Torrent Info
Title Coursera-Crypto-I
Category
Size 1.05GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01-intro-v2-annotated.pdf 2.70MB
02-stream-v2-annotated.pdf 6.64MB
03-block-v2-annotated.pdf 2.82MB
04-using-block-v2-annotated.pdf 909.19KB
05-integrity-v2-annotated.pdf 690.20KB
06-collision-resistance-v2-annotated.pdf 830.64KB
07-authenc-v2-annotated.pdf 1.54MB
08-odds-and-ends-v2-annotated.pdf 1.63MB
09-basic-key-exchange-annotated.pdf 804.43KB
10-numth-annotated.pdf 722.47KB
11-pubkey-trapdoor-annotated.pdf 1023.42KB
12-pubkey-dh-annotated.pdf 1.02MB
CR1 - 01 - 01 - Course Overview (11 min).mp4 11.72MB
CR1 - 01 - 01 - Course Overview (11 min).srt 16.76KB
CR1 - 01 - 02 - What is cryptography (15 min).mp4 17.01MB
CR1 - 01 - 02 - What is cryptography (15 min).srt 25.42KB
CR1 - 01 - 03 - History of cryptography (19 min).mp4 20.47MB
CR1 - 01 - 03 - History of cryptography (19 min).srt 26.08KB
CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).mp4 19.82MB
CR1 - 01 - 04 - Discrete probability (Crash course) (18 min).srt 25.35KB
CR1 - 01 - 05 - Discrete probability (crash course, cont.) (14 min).srt 20.02KB
CR1 - 01 - 05 - Discrete probability (crash course cont.) (14 min).mp4 14.64MB
CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).mp4 20.04MB
CR1 - 02 - 01 - Information theoretic security and the one time pad (19 min).srt 25.63KB
CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).mp4 21.17MB
CR1 - 02 - 02 - Stream ciphers and pseudo random generators (20 min).srt 28.40KB
CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43MB
CR1 - 02 - 03 - Attacks on stream ciphers and the one time pad (24 min).srt 34.80KB
CR1 - 02 - 04 - Real-world stream ciphers (20 min).mp4 21.87MB
CR1 - 02 - 04 - Real-world stream ciphers (20 min).srt 27.69KB
CR1 - 02 - 05 - PRG Security Definitions (25 min).mp4 26.80MB
CR1 - 02 - 05 - PRG Security Definitions (25 min).srt 35.79KB
CR1 - 02 - 06 - Semantic Security (16 min).mp4 16.80MB
CR1 - 02 - 06 - Semantic Security (16 min).srt 23.97KB
CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].mp4 11.73MB
CR1 - 02 - 07 - Stream ciphers are semantically secure (11 min) [optional].srt 16.21KB
CR1 - 03 - 01 - What are block ciphers_ (17 min).srt 24.94KB
CR1 - 03 - 01 - What are block ciphers (17 min).mp4 18.67MB
CR1 - 03 - 02 - The Data Encryption Standard (22 min).mp4 24.50MB
CR1 - 03 - 02 - The Data Encryption Standard (22 min).srt 31.32KB
CR1 - 03 - 03 - Exhaustive search attacks (20 min).mp4 21.91MB
CR1 - 03 - 03 - Exhaustive search attacks (20 min).srt 27.31KB
CR1 - 03 - 04 - More attacks on block ciphers (16 min).mp4 17.75MB
CR1 - 03 - 04 - More attacks on block ciphers (16 min).srt 25.03KB
CR1 - 03 - 05 - The AES block cipher (14 min).mp4 14.52MB
CR1 - 03 - 05 - The AES block cipher (14 min).srt 20.24KB
CR1 - 03 - 06 - Block ciphers from PRGs(12 min).mp4 12.88MB
