种子简介
种子名称:
[Coursera] Cryptrography I
文件类型:
文件数目:
67个文件
文件大小:
1.05 GB
收录时间:
2015-3-13 09:13
已经下载:
3次
资源热度:
85
最近下载:
2024-11-1 09:10
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:CD8347690D4517CF6F98D9AA7096F37CFDB3582F&dn=[Coursera] Cryptrography I
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[Coursera] Cryptrography I.torrent
2 - 5 - PRG Security Definitions (25 min).mp426.8MB
2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
4 - 3 - Security for many-time key (23 min).mp424.92MB
3 - 2 - The Data Encryption Standard (22 min).mp424.5MB
11 - 4 - PKCS 1 (23 min).mp423.4MB
7 - 4 - Constructions from ciphers and MACs (21 min).mp422.84MB
5 - 3 - CBC-MAC and NMAC (20 min).mp422.34MB
8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp422.06MB
3 - 3 - Exhaustive search attacks (20 min).mp421.91MB
2 - 4 - Real-world stream ciphers (20 min).mp421.87MB
12 - 1 - The ElGamal Public-key System (23 min).mp421.36MB
10 - 5 - Intractable problems (19 min).mp421.22MB
2 - 2 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
9 - 3 - The Diffie-Hellman protocol (19 min).mp420.96MB
1 - 3 - History of cryptography (19 min).mp420.47MB
10 - 2 - Fermat and Euler (18 min).mp420.06MB
2 - 1 - Information theoretic security and the one time pad (19 min).mp420.04MB
1 - 4 - Discrete probability (Crash course) (18 min).mp419.82MB
11 - 3 - The RSA trapdoor permutation (18 min).mp419.82MB
10 - 3 - Modular e'th roots (17 min)14.mp419.09MB
10 - 3 - Modular e_'th roots (17 min)14.mp419.09MB
7 - 5 - Case study_ TLS (18 min).mp418.96MB
3 - 1 - What are block ciphers_ (17 min).mp418.67MB
11 - 5 - Is RSA a one-way function_ (17 min).mp418.53MB
4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp417.96MB
3 - 4 - More attacks on block ciphers (16 min).mp417.75MB
11 - 1 - Definitions and security (16 min).mp417.22MB
5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp417.06MB
1 - 2 - What is cryptography_ (15 min).mp417.01MB
2 - 6 - Semantic Security (16 min).mp416.8MB
5 - 1 - Message Authentication Codes (16 min).mp416.55MB
6 - 2 - Generic birthday attack (16 min).mp416.14MB
10 - 1 - Notation (15 min).mp415.7MB
11 - 6 - RSA in practice (14 min).mp415.63MB
8 - 2 - Deterministic Encryption (15 min).mp415.62MB
8 - 4 - Tweakable encryption (15 min).mp415.58MB
7 - 6 - CBC padding attacks (14 min).mp414.99MB
1 - 5 - Discrete probability (crash course, cont.) (14 min).mp414.64MB
8 - 1 - Key Derivation (14 min).mp414.57MB
12 - 2 - ElGamal Security (14 min).mp414.53MB
3 - 5 - The AES block cipher (14 min).mp414.52MB
7 - 1 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
10 - 4 - Arithmetic algorithms (13 min).mp413.89MB
8 - 5 - Format preserving encryption (13 min).mp413.21MB
7 - 3 - Chosen ciphertext attacks (12 min).mp413.04MB
12 - 4 - A Unifying Theme (12 min).mp412.93MB
3 - 6 - Block ciphers from PRGs(12 min).mp412.88MB
4 - 1 - Review_ PRPs and PRFs (12 min).mp412.72MB
6 - 3 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
9 - 2 - Merkle Puzzles (11 min).mp412.4MB
9 - 1 - Trusted 3rd parties (11 min).mp412.22MB
6 - 1 - Introduction (11 min).mp411.92MB
9 - 4 - Public-key encryption (11 min).mp411.83MB
2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp411.73MB
1 - 1 - Course Overview (11 min).mp411.72MB
11 - 2 - Constructions (11 min) .mp411.29MB
12 - 3 - ElGamal Variants With Better Security (11 min).mp411.27MB
5 - 2 - MACs Based On PRFs (10 min).mp411.18MB
7 - 7 - Attacking non-atomic decryption (10 min).mp411.09MB
4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp410.44MB
6 - 6 - Timing attacks on MAC verification (9 min).mp49.39MB
5 - 4 - MAC padding (9 min).mp49.3MB
6 - 4 - Constructing compression functions (8 min).mp48.78MB
4 - 2 - Modes of operation_ one time key (8 min).mp47.98MB
6 - 5 - HMAC (7 min).mp47.83MB
12 - 5 - Farewell (for now) (6 min).mp45.73MB
7 - 2 - Definitions (6 min).mp45.61MB