Coursera-Crypto-I - TorrentBank

File Name:Coursera-Crypto-I

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:1078.09 MB

File Count:144

File Hash:f4ab697152d5fb3a9c9edf241871a46aa6e1c7c7

Magnet Link:

Magnet Link:

Torrent File:

CR1 - 01 - 01 - Course Overview (11 min).mp4 11.72 MB
CR1 - 01 - 02 - What is cryptography (15 min).mp4 17.01 MB
CR1 - 01 - 03 - History of cryptography (19 min).mp4 20.47 MB
CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp4 19.82 MB
CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp4 14.64 MB
CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp4 20.04 MB
CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp4 21.17 MB
CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43 MB
CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp4 21.87 MB
CR1 - 02 - 05 - PRG Security Definitions (25 min).mp4 26.80 MB
CR1 - 02 - 06 - Semantic Security (16 min).mp4 16.80 MB
CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].mp4 11.73 MB
CR1 - 03 - 01 - What are block ciphers (17 min).mp4 18.67 MB
CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp4 24.50 MB
CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp4 21.91 MB
CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp4 17.75 MB
CR1 - 03 - 05 - The AES block cipher (14 min).mp4 14.52 MB
CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp4 12.88 MB
CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp4 12.72 MB
CR1 - 04 - 02 - Modes of operation one time key (8 min).mp4 7.98 MB
CR1 - 04 - 03 - Security for many-time key (23 min).mp4 24.92 MB
CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp4 17.96 MB
CR1 - 04 - 05 - Modes of operation many time key (CTR) (10 min).mp4 10.44 MB
CR1 - 05 - 01 - Message Authentication Codes (16 min).mp4 16.55 MB
CR1 - 05 - 02 - MACs Based On PRFs (10 min).mp4 11.18 MB
CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp4 22.34 MB
CR1 - 05 - 04 - MAC padding (9 min).mp4 9.30 MB
CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06 MB
CR1 - 06 - 01 - Introduction (11 min).mp4 11.92 MB
CR1 - 06 - 02 - Generic birthday attack (16 min).mp4 16.14 MB
CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp4 12.58 MB
CR1 - 06 - 04 - Constructing compression functions (8 min).mp4 8.78 MB
CR1 - 06 - 05 - HMAC (7 min).mp4 7.83 MB
CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).mp4 9.39 MB
CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp4 14.02 MB
CR1 - 07 - 02 - Definitions (6 min).mp4 5.61 MB
CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp4 13.04 MB
CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp4 22.84 MB
CR1 - 07 - 05 - Case study TLS (18 min).mp4 18.96 MB
CR1 - 07 - 06 - CBC padding attacks (14 min).mp4 14.99 MB
CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp4 11.09 MB
CR1 - 08 - 01 - Key Derivation (14 min).mp4 14.57 MB
CR1 - 08 - 02 - Deterministic Encryption (15 min).mp4 15.62 MB
CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 22.06 MB
CR1 - 08 - 04 - Tweakable encryption (15 min).mp4 15.58 MB
CR1 - 08 - 05 - Format preserving encryption (13 min).mp4 13.21 MB
CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp4 12.22 MB
CR1 - 09 - 02 - Merkle Puzzles (11 min).mp4 12.40 MB
CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp4 20.96 MB
CR1 - 09 - 04 - Public-key encryption (11 min).mp4 11.83 MB
CR1 - 10 - 01 - Notation (15 min).mp4 15.70 MB
CR1 - 10 - 02 - Fermat and Euler (18 min).mp4 20.06 MB
CR1 - 10 - 03 - Modular eth roots (17 min).mp4 19.09 MB
CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp4 13.89 MB
CR1 - 10 - 05 - Intractable problems (19 min).mp4 21.22 MB
CR1 - 11 - 01 - Definitions and security (16 min).mp4 17.22 MB
CR1 - 11 - 02 - Constructions (11 min) .mp4 11.29 MB
CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp4 19.82 MB
CR1 - 11 - 04 - PKCS 1 (23 min).mp4 23.40 MB
CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp4 18.53 MB
CR1 - 11 - 06 - RSA in practice (14 min).mp4 15.63 MB
CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp4 21.36 MB
CR1 - 12 - 02 - ElGamal Security (14 min).mp4 14.53 MB
CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).mp4 11.27 MB
CR1 - 12 - 04 - A Unifying Theme (12 min).mp4 12.93 MB
CR1 - 12 - 05 - Farewell (for now) (6 min).mp4 5.73 MB
slides/01-intro-v2-annotated.pdf 2.70 MB
slides/02-stream-v2-annotated.pdf 6.64 MB
slides/03-block-v2-annotated.pdf 2.82 MB
slides/04-using-block-v2-annotated.pdf 909.19 KB
slides/05-integrity-v2-annotated.pdf 690.20 KB
slides/06-collision-resistance-v2-annotated.pdf 830.64 KB
slides/07-authenc-v2-annotated.pdf 1.54 MB
slides/08-odds-and-ends-v2-annotated.pdf 1.63 MB
slides/09-basic-key-exchange-annotated.pdf 804.43 KB
slides/10-numth-annotated.pdf 722.47 KB
slides/11-pubkey-trapdoor-annotated.pdf 1023.42 KB
slides/12-pubkey-dh-annotated.pdf 1.02 MB
subtitles/CR1 - 01 - 01 - Course Overview (11 min).srt 16.76 KB
