Udacity - Applied Cryptography Videos

seeders: 1
leechers: 72
Added on November 4, 2015 by hichysin Other > Tutorials
Torrent verified.



Udacity - Applied Cryptography Videos (Size: 4.33 GB)
 3 - Countermeasures.srt12.5 KB
 2 - Timememory.srt8.77 KB
 1 - Demo.srt7.88 KB
 4 - Ethics.srt4.31 KB
 3 - Open Discussion.srt11.96 KB
 2 - Otp And Quantum Crypto.srt5.69 KB
 1 - Mathematics And Programming.srt1.86 KB
 43 - Colossus.srt10.85 KB
 35 - Lorenz Cipher Machine.srt8.45 KB
 44 - Modern Symmetric Ciphers.srt7.68 KB
 42 - Guessing Keys Solution.srt6.71 KB
 13 - One Time Pad.srt6.47 KB
 32 - Lorenz Cipher.srt5.37 KB
 04 - Do Not Implement Your Own Crypto.srt5.32 KB
 34 - Intercepting Messages Solution.srt5.08 KB
 02 - Introduction Solution.srt4.99 KB
 31 - Perfect Cipher Is Impractical Solution.srt4.79 KB
 15 - Discrete Log Problem.srt8.45 KB
 06 - Merkles Puzzles.srt6.14 KB
 30 - Faster Primality Test.srt4.73 KB
 09 - Secret Paint Mixing.srt3.45 KB
 17 - DH Security.srt3.44 KB
 01 - Introduction.srt3.26 KB
 22 - Finding Large Primes.srt3.09 KB
 08 - Diffie Hellman.srt2.83 KB
 11 - Key Exchange.srt2.83 KB
 04 - Trusted Third Party.srt2.82 KB
 4 - Question 3.srt7.9 KB
 3 - Question 2.srt4.75 KB
 2 - Question 1.srt2.84 KB
 1 - Welcome.srt2.41 KB
 1 - Questions And Answers.srt7.66 KB
 39 - Strong Collision Resistance.srt7.56 KB
 03 - Randomness Quiz Solution.srt6.72 KB
 31 - Cryptographic Hash Function.srt5.63 KB
 50 - Hotel Door Locks.srt5.41 KB
 42 - Early Unix Implementation.srt5.36 KB
 21 - Cipher Feedback Mode.srt5.02 KB
 26 - Protocols.srt4.8 KB
 07 - Sources Of Randomness.srt4.72 KB
 04 - Kolmogorov Complexity.srt4.64 KB
 05 - Kolmogorov Complexity Solution.srt4.55 KB
 55 - Longest Block Chain.srt6.59 KB
 53 - Double Hash.srt6.23 KB
 10 - Eavesdropper Solution.srt5.06 KB
 51 - Provide Scarcity.srt4.24 KB
 04 - Envelopes Solution.srt3.89 KB
 47 - Identity Challenges.srt3.88 KB
 36 - Blindfolded Signatures.srt3.77 KB
 35 - Digital Cash Solution.srt3.73 KB
 33 - Money Solution.srt3.16 KB
 01 - Solving Problems.srt3.12 KB
 37 - TLS Record Protocol.srt6.54 KB
 21 - Master Secret.srt6.31 KB
 34 - Signature Validation Solution.srt5.51 KB
 04 - Encrypted Key Exchange.srt4.89 KB
 38 - TLS Record Protocol Solution.srt4.89 KB
 33 - Signature Validation.srt4.59 KB
 10 - Secure Shell.srt4.41 KB
 39 - CBC Attack.srt4.38 KB
 14 - Ssh Authentication In Practice.srt4 KB
 17 - Basic TLS.srt3.75 KB
 01 - Summary.srt5.61 KB
 12 - Oblivious Transfer.srt3.72 KB
 04 - Logic Gate.srt3.68 KB
 10 - Garbled Circuit Protocol.srt2.59 KB
 02 - Secure Computation.srt2.49 KB
 16 - Putting It All Together.srt1.97 KB
 13 - Oblivious Transfer Solution.srt1.91 KB
 07 - Encrypt Outputs Solution.srt1.88 KB
 05 - Logic Gate Solution.srt1.69 KB
 08 - Permute Outputs.srt1.65 KB
 3 - Cut and Choose.srt5.43 KB
 8 - TOR Extended 5.srt2.29 KB
 5 - TOR Extended 2.srt2 KB
 1 - Onion Routing.srt1.82 KB
 6 - TOR Extended 3.srt1.73 KB
 7 - TOR Extended 4.srt1.18 KB
 2 - Voting.srt765 bytes
 4 - TOR Extended 1.srt540 bytes
 9 - Proofs Of Work.mp47.08 MB
 3 - Perfect Ciphers.mp46.84 MB
 8 - Garbled Circuits.mp45.9 MB
 4 - Symmetric Ciphers.mp45.51 MB
 7 - Signing Certificates.mp44.93 MB
 1 - One Time Pad.mp43.79 MB
 2 - Biased Generator.mp43.26 MB
 5 - Key Distribution.mp43.2 MB
 6 - Rsa.mp42.12 MB
