首页
磁力链接怎么用
한국어
English
日本語
简体中文
繁體中文
[Coursera] Cryptography I by Dan Boneh
文件类型
收录时间
最后活跃
资源热度
文件大小
文件数量
视频
2016-7-27 06:42
2024-12-22 19:05
149
1.07 GB
68
磁力链接
magnet:?xt=urn:btih:9ed87957ffdb6687fcb4e919547f383a26a9cfba
迅雷链接
thunder://QUFtYWduZXQ6P3h0PXVybjpidGloOjllZDg3OTU3ZmZkYjY2ODdmY2I0ZTkxOTU0N2YzODNhMjZhOWNmYmFaWg==
二维码链接
种子下载(838888不存储任何种子文件)
种子下载线路1(迅雷)--推荐
种子下载线路2(比特彗星)
种子下载线路3(torcache)
3条线路均为国内外知名下载网站种子链接,内容跟本站无关!
相关链接
Coursera
Cryptography
I
by
Dan
Boneh
文件列表
Week 1/1.3 - History of cryptography.mp4
20.47MB
Week 1/1.5 - Discrete probability (Crash course) (part 2).mp4
14.64MB
Week 1/Lecture 01 - Introduction/1.1 - Course Overview.mp4
11.72MB
Week 1/Lecture 01 - Introduction/1.2 - What is cryptography.mp4
17.01MB
Week 1/Lecture 01 - Introduction/1.3 - History of cryptography.mp4
20.47MB
Week 1/Lecture 01 - Introduction/1.4 - Discrete probability (Crash course) (part 1).mp4
19.82MB
Week 1/Lecture 01 - Introduction/1.5 - Discrete probability (Crash course) (part 2).mp4
14.64MB
Week 1/Lecture 02 - Stream Ciphers/2 - 1 - Information theoretic security and the one time pad (19 min).mp4
20.04MB
Week 1/Lecture 02 - Stream Ciphers/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4
21.17MB
Week 1/Lecture 02 - Stream Ciphers/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4
25.43MB
Week 1/Lecture 02 - Stream Ciphers/2 - 4 - Real-world stream ciphers (20 min).mp4
21.87MB
Week 1/Lecture 02 - Stream Ciphers/2 - 5 - PRG Security Definitions (25 min).mp4
26.8MB
Week 1/Lecture 02 - Stream Ciphers/2 - 6 - Semantic Security (16 min).mp4
16.8MB
Week 1/Lecture 02 - Stream Ciphers/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4
11.73MB
Week 2/Lecture 03 - Block Ciphers/3 - 1 - What are block ciphers- (17 min).mp4
18.67MB
Week 2/Lecture 03 - Block Ciphers/3 - 2 - The Data Encryption Standard (22 min).mp4
24.5MB
Week 2/Lecture 03 - Block Ciphers/3 - 3 - Exhaustive search attacks (20 min).mp4
21.91MB
Week 2/Lecture 03 - Block Ciphers/3 - 4 - More attacks on block ciphers (16 min).mp4
17.75MB
Week 2/Lecture 03 - Block Ciphers/3 - 5 - The AES block cipher (14 min).mp4
14.52MB
Week 2/Lecture 03 - Block Ciphers/3 - 6 - Block ciphers from PRGs(12 min).mp4
12.88MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 1 - Review- PRPs and PRFs (12 min).mp4
12.72MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 2 - Modes of operation- one time key (8 min).mp4
7.98MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 3 - Security for many-time key (23 min).mp4
24.92MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 4 - Modes of operation- many time key (CBC) (16 min).mp4
17.96MB
Week 2/Lecture 04 - Using Block Ciphers/4 - 5 - Modes of operation- many time key (CTR) (10 min).mp4
10.44MB
Week 3/Lesson 05 - Message Integrity/5 - 1 - Message Authentication Codes (16 min).mp4
16.55MB
Week 3/Lesson 05 - Message Integrity/5 - 2 - MACs Based On PRFs (10 min).mp4
11.18MB
Week 3/Lesson 05 - Message Integrity/5 - 3 - CBC-MAC and NMAC (20 min).mp4
22.34MB
Week 3/Lesson 05 - Message Integrity/5 - 4 - MAC padding (9 min).mp4
9.3MB
Week 3/Lesson 05 - Message Integrity/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4
17.06MB
Week 3/Lesson 06 - Collision Resistance/6 - 1 - Introduction (11 min).mp4
11.92MB
Week 3/Lesson 06 - Collision Resistance/6 - 2 - Generic birthday attack (16 min).mp4
16.14MB
Week 3/Lesson 06 - Collision Resistance/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4
12.58MB
Week 3/Lesson 06 - Collision Resistance/6 - 4 - Constructing compression functions (8 min).mp4
8.78MB
