Magnetic link has been copied to the cutting board

Name [Coursera] Cryptography I by Dan Boneh

File Type video

Size 1.14GB

UpdateDate 2024-7-3

hash *****957FFDB6687FCB4E919547F383A26A9CFB

Hot 1

Files A Computational Introduction to Number Theory and Algebra.pdf | 3.48MB Course Overview.pdf | 86.52KB cryptography.jpg | 3.20MB Final Exam.pdf | 1.62MB High School Mathematics Extensions - Discrete Probability.pdf | 271.82KB Syllabus.pdf | 83.54KB Week 1/1.1 - Course Overview.pdf | 307.34KB Week 1/1.1 - Course Overview.pptx | 293.19KB Week 1/1.1 - Course Overview.txt | 11.48KB Week 1/1.2 - What is cryptography.pdf | 866.09KB Week 1/1.2 - What is cryptography.pptx | 1.03MB Week 1/1.2 - What is cryptography.txt | 17.36KB Week 1/1.3 - History of cryptography.mp4 | 20.47MB Week 1/1.3 - History of cryptography.pdf | 1.39MB Week 1/1.3 - History of cryptography.pptx | 1.57MB Week 1/1.3 - History of cryptography.txt | 17.80KB Week 1/1.4 - Discrete probability (Crash course) (part 1).pdf | 532.22KB Week 1/1.4 - Discrete probability (Crash course) (part 1).pptx | 185.32KB Week 1/1.4 - Discrete probability (Crash course) (part 1).txt | 17.33KB Week 1/1.5 - Discrete probability (Crash course) (part 2).mp4 | 14.64MB Week 1/1.5 - Discrete probability (Crash course) (part 2).pdf | 473.11KB Week 1/1.5 - Discrete probability (Crash course) (part 2).pptx | 207.56KB Week 1/1.5 - Discrete probability (Crash course) (part 2).txt | 13.74KB Week 1/Lecture 01 - Introduction/1.1 - Course Overview.mp4 | 11.72MB Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pdf | 307.34KB Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pptx | 293.19KB Week 1/Lecture 01 - Introduction/1.1 - Course Overview.txt | 11.48KB Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.mp4 | 17.01MB Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pdf | 866.09KB Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pptx | 1.03MB Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.txt | 17.36KB Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.mp4 | 20.47MB Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pdf | 1.39MB Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pptx | 1.57MB Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.txt | 17.80KB Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).mp4 | 19.82MB Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pdf | 532.22KB Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pptx | 185.32KB Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).txt | 17.33KB Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).mp4 | 14.64MB Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pdf | 473.11KB Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pptx | 207.56KB Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).txt | 13.74KB Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pdf | 380.28KB Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pptx | 1.54MB Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pdf | 331.50KB Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pptx | 1.15MB Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pdf | 593.05KB Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pptx | 1.04MB Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pdf | 452.05KB Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pptx | 732.52KB Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pdf | 301.67KB Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pptx | 1.33MB Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pdf | 242.40KB Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pptx | 268.96KB Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pdf | 210.13KB Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pptx | 481.45KB Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 | 20.04MB Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).txt | 17.50KB Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 | 21.17MB Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt | 19.41KB Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 | 25.43MB Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt | 23.74KB Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).mp4 | 21.87MB Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).txt | 18.89KB Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).mp4 | 26.80MB Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).txt | 24.35KB Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).mp4 | 16.80MB Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).txt | 16.28KB Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 | 11.73MB Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].txt | 11.05KB Week 1/Week 1 - Problem Set.pdf | 1.19MB Week 1/Week 1 - Programming Assignment.pdf | 112.65KB Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pdf | 290.57KB Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pptx | 224.32KB Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pdf | 1.06MB Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pptx | 809.20KB Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pdf | 467.89KB Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pptx | 622.09KB Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pdf | 419.63KB Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pptx | 524.22KB Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pdf | 808.05KB Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pptx | 435.02KB Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pdf | 434.19KB Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pptx | 275.78KB Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).mp4 | 18.67MB Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).txt | 16.92KB Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).mp4 | 24.50MB Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).txt | 21.44KB Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).mp4 | 21.91MB Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).txt | 18.84KB Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).mp4 | 17.75MB Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).txt | 17.05KB Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).mp4 | 14.52MB Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).txt | 13.85KB Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).mp4 | 12.88MB Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).txt | 11.97KB Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pdf | 259.45KB Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pptx | 415.30KB Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pdf | 387.28KB Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pptx | 399.32KB Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pdf | 316.89KB Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pptx | 318.07KB Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pdf | 263.42KB Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pptx | 366.22KB Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pdf | 204.65KB Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pptx | 223.83KB Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).mp4 | 12.72MB Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).txt | 11.49KB Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).mp4 | 7.98MB Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).txt | 8.12KB Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).mp4 | 24.92MB Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).txt | 23.42KB Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).mp4 | 17.96MB Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).txt | 16.74KB Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).mp4 | 10.44MB Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).txt | 9.69KB Week 2/Week 2 - Problem Set.pdf | 198.24KB Week 2/Week 2 - Programming Assignment.pdf | 94.72KB Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pdf | 236.25KB Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pptx | 279.99KB Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pdf | 194.29KB Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pptx | 283.57KB Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pdf | 348.08KB Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pptx | 325.45KB Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pdf | 199.94KB Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pptx | 249.32KB Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pdf | 223.58KB Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pptx | 240.70KB Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).mp4 | 16.55MB Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).txt | 15.85KB Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).mp4 | 11.18MB Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).txt | 10.53KB Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).mp4 | 22.34MB Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).txt | 19.94KB Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).mp4 | 9.30MB Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).txt | 9.02KB Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 | 17.06MB Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt | 16.67KB Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pdf | 230.19KB Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pptx | 204.39KB Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pdf | 245.86KB Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pptx | 514.73KB Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf | 258.63KB Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx | 817.76KB Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pdf | 232.22KB Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pptx | 240.14KB Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf | 200.02KB Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx | 243.33KB Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf | 267.74KB Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx | 325.72KB Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).mp4 | 11.92MB Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).txt | 11.46KB Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).mp4 | 16.14MB Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).txt | 15.04KB Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 | 12.58MB Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt | 11.84KB Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).mp4 | 8.78MB Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).txt | 8.80KB Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).mp4 | 7.83MB Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).txt | 6.89KB Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).mp4 | 9.39MB Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).txt | 9.15KB Week 3/Week 3 - Problem Set.pdf | 1.10MB Week 3/Week 3 - Programming Assignment.pdf | 914.33KB Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pdf | 873.34KB Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pptx | 547.85KB Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pdf | 533.29KB Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pptx | 222.28KB Week 4/Lesson 07 - Authenticated Encryption/07.3-authenc-annotated.pptx | 261.90KB Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pdf | 685.97KB Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pptx | 246.32KB Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pdf | 672.57KB Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pptx | 351.07KB Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pdf | 715.66KB Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pptx | 380.94KB Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pdf | 461.98KB Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pptx | 237.26KB Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 | 14.02MB Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt | 13.36KB Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).mp4 | 5.61MB Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).txt | 5.68KB Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).mp4 | 13.04MB Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).txt | 12.79KB Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 | 22.84MB Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).txt | 20.95KB Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).mp4 | 18.96MB Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).txt | 18.07KB Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).mp4 | 14.99MB Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).txt | 14.56KB Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).mp4 | 11.09MB Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).txt | 10.23KB Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pdf | 328.66KB Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pptx | 205.82KB Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pdf | 449.21KB Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pptx | 264.10KB Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pdf | 515.40KB Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pptx | 512.96KB Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pdf | 550.71KB Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pptx | 449.88KB Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pdf | 375.59KB Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pptx | 239.28KB Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).mp4 | 14.57MB Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).txt | 14.64KB Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).mp4 | 15.62MB Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).txt | 15.75KB Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4 | 22.06MB Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).txt | 21.10KB Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).mp4 | 15.58MB Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).txt | 15.05KB Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).mp4 | 13.21MB Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).txt | 12.71KB Week 4/Week 4 - Problem Set.pdf | 150.57KB Week 4/Week 4 - programming project.pdf | 135.30KB Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pdf | 223.10KB Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pptx | 602.48KB Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pdf | 229.86KB Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pptx | 210.22KB Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pdf | 434.87KB Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pptx | 735.20KB Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pdf | 268.92KB Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pptx | 478.41KB Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).mp4 | 12.22MB Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).txt | 11.90KB Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).mp4 | 12.40MB Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).txt | 11.84KB Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 | 20.96MB Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).txt | 19.99KB Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).mp4 | 11.83MB Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).txt | 11.61KB Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).mp4 | 15.70MB Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).txt | 13.08KB Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).mp4 | 20.06MB Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).txt | 17.49KB Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.mp4 | 19.09MB Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.txt | 15.48KB Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).mp4 | 13.89MB Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).txt | 12.35KB Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).mp4 | 21.22MB Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).txt | 18.55KB Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pdf | 241.83KB Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pptx | 521.77KB Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pdf | 187.29KB Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pptx | 205.79KB Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pdf | 287.45KB Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pptx | 464.10KB Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pdf | 269.58KB Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pptx | 224.15KB Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pdf | 236.15KB Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pptx | 234.48KB Week 5/Week 5 - Problem Set.pdf | 118.92KB Week 5/Week 5 - Programming Assignment.pdf | 83.00KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).mp4 | 17.22MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).txt | 16.56KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .mp4 | 11.29MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .txt | 11.32KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).mp4 | 19.82MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).txt | 17.90KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).mp4 | 23.40MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).txt | 20.93KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).mp4 | 18.53MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).txt | 16.85KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).mp4 | 15.63MB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).txt | 14.01KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pdf | 549.58KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pptx | 351.32KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pdf | 211.62KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pptx | 186.90KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pdf | 239.02KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pptx | 199.52KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pdf | 264.40KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pptx | 204.47KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pdf | 166.27KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pptx | 181.70KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pdf | 184.75KB Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pptx | 185.20KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).mp4 | 21.36MB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).txt | 21.37KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).mp4 | 14.53MB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).txt | 14.74KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 | 11.27MB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).txt | 11.54KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).mp4 | 12.93MB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).txt | 12.17KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).mp4 | 5.73MB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).txt | 6.23KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pdf | 536.15KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pptx | 308.88KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pdf | 294.64KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pptx | 194.14KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pdf | 179.30KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pptx | 186.18KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pdf | 196.60KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pptx | 191.08KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pdf | 320.82KB Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pptx | 180.23KB Week 6/Week 6 - Problem Set.pdf | 148.26KB Week 6/Week 6 - Programming Assignment.pdf | 1.42MB

Recommend

Magnetic link has been copied to the cutting board