CR1 - 03 - 06 - Block ciphers from PRGs(12 min).srt 17.47KB
CR1 - 04 - 01 - Review_ PRPs and PRFs (12 min).srt 16.80KB
CR1 - 04 - 01 - Review PRPs and PRFs (12 min).mp4 12.72MB
CR1 - 04 - 02 - Modes of operation_ one time key (8 min).srt 11.84KB
CR1 - 04 - 02 - Modes of operation one time key (8 min).mp4 7.98MB
CR1 - 04 - 03 - Security for many-time key (23 min).mp4 24.92MB
CR1 - 04 - 03 - Security for many-time key (23 min).srt 34.34KB
CR1 - 04 - 04 - Modes of operation_ many time key (CBC) (16 min).srt 24.42KB
CR1 - 04 - 04 - Modes of operation many time key (CBC) (16 min).mp4 17.96MB
CR1 - 04 - 05 - Modes of operation_ many time key (CTR) (10 min).srt 14.15KB
CR1 - 04 - 05 - Modes of operation many time key (CTR) (10 min).mp4 10.44MB
CR1 - 05 - 01 - Message Authentication Codes (16 min).mp4 16.55MB
CR1 - 05 - 01 - Message Authentication Codes (16 min).srt 23.43KB
CR1 - 05 - 02 - MACs Based On PRFs (10 min).mp4 11.18MB
CR1 - 05 - 02 - MACs Based On PRFs (10 min).srt 15.36KB
CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).mp4 22.34MB
CR1 - 05 - 03 - CBC-MAC and NMAC (20 min).srt 29.15KB
CR1 - 05 - 04 - MAC padding (9 min).mp4 9.30MB
CR1 - 05 - 04 - MAC padding (9 min).srt 13.19KB
CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06MB
CR1 - 05 - 05 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36KB
CR1 - 06 - 01 - Introduction (11 min).mp4 11.92MB
CR1 - 06 - 01 - Introduction (11 min).srt 16.70KB
CR1 - 06 - 02 - Generic birthday attack (16 min).mp4 16.14MB
CR1 - 06 - 02 - Generic birthday attack (16 min).srt 21.99KB
CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).mp4 12.58MB
CR1 - 06 - 03 - The Merkle-Damgard Paradigm (12 min).srt 17.34KB
CR1 - 06 - 04 - Constructing compression functions (8 min).mp4 8.78MB
CR1 - 06 - 04 - Constructing compression functions (8 min).srt 12.89KB
CR1 - 06 - 05 - HMAC (7 min).mp4 7.83MB
CR1 - 06 - 05 - HMAC (7 min).srt 10.06KB
CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).mp4 9.39MB
CR1 - 06 - 06 - Timing attacks on MAC verification (9 min).srt 13.35KB
CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).mp4 14.02MB
CR1 - 07 - 01 - Active attacks on CPA-secure encryption (13 min).srt 19.52KB
CR1 - 07 - 02 - Definitions (6 min).mp4 5.61MB
CR1 - 07 - 02 - Definitions (6 min).srt 8.27KB
CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).mp4 13.04MB
CR1 - 07 - 03 - Chosen ciphertext attacks (12 min).srt 18.70KB
CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).mp4 22.84MB
CR1 - 07 - 04 - Constructions from ciphers and MACs (21 min).srt 30.67KB
CR1 - 07 - 05 - Case study_ TLS (18 min).srt 26.38KB
CR1 - 07 - 05 - Case study TLS (18 min).mp4 18.96MB
CR1 - 07 - 06 - CBC padding attacks (14 min).mp4 14.99MB
CR1 - 07 - 06 - CBC padding attacks (14 min).srt 21.21KB
CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).mp4 11.09MB
CR1 - 07 - 07 - Attacking non-atomic decryption (10 min).srt 14.91KB
CR1 - 08 - 01 - Key Derivation (14 min).mp4 14.57MB
CR1 - 08 - 01 - Key Derivation (14 min).srt 21.44KB
CR1 - 08 - 02 - Deterministic Encryption (15 min).mp4 15.62MB
CR1 - 08 - 02 - Deterministic Encryption (15 min).srt 22.99KB
CR1 - 08 - 03 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.87KB
CR1 - 08 - 03 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 22.06MB
CR1 - 08 - 04 - Tweakable encryption (15 min).mp4 15.58MB
CR1 - 08 - 04 - Tweakable encryption (15 min).srt 22.03KB
CR1 - 08 - 05 - Format preserving encryption (13 min).mp4 13.21MB
CR1 - 08 - 05 - Format preserving encryption (13 min).srt 18.54KB
CR1 - 09 - 01 - Trusted 3rd parties (11 min).mp4 12.22MB
CR1 - 09 - 01 - Trusted 3rd parties (11 min).srt 17.33KB
CR1 - 09 - 02 - Merkle Puzzles (11 min).mp4 12.40MB
CR1 - 09 - 02 - Merkle Puzzles (11 min).srt 19.67KB
CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).mp4 20.96MB
CR1 - 09 - 03 - The Diffie-Hellman protocol (19 min).srt 29.20KB
CR1 - 09 - 04 - Public-key encryption (11 min).mp4 11.83MB
CR1 - 09 - 04 - Public-key encryption (11 min).srt 16.95KB
CR1 - 10 - 01 - Notation (15 min).mp4 15.70MB
CR1 - 10 - 01 - Notation (15 min).srt 19.28KB
CR1 - 10 - 02 - Fermat and Euler (18 min).mp4 20.06MB
CR1 - 10 - 02 - Fermat and Euler (18 min).srt 25.59KB
CR1 - 10 - 03 - Modular e'th roots (17 min).srt 22.91KB
CR1 - 10 - 03 - Modular eth roots (17 min).mp4 19.09MB
CR1 - 10 - 04 - Arithmetic algorithms (13 min).mp4 13.89MB
CR1 - 10 - 04 - Arithmetic algorithms (13 min).srt 18.07KB
CR1 - 10 - 05 - Intractable problems (19 min).mp4 21.22MB
CR1 - 10 - 05 - Intractable problems (19 min).srt 27.61KB
CR1 - 11 - 01 - Definitions and security (16 min).mp4 17.22MB
CR1 - 11 - 01 - Definitions and security (16 min).srt 24.21KB
CR1 - 11 - 02 - Constructions (11 min) .mp4 11.29MB
CR1 - 11 - 02 - Constructions (11 min) .srt 16.52KB
CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).mp4 19.82MB
CR1 - 11 - 03 - The RSA trapdoor permutation (18 min).srt 26.14KB
CR1 - 11 - 04 - PKCS 1 (23 min).mp4 23.40MB
CR1 - 11 - 04 - PKCS 1 (23 min).srt 30.62KB
CR1 - 11 - 05 - Is RSA a one-way function_ (17 min).srt 26.84KB
CR1 - 11 - 05 - Is RSA a one-way function (17 min).mp4 18.53MB
CR1 - 11 - 06 - RSA in practice (14 min).mp4 15.63MB
CR1 - 11 - 06 - RSA in practice (14 min).srt 20.95KB
CR1 - 12 - 01 - The ElGamal Public-key System (23 min).mp4 21.36MB
CR1 - 12 - 01 - The ElGamal Public-key System (23 min).srt 37.11KB
CR1 - 12 - 02 - ElGamal Security (14 min).mp4 14.53MB
CR1 - 12 - 02 - ElGamal Security (14 min).srt 21.57KB
CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).mp4 11.27MB
CR1 - 12 - 03 - ElGamal Variants With Better Security (11 min).srt 16.81KB
CR1 - 12 - 04 - A Unifying Theme (12 min).mp4 12.93MB
CR1 - 12 - 04 - A Unifying Theme (12 min).srt 17.78KB
CR1 - 12 - 05 - Farewell (for now) (6 min).mp4 5.73MB
CR1 - 12 - 05 - