Cryptography Lectures of Standford University

seeders: 9
leechers: 4
Added on January 9, 2015 by sandy_fbin Other > Unsorted
Torrent verified.



Cryptography Lectures of Standford University (Size: 1.04 GB)
 1 - 3 - History of cryptography (19 min).mp420.47 MB
 1 - 4 - Discrete probability (16 min).mp417.46 MB
 1 - 2 - What is cryptography- (15 min).mp417.01 MB
 1 - 1 - Course Overview (11 min).mp411.72 MB
 01.3-intro-annotated.pdf1.39 MB
 01.2-intro-annotated.pdf866.09 KB
 01.4-intro-annotated.pdf307.92 KB
 01.1-intro-annotated.pdf307.34 KB
 2 - 5 - PRG Security Definitions (25 min).mp426.8 MB
 2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp425.43 MB
 2 - 4 - Real-world stream ciphers (20 min).mp421.87 MB
 2 - 2 - Stream ciphers and pseudo random generators (20 min).mp421.17 MB
 2 - 1 - Information theoretic security and the one time pad (19 min).mp420.04 MB
 2 - 6 - Semantic Security (16 min).mp416.8 MB
 2 - 7 - Stream ciphers are semantically secure (11 min).mp411.73 MB
 02.3-stream-annotated.pdf593.05 KB
 02.4-stream-annotated.pdf452.05 KB
 02.1-stream-annotated.pdf380.28 KB
 3 - 2 - The Data Encryption Standard (22 min).mp424.5 MB
 3 - 3 - Exhaustive search attacks (20 min).mp421.91 MB
 3 - 1 - What are block ciphers- (17 min).mp418.67 MB
 3 - 4 - More attacks on block ciphers (16 min).mp417.75 MB
 3 - 5 - The AES block cipher (14 min).mp414.52 MB
 3 - 6 - Block ciphers from PRGs(12 min).mp412.88 MB
 03.2-block-annotated.pdf1.06 MB
 03.5-block-annotated.pdf808.05 KB
 03.3-block-annotated.pdf467.89 KB
 03.6-block-annotated.pdf434.19 KB
 4 - 3 - Security for many-time key (23 min).mp424.92 MB
 4 - 4 - Modes of operation many time key (CBC) (16 min).mp417.96 MB
 4 - 1 - Review PRPs and PRFs (12 min).mp412.72 MB
 4 - 5 - Modes of operation many time key (CTR) (10 min).mp410.44 MB
 4 - 2 - Modes of operation one time key (8 min).mp47.98 MB
 04.2-using-block-annotated.pdf387.28 KB
 04.3-using-block-annotated.pdf316.89 KB
 04.4-using-block-annotated.pdf263.42 KB
 04.1-using-block-annotated.pdf259.45 KB
 04.5-using-block-annotated.pdf204.65 KB
 5 - 3 - CBC-MAC and NMAC (20 min).mp422.34 MB
 5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp417.06 MB
 5 - 1 - Message Authentication Codes (16 min).mp416.55 MB
 5 - 2 - MACs Based On PRFs (10 min).mp411.18 MB
 5 - 4 - MAC padding (9 min).mp49.3 MB
 05.3-integrity-cbc-mac-and-nmac.pdf348.08 KB
 05.1-integrity-message-authentication-codes.pdf236.25 KB
 05.5-integrity-a-parallel-mac.pdf223.58 KB
 05.4-integrity-mac-padding.pdf199.94 KB
 05.2-integrity-macs-based-on-PRFs.pdf194.29 KB
 6 - 2 - Generic birthday attack (16 min).mp416.14 MB
 6 - 3 - The Merkle-Damgard Paradigm (12 min).mp412.58 MB
 6 - 1 - Introduction (11 min).mp411.92 MB
 6 - 6 - Timing attacks on MAC verification (9 min).mp49.39 MB
 6 - 4 - Constructing compression functions (8 min).mp48.78 MB
 6 - 5 - HMAC (7 min).mp47.83 MB
 06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf267.74 KB
