BITCQ

Cryprography

Size: 1 GB
Magnet link

Name Size
Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4 26.8 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.4 MB
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4 24.9 MB
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4 24.5 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 23.4 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.8 MB
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.3 MB
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22.1 MB
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4 21.9 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4 21.9 MB
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 21.2 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.2 MB
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 21 MB
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).mp4 20.5 MB
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 20.1 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.8 MB
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).mp4 19.1 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).mp4 19 MB
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).mp4 18.7 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).mp4 18.5 MB
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 18 MB
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).mp4 17.5 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 17.2 MB
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.1 MB
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).mp4 17 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4 16.8 MB
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4 16.6 MB
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4 16.2 MB
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4 16.1 MB
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 15.7 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 15.6 MB
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 15.6 MB
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 15.6 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4 15 MB
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4 14.5 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14 MB
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 13.9 MB
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 13.2 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4 13 MB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 12.9 MB
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4 12.9 MB
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).mp4 12.7 MB
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.6 MB
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 12.4 MB
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 12.2 MB
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4 11.9 MB
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 11.8 MB
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).mp4 11.7 MB
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).mp4 11.7 MB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 11.3 MB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.3 MB
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4 11.2 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.1 MB
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10.4 MB
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.4 MB
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4 9.3 MB
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4 8.8 MB
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).mp4 8 MB
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4 7.8 MB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 5.7 MB
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4 5.6 MB
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 5.3 MB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 4.7 MB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 1.7 MB
Cryprography/1 Introduction (week 1)/01.3-intro-annotated.pptx 1.6 MB
Cryprography/2 Stream Ciphers (week 1)/02.1-stream-annotated.pptx 1.5 MB
Cryprography/1 Introduction (week 1)/01.3-intro-annotated.pdf 1.4 MB
Cryprography/2 Stream Ciphers (week 1)/02.5-stream-annotated.pptx 1.3 MB
Cryprography/2 Stream Ciphers (week 1)/02.2-stream-annotated.pptx 1.1 MB
Cryprography/3 Block Ciphers (week 2)/03.2-block-annotated.pdf 1.1 MB
Cryprography/2 Stream Ciphers (week 1)/02.3-stream-annotated.pptx 1 MB
Cryprography/1 Introduction (week 1)/01.2-intro-annotated.pptx 1 MB
Cryprography/7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf 873 KB
Cryprography/1 Introduction (week 1)/01.2-intro-annotated.pdf 866 KB
Cryprography/6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx 818 KB
Cryprography/3 Block Ciphers (week 2)/03.2-block-annotated.pptx 809 KB
Cryprography/3 Block Ciphers (week 2)/03.5-block-annotated.pdf 808 KB
Cryprography/9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx 735 KB
Cryprography/2 Stream Ciphers (week 1)/02.4-stream-annotated.pptx 733 KB
Cryprography/7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf 716 KB
Cryprography/7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf 686 KB
Cryprography/7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf 681 KB
Cryprography/7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf 673 KB
Cryprography/3 Block Ciphers (week 2)/03.3-block-annotated.pptx 622 KB
Cryprography/9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx 602 KB
Cryprography/2 Stream Ciphers (week 1)/02.3-stream-annotated.pdf 593 KB
Cryprography/8 Odds and ends (week 4)/08.4-odds-and-ends.pdf 551 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf 550 KB
Cryprography/7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pptx 548 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf 536 KB
Cryprography/7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf 533 KB
Cryprography/3 Block Ciphers (week 2)/03.4-block-annotated.pptx 524 KB
Cryprography/10 Intro. Number Theory (week 5)/10.1-numth-annotated.pptx 522 KB
Cryprography/8 Odds and ends (week 4)/08.3-odds-and-ends.pdf 515 KB
Cryprography/6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pptx 515 KB
Cryprography/8 Odds and ends (week 4)/08.3-odds-and-ends.pptx 513 KB
Cryprography/2 Stream Ciphers (week 1)/02.7-stream-annotated.pptx 481 KB
Cryprography/9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx 478 KB
Cryprography/3 Block Ciphers (week 2)/03.3-block-annotated.pdf 468 KB
Cryprography/10 Intro. Number Theory (week 5)/10.3-numth-annotated.pptx 464 KB
Cryprography/7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf 462 KB
Cryprography/2 Stream Ciphers (week 1)/02.4-stream-annotated.pdf 452 KB
Cryprography/8 Odds and ends (week 4)/08.4-odds-and-ends.pptx 450 KB
Cryprography/8 Odds and ends (week 4)/08.2-odds-and-ends.pdf 449 KB
Cryprography/3 Block Ciphers (week 2)/03.5-block-annotated.pptx 435 KB
Cryprography/9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf 435 KB
Cryprography/3 Block Ciphers (week 2)/03.6-block-annotated.pdf 434 KB
Cryprography/3 Block Ciphers (week 2)/03.4-block-annotated.pdf 420 KB
