zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[Coursera] Cryptography I by Dan Boneh
magnet:?xt=urn:btih:9ed87957ffdb6687fcb4e919547f383a26a9cfba&dn=[Coursera] Cryptography I by Dan Boneh
磁力链接详情
Hash值:
9ed87957ffdb6687fcb4e919547f383a26a9cfba
点击数:
142
文件大小:
1.07 GB
文件数量:
68
创建日期:
2016-7-27 06:42
最后访问:
2024-10-24 01:25
访问标签:
Coursera
Cryptography
I
by
Dan
Boneh
文件列表详情
Week 1/1.3 - History of cryptography.mp4 20.47 MB
Week 1/1.5 - Discrete probability (Crash course) (part 2).mp4 14.64 MB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.mp4 11.72 MB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.mp4 17.01 MB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.mp4 20.47 MB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).mp4 19.82 MB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).mp4 14.64 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20.04 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.17 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).mp4 21.87 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).mp4 26.8 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).mp4 16.8 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 11.73 MB
Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).mp4 18.67 MB
Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).mp4 24.5 MB
Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).mp4 21.91 MB
Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).mp4 17.75 MB
Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).mp4 14.52 MB
Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).mp4 12.88 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).mp4 12.72 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).mp4 7.98 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).mp4 24.92 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).mp4 17.96 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).mp4 10.44 MB
Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).mp4 16.55 MB
Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).mp4 11.18 MB
Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.34 MB
Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).mp4 9.3 MB
Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06 MB
Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).mp4 11.92 MB
Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).mp4 16.14 MB
Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.58 MB
Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).mp4 8.78 MB
Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).mp4 7.83 MB
Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.39 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.02 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).mp4 5.61 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.04 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.84 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).mp4 18.96 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).mp4 14.99 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.09 MB
Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).mp4 14.57 MB
Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).mp4 15.62 MB
Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4 22.06 MB
Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).mp4 15.58 MB
Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).mp4 13.21 MB
Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).mp4 12.22 MB
Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).mp4 12.4 MB
Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96 MB
Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).mp4 11.83 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).mp4 15.7 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).mp4 20.06 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.mp4 19.09 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).mp4 13.89 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).mp4 21.22 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).mp4 17.22 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .mp4 11.29 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).mp4 23.4 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).mp4 18.53 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).mp4 15.63 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).mp4 21.36 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).mp4 14.53 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).mp4 12.93 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).mp4 5.73 MB
其他位置