589689.xyz

Coursera-Crypto-I

  • 收录时间:2018-03-08 10:45:05
  • 文件大小:1GB
  • 下载次数:175
  • 最近下载:2021-01-18 04:05:26
  • 磁力链接:

文件列表

  1. CR1 - 02 - 05 - PRG Security Definitions (25 min).mp4 27MB
  2. CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp4 25MB
  3. CR1 - 04 - 03 - Security for many-time key (23 min).mp4 25MB
  4. CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp4 25MB
  5. CR1 - 11 - 04 - PKCS 1 (23 min).mp4 23MB
  6. CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp4 23MB
  7. CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp4 22MB
  8. CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 22MB
  9. CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp4 22MB
  10. CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp4 22MB
  11. CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp4 21MB
  12. CR1 - 10 - 05 - Intractable problems (19 min).mp4 21MB
  13. CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp4 21MB
  14. CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp4 21MB
  15. CR1 - 01 - 03 - History of cryptography (19 min).mp4 20MB
  16. CR1 - 10 - 02 - Fermat and Euler (18 min).mp4 20MB
  17. CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp4 20MB
  18. CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp4 20MB
  19. CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp4 20MB
  20. CR1 - 10 - 03 - Modular eth roots (17 min).mp4 19MB
  21. CR1 - 07 - 05 - Case study TLS (18 min).mp4 19MB
  22. CR1 - 03 - 01 - What are block ciphers (17 min).mp4 19MB
  23. CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp4 19MB
  24. CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp4 18MB
  25. CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp4 18MB
  26. CR1 - 11 - 01 - Definitions and security (16 min).mp4 17MB
  27. CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp4 17MB
  28. CR1 - 01 - 02 - What is cryptography (15 min).mp4 17MB
  29. CR1 - 02 - 06 - Semantic Security (16 min).mp4 17MB
  30. CR1 - 05 - 01 - Message Authentication Codes (16 min).mp4 17MB
  31. CR1 - 06 - 02 - Generic birthday attack (16 min).mp4 16MB
  32. CR1 - 10 - 01 - Notation (15 min).mp4 16MB
  33. CR1 - 11 - 06 - RSA in practice (14 min).mp4 16MB
  34. CR1 - 08 - 02 - Deterministic Encryption (15 min).mp4 16MB
  35. CR1 - 08 - 04 - Tweakable encryption (15 min).mp4 16MB
  36. CR1 - 07 - 06 - CBC padding attacks (14 min).mp4 15MB
  37. CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp4 15MB
  38. CR1 - 08 - 01 - Key Derivation (14 min).mp4 15MB
  39. CR1 - 12 - 02 - ElGamal Security (14 min).mp4 15MB
  40. CR1 - 03 - 05 - The AES block cipher (14 min).mp4 15MB
  41. CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp4 14MB
  42. CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp4 14MB
  43. CR1 - 08 - 05 - Format preserving encryption (13 min).mp4 13MB
  44. CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp4 13MB
  45. CR1 - 12 - 04 - A Unifying Theme (12 min).mp4 13MB
  46. CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp4 13MB
  47. CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp4 13MB
  48. CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp4 13MB
  49. CR1 - 09 - 02 - Merkle Puzzles (11 min).mp4 12MB
  50. CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp4 12MB
  51. CR1 - 06 - 01 - Introduction (11 min).mp4 12MB
  52. CR1 - 09 - 04 - Public-key encryption (11 min).mp4 12MB
  53. CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].mp4 12MB
  54. CR1 - 01 - 01 - Course Overview (11 min).mp4 12MB
  55. CR1 - 11 - 02 - Constructions (11 min) .mp4 11MB
  56. CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).mp4 11MB
  57. CR1 - 05 - 02 - MACs Based On PRFs (10 min).mp4 11MB
  58. CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp4 11MB
  59. CR1 - 04 - 05 - Modes of operation many time key (CTR) (10 min).mp4 10MB
  60. CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).mp4 9MB
  61. CR1 - 05 - 04 - MAC padding (9 min).mp4 9MB
  62. CR1 - 06 - 04 - Constructing compression functions (8 min).mp4 9MB
  63. CR1 - 04 - 02 - Modes of operation one time key (8 min).mp4 8MB
  64. CR1 - 06 - 05 - HMAC (7 min).mp4 8MB
  65. slides/02-stream-v2-annotated.pdf 7MB
  66. CR1 - 12 - 05 - Farewell (for now) (6 min).mp4 6MB
  67. CR1 - 07 - 02 - Definitions (6 min).mp4 6MB
  68. slides/03-block-v2-annotated.pdf 3MB
  69. slides/01-intro-v2-annotated.pdf 3MB
  70. slides/08-odds-and-ends-v2-annotated.pdf 2MB
  71. slides/07-authenc-v2-annotated.pdf 2MB
  72. slides/12-pubkey-dh-annotated.pdf 1MB
  73. slides/11-pubkey-trapdoor-annotated.pdf 1023KB
  74. slides/04-using-block-v2-annotated.pdf 909KB
  75. slides/06-collision-resistance-v2-annotated.pdf 831KB
  76. slides/09-basic-key-exchange-annotated.pdf 804KB
  77. slides/10-numth-annotated.pdf 722KB
  78. slides/05-integrity-v2-annotated.pdf 690KB