Cryprography/4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pptx 415 KB
Cryprography/1 Introduction (week 1)/01.4-intro-annotated.pptx 408 KB
Cryprography/4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pptx 399 KB
Cryprography/4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf 387 KB
Cryprography/7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pptx 381 KB
Cryprography/2 Stream Ciphers (week 1)/02.1-stream-annotated.pdf 380 KB
Cryprography/8 Odds and ends (week 4)/08.5-odds-and-ends.pdf 376 KB
Cryprography/4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pptx 366 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx 351 KB
Cryprography/7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pptx 351 KB
Cryprography/5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf 348 KB
Cryprography/2 Stream Ciphers (week 1)/02.2-stream-annotated.pdf 331 KB
Cryprography/8 Odds and ends (week 4)/08.1-odds-and-ends.pdf 329 KB
Cryprography/6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx 326 KB
Cryprography/5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pptx 325 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf 321 KB
Cryprography/4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pptx 318 KB
Cryprography/4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf 317 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx 309 KB
Cryprography/1 Introduction (week 1)/01.4-intro-annotated.pdf 308 KB
Cryprography/1 Introduction (week 1)/01.1-intro-annotated.pdf 307 KB
Cryprography/2 Stream Ciphers (week 1)/02.5-stream-annotated.pdf 302 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf 295 KB
Cryprography/1 Introduction (week 1)/01.1-intro-annotated.pptx 293 KB
Cryprography/3 Block Ciphers (week 2)/03.1-block-annotated.pdf 291 KB
Cryprography/10 Intro. Number Theory (week 5)/10.3-numth-annotated.pdf 287 KB
Cryprography/5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pptx 284 KB
Cryprography/5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pptx 280 KB
Cryprography/3 Block Ciphers (week 2)/03.6-block-annotated.pptx 276 KB
Cryprography/10 Intro. Number Theory (week 5)/10.4-numth-annotated.pdf 270 KB
Cryprography/2 Stream Ciphers (week 1)/02.6-stream-annotated.pptx 269 KB
Cryprography/9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf 269 KB
Cryprography/6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 268 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf 264 KB
Cryprography/8 Odds and ends (week 4)/08.2-odds-and-ends.pptx 264 KB
Cryprography/4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf 263 KB
Cryprography/7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pptx 262 KB
Cryprography/4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf 259 KB
Cryprography/6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 259 KB
Cryprography/5 Message Integrity (week 3)/05.4-integrity-mac-padding.pptx 249 KB
Cryprography/7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pptx 246 KB
Cryprography/6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf 246 KB
Cryprography/6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx 243 KB
Cryprography/2 Stream Ciphers (week 1)/02.6-stream-annotated.pdf 242 KB
Cryprography/10 Intro. Number Theory (week 5)/10.1-numth-annotated.pdf 242 KB
Cryprography/5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pptx 241 KB
Cryprography/6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pptx 240 KB
Cryprography/8 Odds and ends (week 4)/08.5-odds-and-ends.pptx 239 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf 239 KB
Cryprography/7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pptx 237 KB
Cryprography/5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf 236 KB
Cryprography/10 Intro. Number Theory (week 5)/10.5-numth-annotated.pdf 236 KB
Cryprography/10 Intro. Number Theory (week 5)/10.5-numth-annotated.pptx 234 KB
Cryprography/6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf 232 KB
Cryprography/6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf 230 KB
Cryprography/9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf 230 KB
Cryprography/3 Block Ciphers (week 2)/03.1-block-annotated.pptx 224 KB
Cryprography/10 Intro. Number Theory (week 5)/10.4-numth-annotated.pptx 224 KB
Cryprography/4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pptx 224 KB
Cryprography/5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf 224 KB
Cryprography/9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf 223 KB
Cryprography/7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pptx 222 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf 212 KB
Cryprography/9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx 210 KB
Cryprography/2 Stream Ciphers (week 1)/02.7-stream-annotated.pdf 210 KB
Cryprography/8 Odds and ends (week 4)/08.1-odds-and-ends.pptx 206 KB
Cryprography/10 Intro. Number Theory (week 5)/10.2-numth-annotated.pptx 206 KB
Cryprography/4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf 205 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx 204 KB
Cryprography/6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pptx 204 KB
Cryprography/6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 200 KB
Cryprography/5 Message Integrity (week 3)/05.4-integrity-mac-padding.pdf 200 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx 200 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf 197 KB
Cryprography/5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf 194 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx 194 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx 191 KB
Cryprography/10 Intro. Number Theory (week 5)/10.2-numth-annotated.pdf 187 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx 187 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx 186 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx 185 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf 185 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx 182 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx 180 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf 179 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf 166 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).srt 37 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).srt 36 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 35 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).srt 34 KB
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).srt 31 KB
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 31 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).srt 31 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).srt 31 KB
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).srt 29 KB
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).srt 29 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).srt 28 KB
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).srt 27 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).srt 27 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).srt 26 KB
