Coursera-Crypto-I-2FIu
- CR1 - 01 - 01 - Course Overview (11 min).mp411.72MB
- CR1 - 01 - 02 - What is cryptography (15 min).mp417.01MB
- CR1 - 01 - 03 - History of cryptography (19 min).mp420.47MB
- CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp419.82MB
- CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp414.64MB
- CR1 - 02 - 01 - Infortion theoretic security and the one time pad (19 min).mp420.04MB
- CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
- CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
- CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp421.87MB
- CR1 - 02 - 05 - PRG Security Definitions (25 min).mp426.80MB
- CR1 - 02 - 06 - Sentic Security (16 min).mp416.80MB
- CR1 - 02 - 07 - Stream ciphers are sentically secure (11 min) [optional].mp411.73MB
- CR1 - 03 - 01 - What are block ciphers (17 min).mp418.67MB
- CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp424.50MB
- CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp421.91MB
- CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp417.75MB
- CR1 - 03 - 05 - The AES block cipher (14 min).mp414.52MB
- CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp412.88MB
- CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp412.72MB
- CR1 - 04 - 02 - Modes of operation one time key (8 min).mp47.98MB
- CR1 - 04 - 03 - Security for ny-time key (23 min).mp424.92MB
- CR1 - 04 - 04 - Modes of operation ny time key (CBC) (16 min).mp417.96MB
- CR1 - 04 - 05 - Modes of operation ny time key (CTR) (10 min).mp410.44MB
- CR1 - 05 - 01 - Message Authentication Codes (16 min).mp416.55MB
- CR1 - 05 - 02 - Cs Based On PRFs (10 min).mp411.18MB
- CR1 - 05 - 03 - CBC-C and NMAC (20 min).mp422.34MB
- CR1 - 05 - 04 - C padding (9 min).mp49.30MB
- CR1 - 05 - 05 - PC and the Carter-Wegman MAC (16 min).mp417.06MB
- CR1 - 06 - 01 - Introduction (11 min).mp411.92MB
- CR1 - 06 - 02 - Generic birthday attack (16 min).mp416.14MB
- CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
- CR1 - 06 - 04 - Constructing compression functions (8 min).mp48.78MB
- CR1 - 06 - 05 - HC (7 min).mp47.83MB
- CR1 - 06 - 06 - Timing attacks on C verification (9 min).mp49.39MB
- CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
- CR1 - 07 - 02 - Definitions (6 min).mp45.61MB
- CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp413.04MB
- CR1 - 07 - 04 - Constructions from ciphers and Cs (21 min).mp422.84MB
- CR1 - 07 - 05 - Case study TLS (18 min).mp418.96MB
- CR1 - 07 - 06 - CBC padding attacks (14 min).mp414.99MB
- CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp411.09MB
- CR1 - 08 - 01 - Key Derivation (14 min).mp414.57MB
- CR1 - 08 - 02 - Deterministic Encryption (15 min).mp415.62MB
- CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06MB
- CR1 - 08 - 04 - Tweakable encryption (15 min).mp415.58MB
- CR1 - 08 - 05 - Fort preserving encryption (13 min).mp413.21MB
- CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp412.22MB
- CR1 - 09 - 02 - Merkle Puzzles (11 min).mp412.40MB
- CR1 - 09 - 03 - The Diffie-Helln protocol (19 min).mp420.96MB
- CR1 - 09 - 04 - Public-key encryption (11 min).mp411.83MB
- CR1 - 10 - 01 - Notation (15 min).mp415.70MB
- CR1 - 10 - 02 - Fert and Euler (18 min).mp420.06MB
- CR1 - 10 - 03 - Modular eth roots (17 min).mp419.09MB
- CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp413.89MB
- CR1 - 10 - 05 - Intractable problems (19 min).mp421.22MB
- CR1 - 11 - 01 - Definitions and security (16 min).mp417.22MB
- CR1 - 11 - 02 - Constructions (11 min) .mp411.29MB
- CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp419.82MB
- CR1 - 11 - 04 - PKCS 1 (23 min).mp423.40MB
- CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp418.53MB
- CR1 - 11 - 06 - RSA in practice (14 min).mp415.63MB
- CR1 - 12 - 01 - The ElGal Public-key System (23 min).mp421.36MB
- CR1 - 12 - 02 - ElGal Security (14 min).mp414.53MB
- CR1 - 12 - 03 - ElGal Variants With Better Security (11 min).mp411.27MB
- CR1 - 12 - 04 - A Unifying Theme (12 min).mp412.93MB
- CR1 - 12 - 05 - Farewell (for now) (6 min).mp45.73MB
- slides01-intro-v2-annotated.pdf2.70MB
- slides02-stream-v2-annotated.pdf6.64MB
- slides03-block-v2-annotated.pdf2.82MB
- slides04-using-block-v2-annotated.pdf909.19KB
- slides05-integrity-v2-annotated.pdf690.20KB
- slides06-collision-resistance-v2-annotated.pdf830.64KB
- slides07-authenc-v2-annotated.pdf1.54MB
- slides08-odds-and-ends-v2-annotated.pdf1.63MB
- slides09-basic-key-exchange-annotated.pdf804.43KB
- slides10-numth-annotated.pdf722.47KB
- slides11-pubkey-trapdoor-annotated.pdf1023.42KB
- slides12-pubkey-dh-annotated.pdf1.02MB
- CreateTime2017-01-25
- UpdateTime2017-08-03
- FileTotalCount144
- TotalSize1.05GBHotTimes8ViewTimes12DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.RCT-111 2.NSPS-170 3.STAR-315 4.YYKD-016 5.EMAL-014 6.MIRD-038 7.ONSD-412 8.ONED-930 9.OBSE-001 10.EVIS-010 11.WNZ-109 12.HODV-60072 13.VWB-07 14.GAR-024 15.FILM-1001 16.HKKA-008 17.SPZ-279 18.VNDS-5056 19.HS-063 20.NXG-060 21.JUGA-008 22.OKAD-487 23.EMBX-028 24.HET-118 25.AMD-128 26.BNDV-765 27.ABF-069 28.NHDTA-563 29.SMA-778 30.ONSD-929 31.ODV-380 32.HNDB-088 33.TURA-209 34.JCKL-157 35.HTMS-088 36.JKNK-053 37.JOHS-040 38.SDEN-019 39.KSJ-002 40.BLOR-095 41.111 42.170 43.315 44.016 45.014 46.038 47.412 48.930 49.001 50.010 51.109 52.60072 53.07 54.024 55.1001 56.008 57.279 58.5056 59.063 60.060 61.008 62.487 63.028 64.118 65.128 66.765 67.069 68.563 69.778 70.929 71.380 72.088 73.209 74.157 75.088 76.053 77.040 78.019 79.002 80.095