subtitles/CR1 - 01 - 02 - What is cryptography (15 min).srt 25.42 KB
subtitles/CR1 - 01 - 03 - History of cryptography (19 min).srt 26.08 KB
subtitles/CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).srt 25.35 KB
subtitles/CR1 - 01 - 05 - Discrete probability (crash course, cont.) (14 min).srt 20.02 KB
subtitles/CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).srt 25.63 KB
subtitles/CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).srt 28.40 KB
subtitles/CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).srt 34.80 KB
subtitles/CR1 - 02 - 04 - Real-world stream ciphers (20 min).srt 27.69 KB
subtitles/CR1 - 02 - 05 - PRG Security Definitions (25 min).srt 35.79 KB
subtitles/CR1 - 02 - 06 - Semantic Security (16 min).srt 23.97 KB
subtitles/CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].srt 16.21 KB
subtitles/CR1 - 03 - 01 - What are block ciphers_ (17 min).srt 24.94 KB
subtitles/CR1 - 03 - 02 - The Data Encryption Standard (22 min).srt 31.32 KB
subtitles/CR1 - 03 - 03 - Exhaustive search attacks (20 min).srt 27.31 KB
subtitles/CR1 - 03 - 04 - More attacks on block ciphers (16 min).srt 25.03 KB
subtitles/CR1 - 03 - 05 - The AES block cipher (14 min).srt 20.24 KB
subtitles/CR1 - 03 - 06 - Block ciphers from PRGs(12 min).srt 17.47 KB
subtitles/CR1 - 04 - 01 - Review_ PRPs and PRFs (12 min).srt 16.80 KB
subtitles/CR1 - 04 - 02 - Modes of operation_ one time key (8 min).srt 11.84 KB
subtitles/CR1 - 04 - 03 - Security for many-time key (23 min).srt 34.34 KB
subtitles/CR1 - 04 - 04 - Modes of operation_ many time key (CBC) (16 min).srt 24.42 KB
subtitles/CR1 - 04 - 05 - Modes of operation_ many time key (CTR) (10 min).srt 14.15 KB
subtitles/CR1 - 05 - 01 - Message Authentication Codes (16 min).srt 23.43 KB
subtitles/CR1 - 05 - 02 - MACs Based On PRFs (10 min).srt 15.36 KB
subtitles/CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).srt 29.15 KB
subtitles/CR1 - 05 - 04 - MAC padding (9 min).srt 13.19 KB
subtitles/CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36 KB
subtitles/CR1 - 06 - 01 - Introduction (11 min).srt 16.70 KB
subtitles/CR1 - 06 - 02 - Generic birthday attack (16 min).srt 21.99 KB
subtitles/CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).srt 17.34 KB
subtitles/CR1 - 06 - 04 - Constructing compression functions (8 min).srt 12.89 KB
subtitles/CR1 - 06 - 05 - HMAC (7 min).srt 10.06 KB
subtitles/CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).srt 13.35 KB
subtitles/CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).srt 19.52 KB
subtitles/CR1 - 07 - 02 - Definitions (6 min).srt 8.27 KB
subtitles/CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).srt 18.70 KB
subtitles/CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).srt 30.67 KB
subtitles/CR1 - 07 - 05 - Case study_ TLS (18 min).srt 26.38 KB
subtitles/CR1 - 07 - 06 - CBC padding attacks (14 min).srt 21.21 KB
subtitles/CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).srt 14.91 KB
subtitles/CR1 - 08 - 01 - Key Derivation (14 min).srt 21.44 KB
subtitles/CR1 - 08 - 02 - Deterministic Encryption (15 min).srt 22.99 KB
subtitles/CR1 - 08 - 03 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.87 KB
subtitles/CR1 - 08 - 04 - Tweakable encryption (15 min).srt 22.03 KB
subtitles/CR1 - 08 - 05 - Format preserving encryption (13 min).srt 18.54 KB
subtitles/CR1 - 09 - 01 - Trusted 3rd parties (11 min).srt 17.33 KB
subtitles/CR1 - 09 - 02 - Merkle Puzzles (11 min).srt 19.67 KB
subtitles/CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).srt 29.20 KB
subtitles/CR1 - 09 - 04 - Public-key encryption (11 min).srt 16.95 KB
subtitles/CR1 - 10 - 01 - Notation (15 min).srt 19.28 KB
subtitles/CR1 - 10 - 02 - Fermat and Euler (18 min).srt 25.59 KB
subtitles/CR1 - 10 - 03 - Modular e'th roots (17 min).srt 22.91 KB
subtitles/CR1 - 10 - 04 - Arithmetic algorithms (13 min).srt 18.07 KB
subtitles/CR1 - 10 - 05 - Intractable problems (19 min).srt 27.61 KB
subtitles/CR1 - 11 - 01 - Definitions and security (16 min).srt 24.21 KB
subtitles/CR1 - 11 - 02 - Constructions (11 min) .srt 16.52 KB
subtitles/CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).srt 26.14 KB
subtitles/CR1 - 11 - 04 - PKCS 1 (23 min).srt 30.62 KB
subtitles/CR1 - 11 - 05 - Is RSA a one-way function_ (17 min).srt 26.84 KB
subtitles/CR1 - 11 - 06 - RSA in practice (14 min).srt 20.95 KB
subtitles/CR1 - 12 - 01 - The ElGamal Public-key System (23 min).srt 37.11 KB
subtitles/CR1 - 12 - 02 - ElGamal Security (14 min).srt 21.57 KB
subtitles/CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).srt 16.81 KB
subtitles/CR1 - 12 - 04 - A Unifying Theme (12 min).srt 17.78 KB
subtitles/CR1 - 12 - 05 - Farewell (for now) (6 min).srt 9.04 KB
udp://tracker.openbittorrent.com:80
udp://tracker.publicbt.com:80
udp://tracker.istole.it:6969
udp://tracker.ccc.de:80
udp://open.demonii.com:1337

TorrentBank
Copyright © 2024