  79. subtitles/CR1 - 12 - 01 - The ElGamal Public-key System (23 min).srt 37KB
  80. subtitles/CR1 - 02 - 05 - PRG Security Definitions (25 min).srt 36KB
  81. subtitles/CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).srt 35KB
  82. subtitles/CR1 - 04 - 03 - Security for many-time key (23 min).srt 34KB
  83. subtitles/CR1 - 03 - 02 - The Data Encryption Standard (22 min).srt 31KB
  84. subtitles/CR1 - 08 - 03 - Deterministic Encryption_SIV and wide PRP (21 min).srt 31KB
  85. subtitles/CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).srt 31KB
  86. subtitles/CR1 - 11 - 04 - PKCS 1 (23 min).srt 31KB
  87. subtitles/CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).srt 29KB
  88. subtitles/CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).srt 29KB
  89. subtitles/CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).srt 28KB
  90. subtitles/CR1 - 02 - 04 - Real-world stream ciphers (20 min).srt 28KB
  91. subtitles/CR1 - 10 - 05 - Intractable problems (19 min).srt 28KB
  92. subtitles/CR1 - 03 - 03 - Exhaustive search attacks (20 min).srt 27KB
  93. subtitles/CR1 - 11 - 05 - Is RSA a one-way function_ (17 min).srt 27KB
  94. subtitles/CR1 - 07 - 05 - Case study_ TLS (18 min).srt 26KB
  95. subtitles/CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).srt 26KB
  96. subtitles/CR1 - 01 - 03 - History of cryptography (19 min).srt 26KB
  97. subtitles/CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).srt 26KB
  98. subtitles/CR1 - 10 - 02 - Fermat and Euler (18 min).srt 26KB
  99. subtitles/CR1 - 01 - 02 - What is cryptography (15 min).srt 25KB
  100. subtitles/CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).srt 25KB
  101. subtitles/CR1 - 03 - 04 - More attacks on block ciphers (16 min).srt 25KB
  102. subtitles/CR1 - 03 - 01 - What are block ciphers_ (17 min).srt 25KB
  103. subtitles/CR1 - 04 - 04 - Modes of operation_ many time key (CBC) (16 min).srt 24KB
  104. subtitles/CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).srt 24KB
  105. subtitles/CR1 - 11 - 01 - Definitions and security (16 min).srt 24KB
  106. subtitles/CR1 - 02 - 06 - Semantic Security (16 min).srt 24KB
  107. subtitles/CR1 - 05 - 01 - Message Authentication Codes (16 min).srt 23KB
  108. subtitles/CR1 - 08 - 02 - Deterministic Encryption (15 min).srt 23KB
  109. subtitles/CR1 - 10 - 03 - Modular e'th roots (17 min).srt 23KB
  110. subtitles/CR1 - 08 - 04 - Tweakable encryption (15 min).srt 22KB
  111. subtitles/CR1 - 06 - 02 - Generic birthday attack (16 min).srt 22KB
  112. subtitles/CR1 - 12 - 02 - ElGamal Security (14 min).srt 22KB
  113. subtitles/CR1 - 08 - 01 - Key Derivation (14 min).srt 21KB
  114. subtitles/CR1 - 07 - 06 - CBC padding attacks (14 min).srt 21KB
  115. subtitles/CR1 - 11 - 06 - RSA in practice (14 min).srt 21KB
  116. subtitles/CR1 - 03 - 05 - The AES block cipher (14 min).srt 20KB
  117. subtitles/CR1 - 01 - 05 - Discrete probability (crash course, cont.) (14 min).srt 20KB
  118. subtitles/CR1 - 09 - 02 - Merkle Puzzles (11 min).srt 20KB
  119. subtitles/CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).srt 20KB
  120. subtitles/CR1 - 10 - 01 - Notation (15 min).srt 19KB
  121. subtitles/CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).srt 19KB
  122. subtitles/CR1 - 08 - 05 - Format preserving encryption (13 min).srt 19KB
  123. subtitles/CR1 - 10 - 04 - Arithmetic algorithms (13 min).srt 18KB
  124. subtitles/CR1 - 12 - 04 - A Unifying Theme (12 min).srt 18KB
  125. subtitles/CR1 - 03 - 06 - Block ciphers from PRGs(12 min).srt 17KB
  126. subtitles/CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).srt 17KB
  127. subtitles/CR1 - 09 - 01 - Trusted 3rd parties (11 min).srt 17KB
  128. subtitles/CR1 - 09 - 04 - Public-key encryption (11 min).srt 17KB
  129. subtitles/CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).srt 17KB
  130. subtitles/CR1 - 04 - 01 - Review_ PRPs and PRFs (12 min).srt 17KB
  131. subtitles/CR1 - 01 - 01 - Course Overview (11 min).srt 17KB
  132. subtitles/CR1 - 06 - 01 - Introduction (11 min).srt 17KB
  133. subtitles/CR1 - 11 - 02 - Constructions (11 min) .srt 17KB
  134. subtitles/CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].srt 16KB
  135. subtitles/CR1 - 05 - 02 - MACs Based On PRFs (10 min).srt 15KB
  136. subtitles/CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).srt 15KB
  137. subtitles/CR1 - 04 - 05 - Modes of operation_ many time key (CTR) (10 min).srt 14KB
  138. subtitles/CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).srt 13KB
  139. subtitles/CR1 - 05 - 04 - MAC padding (9 min).srt 13KB
  140. subtitles/CR1 - 06 - 04 - Constructing compression functions (8 min).srt 13KB
  141. subtitles/CR1 - 04 - 02 - Modes of operation_ one time key (8 min).srt 12KB
  142. subtitles/CR1 - 06 - 05 - HMAC (7 min).srt 10KB
  143. subtitles/CR1 - 12 - 05 - Farewell (for now) (6 min).srt 9KB
  144. subtitles/CR1 - 07 - 02 - Definitions (6 min).srt 8KB