589689.xyz

Stanford - Cryptography I

  • 收录时间:2018-03-05 01:43:17
  • 文件大小:1GB
  • 下载次数:170
  • 最近下载:2021-01-20 04:49:56
  • 磁力链接:

文件列表

  1. 02 - Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4 27MB
  2. 02 - Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25MB
  3. 04- Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4 25MB
  4. 03 - Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4 25MB
  5. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 23MB
  6. 07 - Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 23MB
  7. 05 - Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4 22MB
  8. 08 - Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22MB
  9. 03 - Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4 22MB
  10. 02 - Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4 22MB
  11. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 21MB
  12. 10 - Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 21MB
  13. 02 - Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21MB
  14. 09 - Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 21MB
  15. 01 - Introduction ( Week 1 )/1 - 3 - History of cryptography (19 min).mp4 20MB
  16. 10 - Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 20MB
  17. 02 - Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20MB
  18. 01 - Introduction ( Week 1 )/1 - 4 - Discrete probability (Crash course) (18 min).mp4 20MB
  19. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 20MB
  20. 10 - Intro. Number Theory (week 5)/10 - 3 - Modular e_'th roots (17 min)14.mp4 19MB
  21. 07 - Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).mp4 19MB
  22. 03 - Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).mp4 19MB
  23. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).mp4 19MB
  24. 04- Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 18MB
  25. 03 - Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4 18MB
  26. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 17MB
  27. 05 - Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17MB
  28. 01 - Introduction ( Week 1 )/1 - 2 - What is cryptography_ (15 min).mp4 17MB
  29. 02 - Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4 17MB
  30. 05 - Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4 17MB
  31. 06 - Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4 16MB
  32. 10 - Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 16MB
  33. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 16MB
  34. 08 - Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 16MB
  35. 08 - Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 16MB
  36. 07 - Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4 15MB
  37. 01 - Introduction ( Week 1 )/1 - 5 - Discrete probability (crash course, cont.) (14 min).mp4 15MB
  38. 08 - Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 15MB
  39. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 15MB
  40. 03 - Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4 15MB
  41. 07 - Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14MB
  42. 10 - Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 14MB
  43. 08 - Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 13MB
  44. 07 - Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4 13MB
  45. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 13MB
  46. 03 - Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4 13MB
  47. 04- Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).mp4 13MB
  48. 06 - Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 13MB
  49. 09 - Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 12MB
  50. 09 - Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 12MB
  51. 06 - Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4 12MB
  52. 09 - Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 12MB
  53. 02 - Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 12MB
  54. 01 - Introduction ( Week 1 )/1 - 1 - Course Overview (11 min).mp4 12MB
  55. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 11MB
  56. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11MB
  57. 05 - Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4 11MB
  58. 07 - Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4 11MB
  59. 04- Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10MB
  60. 06 - Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4 9MB
  61. 05 - Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4 9MB
  62. 06 - Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4 9MB
  63. 04- Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).mp4 8MB
  64. 06 - Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4 8MB
  65. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 6MB
  66. 07 - Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4 6MB
  67. 01 - Introduction ( Week 1 )/01.3-intro-annotated.pdf 1MB
  68. 03 - Block Ciphers (week 2)/03.2-block-annotated.pdf 1MB
  69. 07 - Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf 873KB
  70. 01 - Introduction ( Week 1 )/01.2-intro-annotated.pdf 866KB
  71. 03 - Block Ciphers (week 2)/03.5-block-annotated.pdf 808KB
  72. 07 - Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf 716KB
  73. 07 - Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf 686KB
  74. 07 - Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf 681KB
  75. 07 - Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf 673KB
  76. 02 - Stream Ciphers (week 1)/02.3-stream-annotated.pdf 593KB
  77. 08 - Odds and ends (week 4)/08.4-odds-and-ends.pdf 551KB
  78. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf 550KB
  79. 12 - Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf 536KB
  80. 07 - Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf 533KB
  81. 01 - Introduction ( Week 1 )/01.4-intro-v2.pdf 532KB
  82. 08 - Odds and ends (week 4)/08.3-odds-and-ends.pdf 515KB
  83. 01 - Introduction ( Week 1 )/01.5-intro-v2.pdf 473KB
  84. 03 - Block Ciphers (week 2)/03.3-block-annotated.pdf 468KB
  85. 07 - Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf 462KB
  86. 02 - Stream Ciphers (week 1)/02.4-stream-annotated.pdf 452KB
  87. 08 - Odds and ends (week 4)/08.2-odds-and-ends.pdf 449KB
  88. 09 - Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf 435KB
  89. 03 - Block Ciphers (week 2)/03.6-block-annotated.pdf 434KB
  90. 03 - Block Ciphers (week 2)/03.4-block-annotated.pdf 420KB
  91. 04- Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf 387KB
  92. 02 - Stream Ciphers (week 1)/02.1-stream-annotated.pdf 380KB
  93. 08 - Odds and ends (week 4)/08.5-odds-and-ends.pdf 376KB
  94. 05 - Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf 348KB
  95. 02 - Stream Ciphers (week 1)/02.2-stream-annotated.pdf 331KB
  96. 08 - Odds and ends (week 4)/08.1-odds-and-ends.pdf 329KB
  97. 12 - Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf 321KB
  98. 04- Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf 317KB
  99. 01 - Introduction ( Week 1 )/01.1-intro-annotated.pdf 307KB
  100. 02 - Stream Ciphers (week 1)/02.5-stream-annotated.pdf 302KB
  101. 12 - Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf 295KB
