fileCoursera-Crypto-I-2FIu

Coursera Crypto I
  • MP4CR1 - 01 - 01 - Course Overview (11 min).mp411.72MB
  • MP4CR1 - 01 - 02 - What is cryptography (15 min).mp417.01MB
  • MP4CR1 - 01 - 03 - History of cryptography (19 min).mp420.47MB
  • MP4CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp419.82MB
  • MP4CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp414.64MB
  • MP4CR1 - 02 - 01 - Infortion theoretic security and the one time pad (19 min).mp420.04MB
  • MP4CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
  • MP4CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
  • MP4CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp421.87MB
  • MP4CR1 - 02 - 05 - PRG Security Definitions (25 min).mp426.80MB
  • MP4CR1 - 02 - 06 - Sentic Security (16 min).mp416.80MB
  • MP4CR1 - 02 - 07 - Stream ciphers are sentically secure (11 min) [optional].mp411.73MB
  • MP4CR1 - 03 - 01 - What are block ciphers (17 min).mp418.67MB
  • MP4CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp424.50MB
  • MP4CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp421.91MB
  • MP4CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp417.75MB
  • MP4CR1 - 03 - 05 - The AES block cipher (14 min).mp414.52MB
  • MP4CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp412.88MB
  • MP4CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp412.72MB
  • MP4CR1 - 04 - 02 - Modes of operation one time key (8 min).mp47.98MB
  • MP4CR1 - 04 - 03 - Security for ny-time key (23 min).mp424.92MB
  • MP4CR1 - 04 - 04 - Modes of operation ny time key (CBC) (16 min).mp417.96MB
  • MP4CR1 - 04 - 05 - Modes of operation ny time key (CTR) (10 min).mp410.44MB
  • MP4CR1 - 05 - 01 - Message Authentication Codes (16 min).mp416.55MB
  • MP4CR1 - 05 - 02 - Cs Based On PRFs (10 min).mp411.18MB
  • MP4CR1 - 05 - 03 - CBC-C and NMAC (20 min).mp422.34MB
  • MP4CR1 - 05 - 04 - C padding (9 min).mp49.30MB
  • MP4CR1 - 05 - 05 - PC and the Carter-Wegman MAC (16 min).mp417.06MB
  • MP4CR1 - 06 - 01 - Introduction (11 min).mp411.92MB
  • MP4CR1 - 06 - 02 - Generic birthday attack (16 min).mp416.14MB
  • MP4CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
  • MP4CR1 - 06 - 04 - Constructing compression functions (8 min).mp48.78MB
  • MP4CR1 - 06 - 05 - HC (7 min).mp47.83MB
  • MP4CR1 - 06 - 06 - Timing attacks on C verification (9 min).mp49.39MB
  • MP4CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
  • MP4CR1 - 07 - 02 - Definitions (6 min).mp45.61MB
  • MP4CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp413.04MB
  • MP4CR1 - 07 - 04 - Constructions from ciphers and Cs (21 min).mp422.84MB
  • MP4CR1 - 07 - 05 - Case study TLS (18 min).mp418.96MB
  • MP4CR1 - 07 - 06 - CBC padding attacks (14 min).mp414.99MB
  • MP4CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp411.09MB
  • MP4CR1 - 08 - 01 - Key Derivation (14 min).mp414.57MB
  • MP4CR1 - 08 - 02 - Deterministic Encryption (15 min).mp415.62MB
  • MP4CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06MB
  • MP4CR1 - 08 - 04 - Tweakable encryption (15 min).mp415.58MB
  • MP4CR1 - 08 - 05 - Fort preserving encryption (13 min).mp413.21MB
  • MP4CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp412.22MB
  • MP4CR1 - 09 - 02 - Merkle Puzzles (11 min).mp412.40MB
  • MP4CR1 - 09 - 03 - The Diffie-Helln protocol (19 min).mp420.96MB
  • MP4CR1 - 09 - 04 - Public-key encryption (11 min).mp411.83MB
  • MP4CR1 - 10 - 01 - Notation (15 min).mp415.70MB
  • MP4CR1 - 10 - 02 - Fert and Euler (18 min).mp420.06MB
  • MP4CR1 - 10 - 03 - Modular eth roots (17 min).mp419.09MB
  • MP4CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp413.89MB
  • MP4CR1 - 10 - 05 - Intractable problems (19 min).mp421.22MB
  • MP4CR1 - 11 - 01 - Definitions and security (16 min).mp417.22MB
  • MP4CR1 - 11 - 02 - Constructions (11 min) .mp411.29MB
  • MP4CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp419.82MB
  • MP4CR1 - 11 - 04 - PKCS 1 (23 min).mp423.40MB
  • MP4CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp418.53MB
  • MP4CR1 - 11 - 06 - RSA in practice (14 min).mp415.63MB
  • MP4CR1 - 12 - 01 - The ElGal Public-key System (23 min).mp421.36MB
  • MP4CR1 - 12 - 02 - ElGal Security (14 min).mp414.53MB
  • MP4CR1 - 12 - 03 - ElGal Variants With Better Security (11 min).mp411.27MB
  • MP4CR1 - 12 - 04 - A Unifying Theme (12 min).mp412.93MB
  • MP4CR1 - 12 - 05 - Farewell (for now) (6 min).mp45.73MB
  • PDFslides01-intro-v2-annotated.pdf2.70MB
  • PDFslides02-stream-v2-annotated.pdf6.64MB
  • PDFslides03-block-v2-annotated.pdf2.82MB
  • PDFslides04-using-block-v2-annotated.pdf909.19KB
  • PDFslides05-integrity-v2-annotated.pdf690.20KB
  • PDFslides06-collision-resistance-v2-annotated.pdf830.64KB
  • PDFslides07-authenc-v2-annotated.pdf1.54MB
  • PDFslides08-odds-and-ends-v2-annotated.pdf1.63MB
  • PDFslides09-basic-key-exchange-annotated.pdf804.43KB
  • PDFslides10-numth-annotated.pdf722.47KB
  • PDFslides11-pubkey-trapdoor-annotated.pdf1023.42KB
  • PDFslides12-pubkey-dh-annotated.pdf1.02MB
Latest Search: 1.RCT-111   2.NSPS-170   3.STAR-315   4.YYKD-016   5.EMAL-014   6.MIRD-038   7.ONSD-412   8.ONED-930   9.OBSE-001   10.EVIS-010   11.WNZ-109   12.HODV-60072   13.VWB-07   14.GAR-024   15.FILM-1001   16.HKKA-008   17.SPZ-279   18.VNDS-5056   19.HS-063   20.NXG-060   21.JUGA-008   22.OKAD-487   23.EMBX-028   24.HET-118   25.AMD-128   26.BNDV-765   27.ABF-069   28.NHDTA-563   29.SMA-778   30.ONSD-929   31.ODV-380   32.HNDB-088   33.TURA-209   34.JCKL-157   35.HTMS-088   36.JKNK-053   37.JOHS-040   38.SDEN-019   39.KSJ-002   40.BLOR-095   41.111   42.170   43.315   44.016   45.014   46.038   47.412   48.930   49.001   50.010   51.109   52.60072   53.07   54.024   55.1001   56.008   57.279   58.5056   59.063   60.060   61.008   62.487   63.028   64.118   65.128   66.765   67.069   68.563   69.778   70.929   71.380   72.088   73.209   74.157   75.088   76.053   77.040   78.019   79.002   80.095