Week 3/Lesson 06 - Collision Resistance/6 - 5 - HMAC (7 min).mp4
7.83MB
Week 3/Lesson 06 - Collision Resistance/6 - 6 - Timing attacks on MAC verification (9 min).mp4
9.39MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4
14.02MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 2 - Definitions (6 min).mp4
5.61MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 3 - Chosen ciphertext attacks (12 min).mp4
13.04MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 4 - Constructions from ciphers and MACs (21 min).mp4
22.84MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 5 - Case study- TLS (18 min).mp4
18.96MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 6 - CBC padding attacks (14 min).mp4
14.99MB
Week 4/Lesson 07 - Authenticated Encryption/7 - 7 - Attacking non-atomic decryption (10 min).mp4
11.09MB
Week 4/Lesson 08 - Odds and ends/8 - 1 - Key Derivation (14 min).mp4
14.57MB
Week 4/Lesson 08 - Odds and ends/8 - 2 - Deterministic Encryption (15 min).mp4
15.62MB
Week 4/Lesson 08 - Odds and ends/8 - 3 - Deterministic Encryption-SIV and wide PRP (21 min).mp4
22.06MB
Week 4/Lesson 08 - Odds and ends/8 - 4 - Tweakable encryption (15 min).mp4
15.58MB
Week 4/Lesson 08 - Odds and ends/8 - 5 - Format preserving encryption (13 min).mp4
13.21MB
Week 5/Lesson 09 - Basic key exchange/9 - 1 - Trusted 3rd parties (11 min).mp4
12.22MB
Week 5/Lesson 09 - Basic key exchange/9 - 2 - Merkle Puzzles (11 min).mp4
12.4MB
Week 5/Lesson 09 - Basic key exchange/9 - 3 - The Diffie-Hellman protocol (19 min).mp4
20.96MB
Week 5/Lesson 09 - Basic key exchange/9 - 4 - Public-key encryption (11 min).mp4
11.83MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 1 - Notation (15 min).mp4
15.7MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 2 - Fermat and Euler (18 min).mp4
20.06MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 3 - Modular e-'th roots (17 min)14.mp4
19.09MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 4 - Arithmetic algorithms (13 min).mp4
13.89MB
Week 5/Lesson 10 - Introduction to Number Theory/10 - 5 - Intractable problems (19 min).mp4
21.22MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 1 - Definitions and security (16 min).mp4
17.22MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 2 - Constructions (11 min) .mp4
11.29MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 3 - The RSA trapdoor permutation (18 min).mp4
19.82MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 4 - PKCS 1 (23 min).mp4
23.4MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 5 - Is RSA a one-way function- (17 min).mp4
18.53MB
Week 6/Lesson 11 - Public Key Encryption from trapdoor permutations/11 - 6 - RSA in practice (14 min).mp4
15.63MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 1 - The ElGamal Public-key System (23 min).mp4
21.36MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 2 - ElGamal Security (14 min).mp4
14.53MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 3 - ElGamal Variants With Better Security (11 min).mp4
11.27MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 4 - A Unifying Theme (12 min).mp4
12.93MB
Week 6/Lesson 12 - Public key encryption from Diffie-Hellman/12 - 5 - Farewell (for now) (6 min).mp4
5.73MB
友情提示
不会用的朋友看这里 把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载! 亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:
[email protected]
概述 838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题 它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息 838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪 838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统