  102. 03 - Block Ciphers (week 2)/03.1-block-annotated.pdf 291KB
  103. 10 - Intro. Number Theory (week 5)/10.3-numth-annotated.pdf 287KB
  104. 10 - Intro. Number Theory (week 5)/10.4-numth-annotated.pdf 270KB
  105. 09 - Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf 269KB
  106. 06 - Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 268KB
  107. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf 264KB
  108. 04- Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf 263KB
  109. 04- Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf 259KB
  110. 06 - Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 259KB
  111. 06 - Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf 246KB
  112. 02 - Stream Ciphers (week 1)/02.6-stream-annotated.pdf 242KB
  113. 10 - Intro. Number Theory (week 5)/10.1-numth-annotated.pdf 242KB
  114. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf 239KB
  115. 05 - Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf 236KB
  116. 10 - Intro. Number Theory (week 5)/10.5-numth-annotated.pdf 236KB
  117. 06 - Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf 232KB
  118. 06 - Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf 230KB
  119. 09 - Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf 230KB
  120. 05 - Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf 224KB
  121. 09 - Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf 223KB
  122. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf 212KB
  123. 02 - Stream Ciphers (week 1)/02.7-stream-annotated.pdf 210KB
  124. 04- Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf 205KB
  125. 06 - Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 200KB
  126. 05 - Message Integrity (week 3)/05.4-integrity-mac-padding.pdf 200KB
  127. 12 - Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf 197KB
  128. 05 - Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf 194KB
  129. 10 - Intro. Number Theory (week 5)/10.2-numth-annotated.pdf 187KB
  130. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf 185KB
  131. 12 - Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf 179KB
  132. 11 - Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf 166KB
  133. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).srt 37KB
  134. 02 - Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).srt 36KB
  135. 02 - Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 35KB
  136. 04- Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).srt 34KB
  137. 03 - Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).srt 31KB
  138. 08 - Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 31KB
  139. 07 - Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).srt 31KB
  140. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).srt 31KB
  141. 09 - Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).srt 29KB
  142. 05 - Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).srt 29KB
  143. 02 - Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28KB
  144. 02 - Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).srt 28KB
  145. 10 - Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).srt 28KB
  146. 03 - Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).srt 27KB
  147. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).srt 27KB
  148. 07 - Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).srt 26KB
  149. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).srt 26KB
  150. 01 - Introduction ( Week 1 )/1 - 3 - History of cryptography (19 min).srt 26KB
  151. 02 - Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).srt 26KB
  152. 10 - Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).srt 26KB
  153. 01 - Introduction ( Week 1 )/1 - 2 - What is cryptography_ (15 min).srt 25KB
  154. 01 - Introduction ( Week 1 )/1 - 4 - Discrete probability (Crash course) (18 min).srt 25KB
  155. 03 - Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).srt 25KB
  156. 03 - Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).srt 25KB
  157. 04- Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 24KB
  158. 05 - Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24KB
  159. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).srt 24KB
  160. 02 - Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).srt 24KB
  161. 05 - Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).srt 23KB
  162. 08 - Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).srt 23KB
  163. 10 - Intro. Number Theory (week 5)/10 - 3 - Modular e_'th roots (17 min)14.srt 23KB
  164. 08 - Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).srt 22KB
  165. 06 - Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).srt 22KB
  166. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).srt 22KB
  167. 08 - Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).srt 21KB
  168. 07 - Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).srt 21KB
  169. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).srt 21KB
  170. 03 - Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).srt 20KB
  171. 01 - Introduction ( Week 1 )/1 - 5 - Discrete probability (crash course, cont.) (14 min).srt 20KB
  172. 09 - Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).srt 20KB
  173. 07 - Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 20KB
  174. 10 - Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).srt 19KB
  175. 07 - Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).srt 19KB
  176. 08 - Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).srt 19KB
  177. 10 - Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).srt 18KB
  178. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).srt 18KB
  179. 03 - Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).srt 17KB
  180. 06 - Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 17KB
  181. 09 - Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).srt 17KB
  182. 09 - Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).srt 17KB
  183. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).srt 17KB
  184. 04- Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).srt 17KB
  185. 01 - Introduction ( Week 1 )/1 - 1 - Course Overview (11 min).srt 17KB
  186. 06 - Collision Resistance (week 3)/6 - 1 - Introduction (11 min).srt 17KB
  187. 11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .srt 17KB
  188. 02 - Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].srt 16KB
  189. 05 - Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).srt 15KB
  190. 07 - Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).srt 15KB
  191. 04- Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14KB
  192. 06 - Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).srt 13KB
  193. 05 - Message Integrity (week 3)/5 - 4 - MAC padding (9 min).srt 13KB
  194. 06 - Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).srt 13KB
  195. 04- Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).srt 12KB
  196. 06 - Collision Resistance (week 3)/6 - 5 - HMAC (7 min).srt 10KB
  197. 12 - Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).srt 9KB
  198. 07 - Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).srt 8KB