 3 - Countermeasures.mp480.79 MB
 2 - Timememory.mp460.31 MB
 1 - Demo.mp446.06 MB
 4 - Ethics.mp425.91 MB
 43 - Colossus.mp455.04 MB
 35 - Lorenz Cipher Machine.mp449.12 MB
 44 - Modern Symmetric Ciphers.mp443.3 MB
 42 - Guessing Keys Solution.mp437.41 MB
 13 - One Time Pad.mp429.16 MB
 32 - Lorenz Cipher.mp428.33 MB
 34 - Intercepting Messages Solution.mp427.47 MB
 31 - Perfect Cipher Is Impractical Solution.mp424.18 MB
 29 - Otp Is A Perfect Cipher Pt 3.mp423.35 MB
 36 - Lorenz Cipher Machine Solution.mp421.69 MB
 39 - Strong Collision Resistance.mp439.91 MB
 03 - Randomness Quiz Solution.mp431.14 MB
 42 - Early Unix Implementation.mp427.71 MB
 31 - Cryptographic Hash Function.mp427.05 MB
 50 - Hotel Door Locks.mp426.46 MB
 21 - Cipher Feedback Mode.mp426.31 MB
 18 - Counter Mode.mp425.23 MB
 07 - Sources Of Randomness.mp424.32 MB
 26 - Protocols.mp424.02 MB
 04 - Kolmogorov Complexity.mp422.92 MB
 15 - Discrete Log Problem.mp435.71 MB
 06 - Merkles Puzzles.mp429.91 MB
 30 - Faster Primality Test.mp424.6 MB
 09 - Secret Paint Mixing.mp416.93 MB
 17 - DH Security.mp415.31 MB
 04 - Trusted Third Party.mp414.54 MB
 01 - Introduction.mp414.04 MB
 34 - Diffie Hellman Summary.mp413.32 MB
 11 - Key Exchange.mp413.29 MB
 19 - Implementing Dh Solution.mp412.05 MB
 35 - Factoring Is Still Hard.mp426.95 MB
 07 - RSA Cryptosystem.mp420.11 MB
 01 - Asymmetric Cryptosystems.mp418.2 MB
 28 - Security Of RSA.mp417.66 MB
 17 - Proving Eulers Theorem Pt1 Solution.mp415.61 MB
 15 - Totient Function Solution.mp415.56 MB
 45 - Summary.mp415.55 MB
 37 - Optional Complexity Solution.mp415.24 MB
 31 - Totient and Factoring.mp414.91 MB
 19 - Proving Eulers Theorem Pt2 Solution.mp414.81 MB
 37 - TLS Record Protocol.mp433.41 MB
 21 - Master Secret.mp432.06 MB
 38 - TLS Record Protocol Solution.mp428.15 MB
 34 - Signature Validation Solution.mp425.06 MB
 33 - Signature Validation.mp424.03 MB
 10 - Secure Shell.mp422.92 MB
 04 - Encrypted Key Exchange.mp422.78 MB
 39 - CBC Attack.mp422.48 MB
 17 - Basic TLS.mp420.48 MB
 14 - Ssh Authentication In Practice.mp419.94 MB
 55 - Longest Block Chain.mp430.24 MB
 53 - Double Hash.mp429.94 MB
 10 - Eavesdropper Solution.mp422.46 MB
 51 - Provide Scarcity.mp419.69 MB
 04 - Envelopes Solution.mp419.43 MB
 36 - Blindfolded Signatures.mp418.86 MB
 47 - Identity Challenges.mp418.68 MB
 35 - Digital Cash Solution.mp417.71 MB
 33 - Money Solution.mp416.1 MB
 08 - The First Hop Solution.mp415.77 MB
 01 - Summary.mp427.8 MB
 12 - Oblivious Transfer.mp419.75 MB
 04 - Logic Gate.mp418.57 MB
 10 - Garbled Circuit Protocol.mp411.64 MB
 02 - Secure Computation.mp411.1 MB
 13 - Oblivious Transfer Solution.mp410.31 MB
 07 - Encrypt Outputs Solution.mp410.02 MB
 16 - Putting It All Together.mp49.64 MB
 05 - Logic Gate Solution.mp48.77 MB
 08 - Permute Outputs.mp47.81 MB
 16 - Challenge Question.mp413.98 MB
 01 - Introduction.mp411.18 MB
 08 - One Time Pad.mp410.66 MB
 09 - One Time Pad Solution.mp410.34 MB
 14 - Secret Sharing.mp410.26 MB
 07 - Conditional Probability 3 Solution.mp47.66 MB
 11 - Toy Substitution Cipher 1 Solution.mp47.38 MB
 02 - Conditional Probability 1.mp46.32 MB
 10 - Toy Substitution Cipher 1.mp46.02 MB
 05 - Conditional Probability 2 Solution.mp44.94 MB
 04 - Decrpytion In Parallel Solution.mp414.1 MB
 06 - Output Feedback Mode Solution.mp412.84 MB
