Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4 |
26.8 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 |
25.4 MB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4 |
24.9 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4 |
24.5 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 |
23.4 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 |
22.8 MB |
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4 |
22.3 MB |
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 |
22.1 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4 |
21.9 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4 |
21.9 MB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 |
21.2 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 |
21.2 MB |
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 |
21 MB |
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).mp4 |
20.5 MB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 |
20.1 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 |
20 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 |
19.8 MB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).mp4 |
19.1 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).mp4 |
19 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).mp4 |
18.7 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).mp4 |
18.5 MB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 |
18 MB |
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).mp4 |
17.5 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 |
17.2 MB |
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 |
17.1 MB |
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).mp4 |
17 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4 |
16.8 MB |
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4 |
16.6 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4 |
16.2 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4 |
16.1 MB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 |
15.7 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 |
15.6 MB |
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 |
15.6 MB |
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 |
15.6 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4 |
15 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4 |
14.5 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 |
14 MB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 |
13.9 MB |
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 |
13.2 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4 |
13 MB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 |
12.9 MB |
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4 |
12.9 MB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).mp4 |
12.7 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 |
12.6 MB |
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 |
12.4 MB |
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 |
12.2 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4 |
11.9 MB |
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 |
11.8 MB |
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).mp4 |
11.7 MB |
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).mp4 |
11.7 MB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 |
11.3 MB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 |
11.3 MB |
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4 |
11.2 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4 |
11.1 MB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 |
10.4 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4 |
9.4 MB |
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4 |
9.3 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4 |
8.8 MB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).mp4 |
8 MB |
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4 |
7.8 MB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 |
5.7 MB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4 |
5.6 MB |
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 |
5.3 MB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 |
4.7 MB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 |
1.7 MB |
Cryprography/1 Introduction (week 1)/01.3-intro-annotated.pptx |
1.6 MB |
Cryprography/2 Stream Ciphers (week 1)/02.1-stream-annotated.pptx |
1.5 MB |
Cryprography/1 Introduction (week 1)/01.3-intro-annotated.pdf |
1.4 MB |
Cryprography/2 Stream Ciphers (week 1)/02.5-stream-annotated.pptx |
1.3 MB |
Cryprography/2 Stream Ciphers (week 1)/02.2-stream-annotated.pptx |
1.1 MB |
Cryprography/3 Block Ciphers (week 2)/03.2-block-annotated.pdf |
1.1 MB |
Cryprography/2 Stream Ciphers (week 1)/02.3-stream-annotated.pptx |
1 MB |
Cryprography/1 Introduction (week 1)/01.2-intro-annotated.pptx |
1 MB |
Cryprography/7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf |
873 KB |
Cryprography/1 Introduction (week 1)/01.2-intro-annotated.pdf |
866 KB |
Cryprography/6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx |
818 KB |
Cryprography/3 Block Ciphers (week 2)/03.2-block-annotated.pptx |
809 KB |
Cryprography/3 Block Ciphers (week 2)/03.5-block-annotated.pdf |
808 KB |
Cryprography/9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pptx |
735 KB |
Cryprography/2 Stream Ciphers (week 1)/02.4-stream-annotated.pptx |
733 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf |
716 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf |
686 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf |
681 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf |
673 KB |
Cryprography/3 Block Ciphers (week 2)/03.3-block-annotated.pptx |
622 KB |
Cryprography/9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pptx |
602 KB |
Cryprography/2 Stream Ciphers (week 1)/02.3-stream-annotated.pdf |
593 KB |
Cryprography/8 Odds and ends (week 4)/08.4-odds-and-ends.pdf |
551 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf |
550 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.1-authenc-annotated.pptx |
548 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf |
536 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf |
533 KB |
Cryprography/3 Block Ciphers (week 2)/03.4-block-annotated.pptx |
524 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.1-numth-annotated.pptx |
522 KB |
Cryprography/8 Odds and ends (week 4)/08.3-odds-and-ends.pdf |
515 KB |
Cryprography/6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pptx |
515 KB |
Cryprography/8 Odds and ends (week 4)/08.3-odds-and-ends.pptx |
513 KB |
Cryprography/2 Stream Ciphers (week 1)/02.7-stream-annotated.pptx |
481 KB |
Cryprography/9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pptx |
478 KB |
Cryprography/3 Block Ciphers (week 2)/03.3-block-annotated.pdf |
468 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.3-numth-annotated.pptx |
464 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf |
462 KB |
Cryprography/2 Stream Ciphers (week 1)/02.4-stream-annotated.pdf |
452 KB |
Cryprography/8 Odds and ends (week 4)/08.4-odds-and-ends.pptx |
450 KB |
Cryprography/8 Odds and ends (week 4)/08.2-odds-and-ends.pdf |
449 KB |
Cryprography/3 Block Ciphers (week 2)/03.5-block-annotated.pptx |
435 KB |
Cryprography/9 Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf |
435 KB |
Cryprography/3 Block Ciphers (week 2)/03.6-block-annotated.pdf |
434 KB |
Cryprography/3 Block Ciphers (week 2)/03.4-block-annotated.pdf |
420 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pptx |
415 KB |
Cryprography/1 Introduction (week 1)/01.4-intro-annotated.pptx |
408 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pptx |
399 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf |
387 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.6-authenc-annotated.pptx |
381 KB |
Cryprography/2 Stream Ciphers (week 1)/02.1-stream-annotated.pdf |
380 KB |
Cryprography/8 Odds and ends (week 4)/08.5-odds-and-ends.pdf |
376 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pptx |
366 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pptx |
351 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.5-authenc-annotated.pptx |
351 KB |
Cryprography/5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf |
348 KB |
Cryprography/2 Stream Ciphers (week 1)/02.2-stream-annotated.pdf |
331 KB |
Cryprography/8 Odds and ends (week 4)/08.1-odds-and-ends.pdf |
329 KB |
Cryprography/6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx |
326 KB |
Cryprography/5 Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pptx |
325 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf |
321 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pptx |
318 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf |
317 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pptx |
309 KB |
Cryprography/1 Introduction (week 1)/01.4-intro-annotated.pdf |
308 KB |
Cryprography/1 Introduction (week 1)/01.1-intro-annotated.pdf |
307 KB |
Cryprography/2 Stream Ciphers (week 1)/02.5-stream-annotated.pdf |
302 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf |
295 KB |
Cryprography/1 Introduction (week 1)/01.1-intro-annotated.pptx |
293 KB |
Cryprography/3 Block Ciphers (week 2)/03.1-block-annotated.pdf |
291 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.3-numth-annotated.pdf |
287 KB |
Cryprography/5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pptx |
284 KB |
Cryprography/5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pptx |
280 KB |
Cryprography/3 Block Ciphers (week 2)/03.6-block-annotated.pptx |
276 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.4-numth-annotated.pdf |
270 KB |
Cryprography/2 Stream Ciphers (week 1)/02.6-stream-annotated.pptx |
269 KB |
Cryprography/9 Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf |
269 KB |
Cryprography/6 Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf |
268 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf |
264 KB |
Cryprography/8 Odds and ends (week 4)/08.2-odds-and-ends.pptx |
264 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf |
263 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.3-authenc-annotated.pptx |
262 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf |
259 KB |
Cryprography/6 Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf |
259 KB |
Cryprography/5 Message Integrity (week 3)/05.4-integrity-mac-padding.pptx |
249 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.4-authenc-annotated.pptx |
246 KB |
Cryprography/6 Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf |
246 KB |
Cryprography/6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx |
243 KB |
Cryprography/2 Stream Ciphers (week 1)/02.6-stream-annotated.pdf |
242 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.1-numth-annotated.pdf |
242 KB |
Cryprography/5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pptx |
241 KB |
Cryprography/6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pptx |
240 KB |
Cryprography/8 Odds and ends (week 4)/08.5-odds-and-ends.pptx |
239 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf |
239 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.7-authenc-annotated.pptx |
237 KB |
Cryprography/5 Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf |
236 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.5-numth-annotated.pdf |
236 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.5-numth-annotated.pptx |
234 KB |
Cryprography/6 Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf |
232 KB |
Cryprography/6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf |
230 KB |
Cryprography/9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf |
230 KB |
Cryprography/3 Block Ciphers (week 2)/03.1-block-annotated.pptx |
224 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.4-numth-annotated.pptx |
224 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pptx |
224 KB |
Cryprography/5 Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf |
224 KB |
Cryprography/9 Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf |
223 KB |
Cryprography/7 Authenticated Encryption (week 4)/07.2-authenc-annotated.pptx |
222 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf |
212 KB |
Cryprography/9 Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pptx |
210 KB |
Cryprography/2 Stream Ciphers (week 1)/02.7-stream-annotated.pdf |
210 KB |
Cryprography/8 Odds and ends (week 4)/08.1-odds-and-ends.pptx |
206 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.2-numth-annotated.pptx |
206 KB |
Cryprography/4 Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf |
205 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pptx |
204 KB |
Cryprography/6 Collision Resistance (week 3)/06.1-collision-resistance-introduction.pptx |
204 KB |
Cryprography/6 Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf |
200 KB |
Cryprography/5 Message Integrity (week 3)/05.4-integrity-mac-padding.pdf |
200 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pptx |
200 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf |
197 KB |
Cryprography/5 Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf |
194 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pptx |
194 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pptx |
191 KB |
Cryprography/10 Intro. Number Theory (week 5)/10.2-numth-annotated.pdf |
187 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pptx |
187 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pptx |
186 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pptx |
185 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf |
185 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pptx |
182 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pptx |
180 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf |
179 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf |
166 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).srt |
37 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).srt |
36 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt |
35 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).srt |
34 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).srt |
31 KB |
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt |
31 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).srt |
31 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).srt |
31 KB |
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).srt |
29 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).srt |
29 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).srt |
28 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).srt |
28 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).srt |
27 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).srt |
27 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).srt |
26 KB |
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).srt |
26 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).srt |
26 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).srt |
26 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).srt |
26 KB |
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).srt |
