搜索
[Coursera] Cryptography I by Dan Boneh
磁力链接/BT种子名称
[Coursera] Cryptography I by Dan Boneh
磁力链接/BT种子简介
种子哈希:
9ed87957ffdb6687fcb4e919547f383a26a9cfba
文件大小:
1.14G
已经下载:
1312
次
下载速度:
极快
收录时间:
2017-02-22
最近下载:
2025-12-04
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:9ED87957FFDB6687FCB4E919547F383A26A9CFBA
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
母狗园
51动漫
91短视频
抖音Max
糖心视频
TikTok成人版
PornHub
暗网Xvideo
草榴社区
哆哔涩漫
呦乐园
萝莉岛
搜同
91暗网
最近搜索
timea.bella
heyzo+0507
of极品大奶bbw【母狗姐妹】
父亲节淫乱
2025.d.
康悦到家
黑饱包
exploitedteensasia
olivia assparade
绿衣服
ssis-463
g杯bbw反差财务【魅兰ml】开放式大骚穴
黑白丝
含笑+飞天+无损
ntrh-027
凡人修仙传风起
推特情侣夫妻『易鸣❤️奶昔』全网未流出独家版本,奶昔的大奶子不用多说,
onlyfans - angela white
抱起来
frp
红色紧身衣+英国色情
七天探花 合集
斗破苍穹175
户外捆绑肛交+射你一脸
pacopacomama+030125+100
elden ring
sc
彩月七
抖音叫妈妈
【孩子你要相信光】
文件列表
A Computational Introduction to Number Theory and Algebra.pdf
3.6 MB
Course Overview.pdf
88.6 kB
cryptography.jpg
3.4 MB
Final Exam.pdf
1.7 MB
High School Mathematics Extensions - Discrete Probability.pdf
278.3 kB
Syllabus.pdf
85.5 kB
Week 1/1.1 - Course Overview.pdf
314.7 kB
Week 1/1.1 - Course Overview.pptx
300.2 kB
Week 1/1.1 - Course Overview.txt
11.8 kB
Week 1/1.2 - What is cryptography.pdf
886.9 kB
Week 1/1.2 - What is cryptography.pptx
1.1 MB
Week 1/1.2 - What is cryptography.txt
17.8 kB
Week 1/1.3 - History of cryptography.mp4
21.5 MB
Week 1/1.3 - History of cryptography.pdf
1.5 MB
Week 1/1.3 - History of cryptography.pptx
1.6 MB
Week 1/1.3 - History of cryptography.txt
18.2 kB
Week 1/1.4 - Discrete probability (Crash course) (part 1).pdf
545.0 kB
Week 1/1.4 - Discrete probability (Crash course) (part 1).pptx
189.8 kB
Week 1/1.4 - Discrete probability (Crash course) (part 1).txt
17.7 kB
Week 1/1.5 - Discrete probability (Crash course) (part 2).mp4
15.3 MB
Week 1/1.5 - Discrete probability (Crash course) (part 2).pdf
484.5 kB
Week 1/1.5 - Discrete probability (Crash course) (part 2).pptx
212.5 kB
Week 1/1.5 - Discrete probability (Crash course) (part 2).txt
14.1 kB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.mp4
12.3 MB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pdf
314.7 kB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pptx
300.2 kB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.txt
11.8 kB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.mp4
17.8 MB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pdf
886.9 kB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pptx
1.1 MB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.txt
17.8 kB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.mp4
21.5 MB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pdf
1.5 MB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pptx
1.6 MB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.txt
18.2 kB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).mp4
20.8 MB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pdf
545.0 kB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pptx
189.8 kB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).txt
17.7 kB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).mp4
15.3 MB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pdf
484.5 kB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pptx
212.5 kB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).txt
14.1 kB
Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pdf
389.4 kB
Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pptx
1.6 MB
Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pdf
339.5 kB
Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pptx
1.2 MB
Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pdf
607.3 kB
Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pptx
1.1 MB
Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pdf
462.9 kB
Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pptx
750.1 kB
Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pdf
308.9 kB
Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pptx
1.4 MB
Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pdf
248.2 kB
Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pptx
275.4 kB
Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pdf
215.2 kB
Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pptx
493.0 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).mp4
21.0 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).txt
17.9 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4
22.2 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt
19.9 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4
26.7 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt
24.3 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).mp4
22.9 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).txt
19.3 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).mp4
28.1 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).txt
24.9 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).mp4
17.6 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).txt
16.7 kB
Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4
12.3 MB
Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].txt
11.3 kB
Week 1/Week 1 - Problem Set.pdf
1.2 MB
Week 1/Week 1 - Programming Assignment.pdf
115.4 kB
Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pdf
297.5 kB
Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pptx
229.7 kB
Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pdf
1.1 MB
Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pptx
828.6 kB
Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pdf
479.1 kB
Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pptx
637.0 kB
Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pdf
429.7 kB
Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pptx
536.8 kB
Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pdf
827.4 kB
Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pptx
445.5 kB
Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pdf
444.6 kB
Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pptx
282.4 kB
Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).mp4
19.6 MB
Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).txt
17.3 kB
Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).mp4
25.7 MB
Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).txt
22.0 kB
Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).mp4
23.0 MB
Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).txt
19.3 kB
Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).mp4
18.6 MB
Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).txt
17.5 kB
Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).mp4
15.2 MB
Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).txt
14.2 kB
Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).mp4
13.5 MB
Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).txt
12.3 kB
Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pdf
265.7 kB
Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pptx
425.3 kB
Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pdf
396.6 kB
Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pptx
408.9 kB
Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pdf
324.5 kB
Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pptx
325.7 kB
Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pdf
269.7 kB
Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pptx
375.0 kB
Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pdf
209.6 kB
Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pptx
229.2 kB
Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).mp4
13.3 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).txt
11.8 kB
Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).mp4
8.4 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).txt
8.3 kB
Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).mp4
26.1 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).txt
24.0 kB
Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).mp4
18.8 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).txt
17.1 kB
Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).mp4
10.9 MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).txt
9.9 kB
Week 2/Week 2 - Problem Set.pdf
203.0 kB
Week 2/Week 2 - Programming Assignment.pdf
97.0 kB
Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pdf
241.9 kB
Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pptx
286.7 kB
Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pdf
199.0 kB
Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pptx
290.4 kB
Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pdf
356.4 kB
Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pptx
333.3 kB
Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pdf
204.7 kB
Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pptx
255.3 kB
Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pdf
228.9 kB
Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pptx
246.5 kB
Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).mp4
17.4 MB
Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).txt
16.2 kB
Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).mp4
11.7 MB
Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).txt
10.8 kB
Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).mp4
23.4 MB
Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).txt
20.4 kB
Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).mp4
9.8 MB
Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).txt
9.2 kB
Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4
17.9 MB
Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt
17.1 kB
Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pdf
235.7 kB
Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pptx
209.3 kB
Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pdf
251.8 kB
Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pptx
527.1 kB
Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf
264.8 kB
Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx
837.4 kB
Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pdf
237.8 kB
Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pptx
245.9 kB
Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf
204.8 kB
Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx
249.2 kB
Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf
274.2 kB
Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx
333.5 kB
Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).mp4
12.5 MB
Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).txt
11.7 kB
Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).mp4
16.9 MB
Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).txt
15.4 kB
Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4
13.2 MB
Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt
12.1 kB
Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).mp4
9.2 MB
Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).txt
9.0 kB
Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).mp4
8.2 MB
Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).txt
7.1 kB
Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).mp4
9.8 MB
Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).txt
9.4 kB
Week 3/Week 3 - Problem Set.pdf
1.2 MB
Week 3/Week 3 - Programming Assignment.pdf
936.3 kB
Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pdf
894.3 kB
Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pptx
561.0 kB
Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pdf
546.1 kB
Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pptx
227.6 kB
Week 4/Lesson 07 - Authenticated Encryption/07.3-authenc-annotated.pptx
268.2 kB
Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pdf
702.4 kB
Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pptx
252.2 kB
Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pdf
688.7 kB
Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pptx
359.5 kB
Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pdf
732.8 kB
Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pptx
390.1 kB
Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pdf
473.1 kB
Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pptx
243.0 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4
14.7 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt
13.7 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).mp4
5.9 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).txt
5.8 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).mp4
13.7 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).txt
13.1 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).mp4
24.0 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).txt
21.4 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).mp4
19.9 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).txt
18.5 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).mp4
15.7 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).txt
14.9 kB
Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).mp4
11.6 MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).txt
10.5 kB
Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pdf
336.5 kB
Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pptx
210.8 kB
Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pdf
460.0 kB
Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pptx
270.4 kB
Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pdf
527.8 kB
Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pptx
525.3 kB
Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pdf
563.9 kB
Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pptx
460.7 kB
Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pdf
384.6 kB
Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pptx
245.0 kB
Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).mp4
15.3 MB
Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).txt
15.0 kB
Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).mp4
16.4 MB
Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).txt
16.1 kB
Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4
23.1 MB
Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).txt
21.6 kB
Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).mp4
16.3 MB
Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).txt
15.4 kB
Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).mp4
13.9 MB
Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).txt
13.0 kB
Week 4/Week 4 - Problem Set.pdf
154.2 kB
Week 4/Week 4 - programming project.pdf
138.5 kB
Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pdf
228.5 kB
Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pptx
616.9 kB
Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pdf
235.4 kB
Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pptx
215.3 kB
Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pdf
445.3 kB
Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pptx
752.8 kB
Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pdf
275.4 kB
Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pptx
489.9 kB
Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).mp4
12.8 MB
Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).txt
12.2 kB
Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).mp4
13.0 MB
Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).txt
12.1 kB
Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).mp4
22.0 MB
Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).txt
20.5 kB
Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).mp4
12.4 MB
Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).txt
11.9 kB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).mp4
16.5 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).txt
13.4 kB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).mp4
21.0 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).txt
17.9 kB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.mp4
20.0 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.txt
15.9 kB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).mp4
14.6 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).txt
12.6 kB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).mp4
22.2 MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).txt
19.0 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pdf
247.6 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pptx
534.3 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pdf
191.8 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pptx
210.7 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pdf
294.3 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pptx
475.2 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pdf
276.0 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pptx
229.5 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pdf
241.8 kB
Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pptx
240.1 kB
Week 5/Week 5 - Problem Set.pdf
121.8 kB
Week 5/Week 5 - Programming Assignment.pdf
85.0 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).mp4
18.1 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).txt
17.0 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .mp4
11.8 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .txt
11.6 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).mp4
20.8 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).txt
18.3 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).mp4
24.5 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).txt
21.4 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).mp4
19.4 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).txt
17.3 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).mp4
16.4 MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).txt
14.3 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pdf
562.8 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pptx
359.8 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pdf
216.7 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pptx
191.4 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pdf
244.8 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pptx
204.3 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pdf
270.7 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pptx
209.4 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pdf
170.3 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pptx
186.1 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pdf
189.2 kB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pptx
189.6 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).mp4
22.4 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).txt
21.9 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).mp4
15.2 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).txt
15.1 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).mp4
11.8 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).txt
11.8 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).mp4
13.6 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).txt
12.5 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).mp4
6.0 MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).txt
6.4 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pdf
549.0 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pptx
316.3 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pdf
301.7 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pptx
198.8 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pdf
183.6 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pptx
190.7 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pdf
201.3 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pptx
195.7 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pdf
328.5 kB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pptx
184.6 kB
Week 6/Week 6 - Problem Set.pdf
151.8 kB
Week 6/Week 6 - Programming Assignment.pdf
1.5 MB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!