 10 - Hash Collision Solution.mp412.31 MB
 02 - Randomness Solution.mp48.98 MB
 05 - Output Feedback Mode.mp47.18 MB
 07 - CBC Implementation.mp47.04 MB
 09 - Hash Collision.mp46.51 MB
 03 - Decrpytion In Parallel.mp44.52 MB
 01 - Randomness.mp44.41 MB
 08 - Cbc Implementation Solution.mp43.86 MB
 11 - Challenge Question.mp43.7 MB
 6 - Timing Side Channel.mp411.88 MB
 8 - Rabin Miller Primality Test Solution.mp48.38 MB
 2 - Diffie Hellman Solution.mp46.34 MB
 7 - Rabin Miller Primality Test.mp46.31 MB
 1 - Diffie Hellman.mp45.88 MB
 9 - Challenge Question.mp44.03 MB
 5 - Timing Side Channel.mp44.02 MB
 4 - Primitive Roots Solution.mp43.79 MB
 3 - Primitive Roots.mp42.86 MB
 08 - OAEP.mp47.48 MB
 02 - Public Key Cryptography Solution.mp45.24 MB
 09 - Oaep Solution.mp44.31 MB
 07 - RSA Signature.mp44.2 MB
 10 - RSA SIgnature Solution.mp44.12 MB
 06 - Rsa Encryption Solution.mp43.96 MB
 04 - Totient Solution.mp43.86 MB
 05 - Rsa Encryption.mp43.15 MB
 01 - Public Key Cryptography.mp43.1 MB
 03 - Totient.mp4545.78 KB
 6 - Useful Certificates Solution.mp46.86 MB
 3 - Hashing And EKE.mp46.03 MB
 4 - Hashing And EKE Solution.mp43.81 MB
 7 - Signing.mp43.77 MB
 8 - Signing Solution.mp43.65 MB
 2 - One Time Pad Reborn Solution.mp43.6 MB
 1 - One Time Pad Reborn.mp43.2 MB
 5 - Useful Certificates.mp42.91 MB
 7 - Tor Extended 5.mp49.74 MB
 4 - Tor Extended 2.mp46.77 MB
 6 - Tor Extended 4.mp45.87 MB
 1 - Onion Routing.mp43.6 MB
 5 - Tor Extended 3.mp43.54 MB
 3 - Tor Extended 1.mp43.12 MB
 2 - Voting.mp42.76 MB
 3 - Cut and Choose.mp427.05 MB
 8 - TOR Extended 5.mp411.05 MB
 5 - TOR Extended 2.mp49.25 MB
 6 - TOR Extended 3.mp47.9 MB
 1 - Onion Routing.mp47.26 MB
 7 - TOR Extended 4.mp46.22 MB
 2 - Voting.mp44.52 MB
 4 - TOR Extended 1.mp42.35 MB
 3 - Open Discussion.mp459.4 MB
 2 - Otp And Quantum Crypto.mp424.94 MB
 1 - Mathematics And Programming.mp47.36 MB
 1 - Questions And Answers.mp435.79 MB
 4 - Question 3.mp434.19 MB
 3 - Question 2.mp424.71 MB
 2 - Question 1.mp415.41 MB
 1 - Welcome.mp412.35 MB

Description

image

Course Summary

Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.

Why Take This Course?

Explore how secrets are written and shared, as well as what can go wrong when cryptography is misused or implemented badly.

Prerequisites and Requirements

This course assumes previous programming experience, comparable to what is covered by the Udacity CS101 course, as well as some understanding of probability and theory of computation and algorithm analysis.

See the Technology Requirements for using Udacity.

What Will I Learn?

Syllabus

Lesson 1: Perfect Ciphers

What makes certain ciphers perfect, how the Lorenz Cipher was broken

Lesson 2: Symmetric Encryption

Sending messages when two people share a secret

Lesson 3: Key Exchange

Techniques to establish a shared secret

Lesson 4: Asymmetric Encryption

Exchanging information using public key cryptosystems

Lesson 5: Public Key Protocols

Encrypted key exchange, certificates, secure commerce

Lesson 6: Using Cryptographic Primitives

How cryptography can be useful for anonymizing communication, voting, and digital cash

Lesson 7: Secure Computation

Computing without exposing data



instructor : Dave Evans

Sharing Widget


Download torrent
4.33 GB
seeders:1
leechers:72
Udacity - Applied Cryptography Videos