25 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).srt |
25 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).srt |
25 KB |
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt |
24 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).txt |
24 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).srt |
24 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).srt |
24 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt |
24 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).txt |
23 KB |
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).srt |
23 KB |
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).srt |
23 KB |
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).srt |
23 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).srt |
23 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt |
23 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).srt |
22 KB |
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).srt |
22 KB |
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).srt |
22 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).srt |
22 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).txt |
21 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).srt |
21 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).txt |
21 KB |
Cryprography/8 Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).txt |
21 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).txt |
21 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).txt |
21 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).srt |
20 KB |
Cryprography/5 Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).txt |
20 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).txt |
20 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).srt |
20 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).srt |
20 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt |
19 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).srt |
19 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).txt |
19 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).txt |
19 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).srt |
19 KB |
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).srt |
19 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).txt |
18 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).txt |
18 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).srt |
18 KB |
Cryprography/1 Introduction (week 1)/1 - 3 - History of cryptography (19 min).txt |
18 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).txt |
18 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).srt |
18 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).txt |
18 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).txt |
18 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).srt |
18 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).srt |
17 KB |
Cryprography/1 Introduction (week 1)/1 - 2 - What is cryptography_ (15 min).txt |
17 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).srt |
17 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).txt |
17 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).srt |
17 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).txt |
17 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).srt |
17 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).srt |
17 KB |
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).srt |
17 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).srt |
17 KB |
Cryprography/5 Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt |
17 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).txt |
17 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .srt |
16 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).txt |
16 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).srt |
16 KB |
Cryprography/5 Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).txt |
16 KB |
Cryprography/8 Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).txt |
16 KB |
Cryprography/1 Introduction (week 1)/1 - 4 - Discrete probability (16 min).txt |
16 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).txt |
15 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).txt |
15 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).srt |
15 KB |
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).srt |
15 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).txt |
15 KB |
Cryprography/8 Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).txt |
15 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).srt |
15 KB |
Cryprography/8 Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).txt |
15 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).txt |
15 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).txt |
15 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt |
14 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).txt |
14 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).srt |
13 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt |
13 KB |
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).srt |
13 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).txt |
13 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).srt |
13 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).txt |
13 KB |
Cryprography/8 Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).txt |
13 KB |
Cryprography/10 Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).txt |
12 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).txt |
12 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt |
12 KB |
Cryprography/3 Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).txt |
12 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).txt |
12 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).txt |
12 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).srt |
12 KB |
Cryprography/9 Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).txt |
12 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).txt |
12 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).txt |
12 KB |
Cryprography/1 Introduction (week 1)/1 - 1 - Course Overview (11 min).txt |
11 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 1 - Introduction (11 min).txt |
11 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .txt |
11 KB |
Cryprography/2 Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).txt |
11 KB |
Cryprography/5 Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).txt |
11 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).txt |
10 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).srt |
10 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).txt |
10 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).txt |
9 KB |
Cryprography/5 Message Integrity (week 3)/5 - 4 - MAC padding (9 min).txt |
9 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).srt |
9 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).txt |
9 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).txt |
8 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).srt |
8 KB |
Cryprography/4 Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).txt |
8 KB |
Cryprography/6 Collision Resistance (week 3)/6 - 5 - HMAC (7 min).txt |
7 KB |
Cryprography/12 Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).txt |
6 KB |
Cryprography/7 Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).txt |
6 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).srt |
4 KB |
Cryprography/11 Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).txt |
2 KB |