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).srt 26 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).srt 26 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).srt 26 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).srt 26 KB
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).srt 25 KB
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).srt 25 KB
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).srt 25 KB
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).txt 24 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).srt 24 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).srt 24 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt 24 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).txt 23 KB
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).srt 23 KB
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).srt 23 KB
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).srt 23 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).srt 23 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 23 KB
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).srt 22 KB
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).srt 22 KB
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).srt 22 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).srt 22 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).txt 21 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).srt 21 KB
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).txt 21 KB
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt 21 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).txt 21 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).txt 21 KB
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).srt 20 KB
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).txt 20 KB
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).txt 20 KB
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).srt 20 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 20 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt 19 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).srt 19 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).txt 19 KB
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).txt 19 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).srt 19 KB
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).srt 19 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).txt 18 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).txt 18 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).srt 18 KB
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).txt 18 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).txt 18 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).srt 18 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).txt 18 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).txt 18 KB
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 18 KB
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).srt 17 KB
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).txt 17 KB
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).srt 17 KB
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).txt 17 KB
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).srt 17 KB
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).txt 17 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).srt 17 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).srt 17 KB
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).srt 17 KB
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).srt 17 KB
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt 17 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).txt 17 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .srt 16 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).txt 16 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).srt 16 KB
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).txt 16 KB
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).txt 16 KB
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).txt 16 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).txt 15 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt 15 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).srt 15 KB
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).srt 15 KB
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).txt 15 KB
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).txt 15 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).srt 15 KB
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).txt 15 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).txt 15 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).txt 15 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14 KB
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).txt 14 KB
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).srt 13 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt 13 KB
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).srt 13 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).txt 13 KB
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).srt 13 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).txt 13 KB
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).txt 13 KB
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).txt 12 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).txt 12 KB
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt 12 KB
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).txt 12 KB
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).txt 12 KB
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).txt 12 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).srt 12 KB
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).txt 12 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).txt 12 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).txt 12 KB
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).txt 11 KB
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).txt 11 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .txt 11 KB
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).txt 11 KB
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).txt 11 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).txt 10 KB
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).srt 10 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt 10 KB
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).txt 9 KB
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).txt 9 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).srt 9 KB
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).txt 9 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).txt 8 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).srt 8 KB
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).txt 8 KB
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).txt 7 KB
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).txt 6 KB
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).txt 6 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).srt 4 KB
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).txt 2 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
Cryprography Video 1 GB 17

Loading...