Coursera-Crypto-I
|
2015-3-22 02:12
|
2024-11-17 00:22
|
139
|
1.05 GB
|
66
|
- CR1 - 01 - 01 - Course Overview (11 min).mp411.72MB
- CR1 - 01 - 02 - What is cryptography (15 min).mp417.01MB
- CR1 - 01 - 03 - History of cryptography (19 min).mp420.47MB
- CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp419.82MB
- CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp414.64MB
- CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp420.04MB
- CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp421.17MB
- CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp425.43MB
- CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp421.87MB
- CR1 - 02 - 05 - PRG Security Definitions (25 min).mp426.8MB
- CR1 - 02 - 06 - Semantic Security (16 min).mp416.8MB
- CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].mp411.73MB
- CR1 - 03 - 01 - What are block ciphers (17 min).mp418.67MB
- CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp424.5MB
- CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp421.91MB
- CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp417.75MB
- CR1 - 03 - 05 - The AES block cipher (14 min).mp414.52MB
- CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp412.88MB
- CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp412.72MB
- CR1 - 04 - 02 - Modes of operation one time key (8 min).mp47.98MB
- CR1 - 04 - 03 - Security for many-time key (23 min).mp424.92MB
- CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp417.96MB
- CR1 - 04 - 05 - Modes of operation many time key (CTR) (10 min).mp410.44MB
- CR1 - 05 - 01 - Message Authentication Codes (16 min).mp416.55MB
- CR1 - 05 - 02 - MACs Based On PRFs (10 min).mp411.18MB
- CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp422.34MB
- CR1 - 05 - 04 - MAC padding (9 min).mp49.3MB
- CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp417.06MB
- CR1 - 06 - 01 - Introduction (11 min).mp411.92MB
- CR1 - 06 - 02 - Generic birthday attack (16 min).mp416.14MB
- CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp412.58MB
- CR1 - 06 - 04 - Constructing compression functions (8 min).mp48.78MB
- CR1 - 06 - 05 - HMAC (7 min).mp47.83MB
- CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).mp49.39MB
- CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp414.02MB
- CR1 - 07 - 02 - Definitions (6 min).mp45.61MB
- CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp413.04MB
- CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp422.84MB
- CR1 - 07 - 05 - Case study TLS (18 min).mp418.96MB
- CR1 - 07 - 06 - CBC padding attacks (14 min).mp414.99MB
- CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp411.09MB
- CR1 - 08 - 01 - Key Derivation (14 min).mp414.57MB
- CR1 - 08 - 02 - Deterministic Encryption (15 min).mp415.62MB
- CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp422.06MB
- CR1 - 08 - 04 - Tweakable encryption (15 min).mp415.58MB
- CR1 - 08 - 05 - Format preserving encryption (13 min).mp413.21MB
- CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp412.22MB
- CR1 - 09 - 02 - Merkle Puzzles (11 min).mp412.4MB
- CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp420.96MB
- CR1 - 09 - 04 - Public-key encryption (11 min).mp411.83MB
- CR1 - 10 - 01 - Notation (15 min).mp415.7MB
- CR1 - 10 - 02 - Fermat and Euler (18 min).mp420.06MB
- CR1 - 10 - 03 - Modular eth roots (17 min).mp419.09MB
- CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp413.89MB
- CR1 - 10 - 05 - Intractable problems (19 min).mp421.22MB
- CR1 - 11 - 01 - Definitions and security (16 min).mp417.22MB
- CR1 - 11 - 02 - Constructions (11 min) .mp411.29MB
- CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp419.82MB
- CR1 - 11 - 04 - PKCS 1 (23 min).mp423.4MB
- CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp418.53MB
- CR1 - 11 - 06 - RSA in practice (14 min).mp415.63MB
- CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp421.36MB
- CR1 - 12 - 02 - ElGamal Security (14 min).mp414.53MB
- CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).mp411.27MB
- CR1 - 12 - 04 - A Unifying Theme (12 min).mp412.93MB
- CR1 - 12 - 05 - Farewell (for now) (6 min).mp45.73MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统