Coursera-Crypto-I
File Information:
- Magnet Link:Magnet Link
- File Size:1.05 GB
- Creat Time:2014-11-28
- Active Degree:693
- Last Active:2024-09-22
- File Tags:Coursera Crypto I
- Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List:
- CR1 - 02 - 05 - PRG Security Definitions (25 min).mp4 26.80 MB
- CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43 MB
- CR1 - 04 - 03 - Security for many-time key (23 min).mp4 24.92 MB
- CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp4 24.50 MB
- CR1 - 11 - 04 - PKCS 1 (23 min).mp4 23.40 MB
- CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp4 22.84 MB
- CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp4 22.34 MB
- CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 22.06 MB
- CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp4 21.91 MB
- CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp4 21.87 MB
- CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp4 21.36 MB
- CR1 - 10 - 05 - Intractable problems (19 min).mp4 21.22 MB
- CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp4 21.17 MB
- CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp4 20.96 MB
- CR1 - 01 - 03 - History of cryptography (19 min).mp4 20.47 MB
- CR1 - 10 - 02 - Fermat and Euler (18 min).mp4 20.06 MB
- CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp4 20.04 MB
- CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp4 19.82 MB
- CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp4 19.82 MB
- CR1 - 10 - 03 - Modular eth roots (17 min).mp4 19.09 MB
- CR1 - 07 - 05 - Case study TLS (18 min).mp4 18.96 MB
- CR1 - 03 - 01 - What are block ciphers (17 min).mp4 18.67 MB
- CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp4 18.53 MB
- CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp4 17.96 MB
- CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp4 17.75 MB
- CR1 - 11 - 01 - Definitions and security (16 min).mp4 17.22 MB
- CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06 MB
- CR1 - 01 - 02 - What is cryptography (15 min).mp4 17.01 MB
- CR1 - 02 - 06 - Semantic Security (16 min).mp4 16.80 MB
- CR1 - 05 - 01 - Message Authentication Codes (16 min).mp4 16.55 MB
- CR1 - 06 - 02 - Generic birthday attack (16 min).mp4 16.14 MB
- CR1 - 10 - 01 - Notation (15 min).mp4 15.71 MB
- CR1 - 11 - 06 - RSA in practice (14 min).mp4 15.63 MB
- CR1 - 08 - 02 - Deterministic Encryption (15 min).mp4 15.62 MB
- CR1 - 08 - 04 - Tweakable encryption (15 min).mp4 15.58 MB
- CR1 - 07 - 06 - CBC padding attacks (14 min).mp4 14.99 MB
- CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp4 14.64 MB
- CR1 - 08 - 01 - Key Derivation (14 min).mp4 14.57 MB
- CR1 - 12 - 02 - ElGamal Security (14 min).mp4 14.53 MB
- CR1 - 03 - 05 - The AES block cipher (14 min).mp4 14.52 MB
- CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp4 14.02 MB
- CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp4 13.89 MB
- CR1 - 08 - 05 - Format preserving encryption (13 min).mp4 13.21 MB
- CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp4 13.04 MB
- CR1 - 12 - 04 - A Unifying Theme (12 min).mp4 12.93 MB
- CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp4 12.88 MB
- CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp4 12.72 MB
- CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp4 12.58 MB
- CR1 - 09 - 02 - Merkle Puzzles (11 min).mp4 12.41 MB
- CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp4 12.22 MB
Coursera-Crypto-I
Hot Tags: