MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

[Coursera] Cryptography I by Dan Boneh

磁力链接/BT种子名称

[Coursera] Cryptography I by Dan Boneh

磁力链接/BT种子简介

种子哈希:9ed87957ffdb6687fcb4e919547f383a26a9cfba
文件大小: 1.14G
已经下载:1312次
下载速度:极快
收录时间:2017-02-22
最近下载:2025-12-04

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:9ED87957FFDB6687FCB4E919547F383A26A9CFBA
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 小蓝俱乐部 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 母狗园 51动漫 91短视频 抖音Max 糖心视频 TikTok成人版 PornHub 暗网Xvideo 草榴社区 哆哔涩漫 呦乐园 萝莉岛 搜同 91暗网

最近搜索

timea.bella heyzo+0507 of极品大奶bbw【母狗姐妹】 父亲节淫乱 2025.d. 康悦到家 黑饱包 exploitedteensasia olivia assparade 绿衣服 ssis-463 g杯bbw反差财务【魅兰ml】开放式大骚穴 黑白丝 含笑+飞天+无损 ntrh-027 凡人修仙传风起 推特情侣夫妻『易鸣❤️奶昔』全网未流出独家版本,奶昔的大奶子不用多说, onlyfans - angela white 抱起来 frp 红色紧身衣+英国色情 七天探花 合集 斗破苍穹175 户外捆绑肛交+射你一脸 pacopacomama+030125+100 elden ring sc 彩月七 抖音叫妈妈 【孩子你要相信光】

文件列表

  • A Computational Introduction to Number Theory and Algebra.pdf 3.6 MB
  • Course Overview.pdf 88.6 kB
  • cryptography.jpg 3.4 MB
  • Final Exam.pdf 1.7 MB
  • High School Mathematics Extensions - Discrete Probability.pdf 278.3 kB
  • Syllabus.pdf 85.5 kB
  • Week 1/1.1 - Course Overview.pdf 314.7 kB
  • Week 1/1.1 - Course Overview.pptx 300.2 kB
  • Week 1/1.1 - Course Overview.txt 11.8 kB
  • Week 1/1.2 - What is cryptography.pdf 886.9 kB
  • Week 1/1.2 - What is cryptography.pptx 1.1 MB
  • Week 1/1.2 - What is cryptography.txt 17.8 kB
  • Week 1/1.3 - History of cryptography.mp4 21.5 MB
  • Week 1/1.3 - History of cryptography.pdf 1.5 MB
  • Week 1/1.3 - History of cryptography.pptx 1.6 MB
  • Week 1/1.3 - History of cryptography.txt 18.2 kB
  • Week 1/1.4 - Discrete probability (Crash course) (part 1).pdf 545.0 kB
  • Week 1/1.4 - Discrete probability (Crash course) (part 1).pptx 189.8 kB
  • Week 1/1.4 - Discrete probability (Crash course) (part 1).txt 17.7 kB
  • Week 1/1.5 - Discrete probability (Crash course) (part 2).mp4 15.3 MB
  • Week 1/1.5 - Discrete probability (Crash course) (part 2).pdf 484.5 kB
  • Week 1/1.5 - Discrete probability (Crash course) (part 2).pptx 212.5 kB
  • Week 1/1.5 - Discrete probability (Crash course) (part 2).txt 14.1 kB
  • Week 1/Lecture 01 - Introduction/1.1 - Course Overview.mp4 12.3 MB
  • Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pdf 314.7 kB
  • Week 1/Lecture 01 - Introduction/1.1 - Course Overview.pptx 300.2 kB
  • Week 1/Lecture 01 - Introduction/1.1 - Course Overview.txt 11.8 kB
  • Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.mp4 17.8 MB
  • Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pdf 886.9 kB
  • Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.pptx 1.1 MB
  • Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.txt 17.8 kB
  • Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.mp4 21.5 MB
  • Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pdf 1.5 MB
  • Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.pptx 1.6 MB
  • Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.txt 18.2 kB
  • Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).mp4 20.8 MB
  • Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pdf 545.0 kB
  • Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).pptx 189.8 kB
  • Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).txt 17.7 kB
  • Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).mp4 15.3 MB
  • Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pdf 484.5 kB
  • Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).pptx 212.5 kB
  • Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).txt 14.1 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pdf 389.4 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.1-stream-annotated.pptx 1.6 MB
  • Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pdf 339.5 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.2-stream-annotated.pptx 1.2 MB
  • Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pdf 607.3 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.3-stream-annotated.pptx 1.1 MB
  • Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pdf 462.9 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.4-stream-annotated.pptx 750.1 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pdf 308.9 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.5-stream-annotated.pptx 1.4 MB
  • Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pdf 248.2 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.6-stream-annotated.pptx 275.4 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pdf 215.2 kB
  • Week 1/Lecture 02 - Stream Ciphers/02.7-stream-annotated.pptx 493.0 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 21.0 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).txt 17.9 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 22.2 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).txt 19.9 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 26.7 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).txt 24.3 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).mp4 22.9 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).txt 19.3 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).mp4 28.1 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).txt 24.9 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).mp4 17.6 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).txt 16.7 kB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 12.3 MB
  • Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].txt 11.3 kB
  • Week 1/Week 1 - Problem Set.pdf 1.2 MB
  • Week 1/Week 1 - Programming Assignment.pdf 115.4 kB
  • Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pdf 297.5 kB
  • Week 2/Lecture 03 - Block Ciphers/03.1-block-annotated.pptx 229.7 kB
  • Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pdf 1.1 MB
  • Week 2/Lecture 03 - Block Ciphers/03.2-block-annotated.pptx 828.6 kB
  • Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pdf 479.1 kB
  • Week 2/Lecture 03 - Block Ciphers/03.3-block-annotated.pptx 637.0 kB
  • Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pdf 429.7 kB
  • Week 2/Lecture 03 - Block Ciphers/03.4-block-annotated.pptx 536.8 kB
  • Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pdf 827.4 kB
  • Week 2/Lecture 03 - Block Ciphers/03.5-block-annotated.pptx 445.5 kB
  • Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pdf 444.6 kB
  • Week 2/Lecture 03 - Block Ciphers/03.6-block-annotated.pptx 282.4 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).mp4 19.6 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).txt 17.3 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).mp4 25.7 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).txt 22.0 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).mp4 23.0 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).txt 19.3 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).mp4 18.6 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).txt 17.5 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).mp4 15.2 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).txt 14.2 kB
  • Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).mp4 13.5 MB
  • Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).txt 12.3 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pdf 265.7 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.1-using-block-annotated.pptx 425.3 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pdf 396.6 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.2-using-block-annotated.pptx 408.9 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pdf 324.5 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.3-using-block-annotated.pptx 325.7 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pdf 269.7 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.4-using-block-annotated.pptx 375.0 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pdf 209.6 kB
  • Week 2/Lecture 04 - Using Block Ciphers/04.5-using-block-annotated.pptx 229.2 kB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).mp4 13.3 MB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).txt 11.8 kB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).mp4 8.4 MB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).txt 8.3 kB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).mp4 26.1 MB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).txt 24.0 kB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).mp4 18.8 MB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).txt 17.1 kB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).mp4 10.9 MB
  • Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).txt 9.9 kB
  • Week 2/Week 2 - Problem Set.pdf 203.0 kB
  • Week 2/Week 2 - Programming Assignment.pdf 97.0 kB
  • Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pdf 241.9 kB
  • Week 3/Lesson 05 - Message Integrity/05.1-integrity-message-authentication-codes.pptx 286.7 kB
  • Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pdf 199.0 kB
  • Week 3/Lesson 05 - Message Integrity/05.2-integrity-macs-based-on-PRFs.pptx 290.4 kB
  • Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pdf 356.4 kB
  • Week 3/Lesson 05 - Message Integrity/05.3-integrity-cbc-mac-and-nmac.pptx 333.3 kB
  • Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pdf 204.7 kB
  • Week 3/Lesson 05 - Message Integrity/05.4-integrity-mac-padding.pptx 255.3 kB
  • Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pdf 228.9 kB
  • Week 3/Lesson 05 - Message Integrity/05.5-integrity-a-parallel-mac.pptx 246.5 kB
  • Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).mp4 17.4 MB
  • Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).txt 16.2 kB
  • Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).mp4 11.7 MB
  • Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).txt 10.8 kB
  • Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).mp4 23.4 MB
  • Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).txt 20.4 kB
  • Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).mp4 9.8 MB
  • Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).txt 9.2 kB
  • Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.9 MB
  • Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).txt 17.1 kB
  • Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pdf 235.7 kB
  • Week 3/Lesson 06 - Collision Resistance/06.1-collision-resistance-introduction.pptx 209.3 kB
  • Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pdf 251.8 kB
  • Week 3/Lesson 06 - Collision Resistance/06.2-collision-resistance-generic-birthday-attack.pptx 527.1 kB
  • Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 264.8 kB
  • Week 3/Lesson 06 - Collision Resistance/06.3-collision-resistance-the-merkle-damgard-paradigm.pptx 837.4 kB
  • Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pdf 237.8 kB
  • Week 3/Lesson 06 - Collision Resistance/06.4-collision-resistance-constructing-compression-functions.pptx 245.9 kB
  • Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 204.8 kB
  • Week 3/Lesson 06 - Collision Resistance/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx 249.2 kB
  • Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 274.2 kB
  • Week 3/Lesson 06 - Collision Resistance/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pptx 333.5 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).mp4 12.5 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).txt 11.7 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).mp4 16.9 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).txt 15.4 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 13.2 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).txt 12.1 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).mp4 9.2 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).txt 9.0 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).mp4 8.2 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).txt 7.1 kB
  • Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.8 MB
  • Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).txt 9.4 kB
  • Week 3/Week 3 - Problem Set.pdf 1.2 MB
  • Week 3/Week 3 - Programming Assignment.pdf 936.3 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pdf 894.3 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.1-authenc-annotated.pptx 561.0 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pdf 546.1 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.2-authenc-annotated.pptx 227.6 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.3-authenc-annotated.pptx 268.2 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pdf 702.4 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.4-authenc-annotated.pptx 252.2 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pdf 688.7 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.5-authenc-annotated.pptx 359.5 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pdf 732.8 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.6-authenc-annotated.pptx 390.1 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pdf 473.1 kB
  • Week 4/Lesson 07 - Authenticated Encryption/07.7-authenc-annotated.pptx 243.0 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.7 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).txt 13.7 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).mp4 5.9 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).txt 5.8 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.7 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).txt 13.1 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 24.0 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).txt 21.4 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).mp4 19.9 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).txt 18.5 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).mp4 15.7 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).txt 14.9 kB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.6 MB
  • Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).txt 10.5 kB
  • Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pdf 336.5 kB
  • Week 4/Lesson 08 - Odds and ends/08.1-odds-and-ends.pptx 210.8 kB
  • Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pdf 460.0 kB
  • Week 4/Lesson 08 - Odds and ends/08.2-odds-and-ends.pptx 270.4 kB
  • Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pdf 527.8 kB
  • Week 4/Lesson 08 - Odds and ends/08.3-odds-and-ends.pptx 525.3 kB
  • Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pdf 563.9 kB
  • Week 4/Lesson 08 - Odds and ends/08.4-odds-and-ends.pptx 460.7 kB
  • Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pdf 384.6 kB
  • Week 4/Lesson 08 - Odds and ends/08.5-odds-and-ends.pptx 245.0 kB
  • Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).mp4 15.3 MB
  • Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).txt 15.0 kB
  • Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).mp4 16.4 MB
  • Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).txt 16.1 kB
  • Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4 23.1 MB
  • Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).txt 21.6 kB
  • Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).mp4 16.3 MB
  • Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).txt 15.4 kB
  • Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).mp4 13.9 MB
  • Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).txt 13.0 kB
  • Week 4/Week 4 - Problem Set.pdf 154.2 kB
  • Week 4/Week 4 - programming project.pdf 138.5 kB
  • Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pdf 228.5 kB
  • Week 5/Lesson 09 - Basic key exchange/09.1-basic-key-exchange-annotated.pptx 616.9 kB
  • Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pdf 235.4 kB
  • Week 5/Lesson 09 - Basic key exchange/09.2-basic-key-exchange-annotated.pptx 215.3 kB
  • Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pdf 445.3 kB
  • Week 5/Lesson 09 - Basic key exchange/09.3-basic-key-exchange-annotated.pptx 752.8 kB
  • Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pdf 275.4 kB
  • Week 5/Lesson 09 - Basic key exchange/09.4-basic-key-exchange-annotated.pptx 489.9 kB
  • Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).mp4 12.8 MB
  • Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).txt 12.2 kB
  • Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).mp4 13.0 MB
  • Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).txt 12.1 kB
  • Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 22.0 MB
  • Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).txt 20.5 kB
  • Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).mp4 12.4 MB
  • Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).txt 11.9 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).mp4 16.5 MB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).txt 13.4 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).mp4 21.0 MB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).txt 17.9 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.mp4 20.0 MB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.txt 15.9 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).mp4 14.6 MB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).txt 12.6 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).mp4 22.2 MB
  • Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).txt 19.0 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pdf 247.6 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.1-numth-annotated.pptx 534.3 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pdf 191.8 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.2-numth-annotated.pptx 210.7 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pdf 294.3 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.3-numth-annotated.pptx 475.2 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pdf 276.0 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.4-numth-annotated.pptx 229.5 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pdf 241.8 kB
  • Week 5/Lesson 10 - Introduction to Number Theory/10.5-numth-annotated.pptx 240.1 kB
  • Week 5/Week 5 - Problem Set.pdf 121.8 kB
  • Week 5/Week 5 - Programming Assignment.pdf 85.0 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).mp4 18.1 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).txt 17.0 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .mp4 11.8 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .txt 11.6 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).mp4 20.8 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).txt 18.3 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).mp4 24.5 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).txt 21.4 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).mp4 19.4 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).txt 17.3 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).mp4 16.4 MB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).txt 14.3 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pdf 562.8 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.1-pubkey-trapdoor.pptx 359.8 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pdf 216.7 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.2-pubkey-trapdoor.pptx 191.4 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pdf 244.8 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.3-pubkey-trapdoor.pptx 204.3 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pdf 270.7 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.4-pubkey-trapdoor.pptx 209.4 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pdf 170.3 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.5-pubkey-trapdoor.pptx 186.1 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pdf 189.2 kB
  • Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11.6-pubkey-trapdoor.pptx 189.6 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).mp4 22.4 MB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).txt 21.9 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).mp4 15.2 MB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).txt 15.1 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.8 MB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).txt 11.8 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).mp4 13.6 MB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).txt 12.5 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).mp4 6.0 MB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).txt 6.4 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pdf 549.0 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.1-pubkey-dh.pptx 316.3 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pdf 301.7 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.2-pubkey-dh.pptx 198.8 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pdf 183.6 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.3-pubkey-dh.pptx 190.7 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pdf 201.3 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.4-pubkey-dh.pptx 195.7 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pdf 328.5 kB
  • Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12.5-pubkey-dh.pptx 184.6 kB
  • Week 6/Week 6 - Problem Set.pdf 151.8 kB
  • Week 6/Week 6 - Programming Assignment.pdf 1.5 MB

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!