 - Asymmetric Cryptosystems.srt

3.9 KB

28 - Security Of RSA.srt

3.8 KB

45 - Summary.srt

3.5 KB

37 - Optional Complexity Solution.srt

3.1 KB

15 - Totient Function Solution.srt

2.8 KB

09 - Small M Solution.srt

2.8 KB

31 - Totient and Factoring.srt

2.8 KB

41 - Small Messages Solution.srt

2.6 KB

17 - Proving Eulers Theorem Pt1 Solution.srt

2.6 KB

19 - Proving Eulers Theorem Pt2 Solution.srt

2.6 KB

33 - 40 Quadrillion Years.srt

2.4 KB

04 - Signatures.srt

2.2 KB

44 - Back To Signatures Solution.srt

2.2 KB

43 - Back To Signatures.srt

2.0 KB

32 - Computing D Still Hard.srt

2.0 KB

06 - One Way Function.srt

1.9 KB

11 - Correctness Of Rsa Solution.srt

1.9 KB

42 - Thwarting Guessing.srt

1.9 KB

02 - Private Messages.srt

1.8 KB

21 - Invertibility Of RSA Solution.srt

1.7 KB

05 - Signatures Solution.srt

1.5 KB

12 - Eulers Theorem.srt

1.3 KB

38 - Insecurity In Practice.srt

1.2 KB

39 - Insecurity In Practice.srt

1.2 KB

16 - Proving Eulers Theorem Pt1.srt

1.2 KB

29 - Security Of Rsa Solution.srt

1.2 KB

30 - Totient and Factoring.srt

1.2 KB

20 - Invertibility Of RSA.srt

1.1 KB

24 - Compute E.srt

1.1 KB

27 - Compute D Solution.srt

1.0 KB

18 - Proving Eulers Theorem Pt2.srt

1.0 KB

34 - 40 Quadrillion Years Solution.srt

1.0 KB

23 - Picking E And D Solution.srt

0.9 KB

40 - Small Messages.srt

0.9 KB

08 - Small M.srt

0.7 KB

10 - Correctness Of RSA.srt

0.7 KB

03 - Private Messages Solution.srt

0.6 KB

22 - Picking E And D.srt

0.6 KB

13 - Eulers Theorem Solution.srt

0.5 KB

26 - Compute D.srt

0.5 KB

36 - Optional Complexity.srt

0.4 KB

25 - Compute E Solution.srt

0.4 KB

14 - Totient Function.srt

0.1 KB

/Problem Set 2/

04 - Decrpytion In Parallel Solution.srt

3.0 KB

06 - Output Feedback Mode Solution.srt

2.8 KB

10 - Hash Collision Solution.srt

2.5 KB

02 - Randomness Solution.srt

2.0 KB

09 - Hash Collision.srt

1.5 KB

05 - Output Feedback Mode.srt

1.5 KB

07 - CBC Implementation.srt

1.2 KB

03 - Decrpytion In Parallel.srt

1.0 KB

01 - Randomness.srt

1.0 KB

08 - Cbc Implementation Solution.srt

0.9 KB

11 - Challenge Question.srt

0.5 KB

/Problem Set 1/

16 - Challenge Question.srt

2.7 KB

01 - Introduction.srt

2.7 KB

08 - One Time Pad.srt

2.2 KB

14 - Secret Sharing.srt

1.9 KB

09 - One Time Pad Solution.srt

1.6 KB

11 - Toy Substitution Cipher 1 Solution.srt

1.5 KB

07 - Conditional Probability 3 Solution.srt

1.3 KB

10 - Toy Substitution Cipher 1.srt

1.3 KB

02 - Conditional Probability 1.srt

1.2 KB

05 - Conditional Probability 2 Solution.srt

0.9 KB

15 - Secret Sharing Solution.srt

0.8 KB

13 - Toy Substitution Cipher 2 Solution.srt

0.4 KB

12 - Toy Substitution Cipher 2.srt

0.3 KB

03 - Conditional Probability 1 Solution.srt

0.3 KB

06 - Conditional Probability 3.srt

0.2 KB

04 - Conditional Probability 2.srt

0.1 KB

/Problem Set 6/

7 - Tor Extended 5.srt

2.3 KB

4 - Tor Extended 2.srt

1.5 KB

6 - Tor Extended 4.srt

1.0 KB

1 - Onion Routing.srt

0.7 KB

3 - Tor Extended 1.srt

0.7 KB

5 - Tor Extended 3.srt

0.7 KB

2 - Voting.srt

0.5 KB

/Problem Set 3/

6 - Timing Side Channel.srt

1.9 KB

7 - Rabin Miller Primality Test.srt

1.4 KB

8 - Rabin Miller Primality Test Solution.srt

1.4 KB

2 - Diffie Hellman Solution.srt

1.3 KB

1 - Diffie Hellman.srt

1.1 KB

5 - Timing Side Channel.srt

0.9 KB

9 - Challenge Question.srt

0.8 KB

4 - Primitive Roots Solution.srt

0.8 KB

3 - Primitive Roots.srt

0.6 KB

/Problem Set 4/

08 - OAEP.srt

1.5 KB

07 - RSA Signature.srt

1.0 KB

02 - Public Key Cryptography Solution.srt

1.0 KB

09 - Oaep Solution.srt

1.0 KB

10 - RSA SIgnature Solution.srt

0.8 KB

01 - Public Key Cryptography.srt

0.8 KB

06 - Rsa Encryption Solution.srt

0.7 KB

04 - Totient Solution.srt

0.5 KB

05 - Rsa Encryption.srt

0.4 KB

03 - Totient.srt

0.1 KB

/Final Assessment/

3 - Perfect Ciphers.srt

1.4 KB

9 - Proofs Of Work.srt

1.3 KB

4 - Symmetric Ciphers.srt

1.1 KB

7 - Signing Certificates.srt

1.1 KB

8 - Garbled Circuits.srt

1.1 KB

5 - Key Distribution.srt

0.8 KB

1 - One Time Pad.srt

0.7 KB

2 - Biased Generator.srt

0.6 KB

6 - Rsa.srt

0.4 KB

/Problem Set 5/

3 - Hashing And EKE.srt

1.4 KB

6 - Useful Certificates Solution.srt

1.3 KB

2 - One Time Pad Reborn Solution.srt

1.0 KB

4 - Hashing And EKE Solution.srt

0.9 KB

8 - Signing Solution.srt

0.8 KB

1 - One Time Pad Reborn.srt

0.7 KB

7 - Signing.srt

0.6 KB

5 - Useful Certificates.srt

0.5 KB

 

Total files 764


Copyright © 2025 FileMood.com