 06.3-collision-resistance-the-merkle-damgard-paradigm.pdf258.63 KB
 06.2-collision-resistance-generic-birthday-attack.pdf245.86 KB
 06.4-collision-resistance-constructing-compression-functions.pdf232.22 KB
 7 - 4 - Constructions from ciphers and MACs (21 min).mp422.84 MB
 7 - 5 - Case study TLS (18 min).mp418.96 MB
 7 - 6 - CBC padding attacks (14 min).mp414.99 MB
 7 - 1 - Active attacks on CPA-secure encryption (13 min).mp414.02 MB
 7 - 3 - Chosen ciphertext attacks (12 min).mp413.04 MB
 7 - 7 - Attacking non-atomic decryption (10 min).mp411.09 MB
 7 - 2 - Definitions (6 min).mp45.61 MB
 07.1-authenc-annotated.pdf873.34 KB
 07.6-authenc-annotated.pdf715.66 KB
 07.4-authenc-annotated.pdf685.97 KB
 8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06 MB
 8 - 2 - Deterministic Encryption (15 min).mp415.62 MB
 8 - 4 - Tweakable encryption (15 min).mp415.58 MB
 8 - 1 - Key Derivation (14 min).mp414.57 MB
 8 - 5 - Format preserving encryption (13 min).mp413.21 MB
 08.4-odds-and-ends.pdf550.71 KB
 08.3-odds-and-ends.pdf515.4 KB
 08.2-odds-and-ends.pdf449.21 KB
 08.5-odds-and-ends.pdf375.59 KB
 08.1-odds-and-ends.pdf328.66 KB
 9 - 3 - The Diffie-Hellman protocol (19 min).mp420.96 MB
 9 - 2 - Merkle Puzzles (11 min).mp412.4 MB
 9 - 1 - Trusted 3rd parties (11 min).mp412.22 MB
 9 - 4 - Public-key encryption (11 min).mp411.83 MB
 09.3-basic-key-exchange-annotated.pdf434.87 KB
 09.4-basic-key-exchange-annotated.pdf268.92 KB
 09.2-basic-key-exchange-annotated.pdf229.86 KB
 09.1-basic-key-exchange-annotated.pdf223.1 KB
 10 - 5 - Intractable problems (19 min).mp421.22 MB
 10 - 2 - Fermat and Euler (18 min).mp420.06 MB
 10 - 3 - Modular e'th roots (17 min).mp419.09 MB
 10 - 1 - Notation (15 min).mp415.7 MB
 10 - 4 - Arithmetic algorithms (13 min).mp413.89 MB
 10.3-numth-annotated.pdf287.45 KB
 10.4-numth-annotated.pdf269.58 KB
 10.1-numth-annotated.pdf241.83 KB
 10.5-numth-annotated.pdf236.15 KB
 10.2-numth-annotated.pdf187.29 KB
 11 - 4 - PKCS 1 (23 min).mp423.4 MB
 11 - 3 - The RSA trapdoor permutation (18 min).mp419.82 MB
 11 - 5 - Is RSA a one-way function (17 min).mp418.53 MB
 11 - 1 - Definitions and security (16 min).mp417.22 MB
 11 - 6 - RSA in practice (14 min).mp415.63 MB
 11 - 2 - Constructions (11 min).mp411.29 MB
 11.1-pubkey-trapdoor.pdf549.58 KB
 11.4-pubkey-trapdoor.pdf264.4 KB
 11.3-pubkey-trapdoor.pdf239.02 KB
 11.2-pubkey-trapdoor.pdf211.62 KB
 12 - 1 - The ElGamal Public-key System (23 min).mp421.36 MB
 12 - 2 - ElGamal Security (14 min).mp414.53 MB
 12 - 4 - A Unifying Theme (12 min).mp412.93 MB
 12 - 3 - ElGamal Variants With Better Security (11 min).mp411.27 MB
 12 - 5 - Farewell (for now) (6 min).mp45.73 MB
 12.1-pubkey-dh.pdf536.15 KB
 12.5-pubkey-dh.pdf320.82 KB
 12.2-pubkey-dh.pdf294.64 KB
 12.4-pubkey-dh.pdf196.6 KB
 12.3-pubkey-dh.pdf179.3 KB

Sharing Widget


Download torrent
1.04 GB
seeders:9
leechers:4
Cryptography Lectures of Standford University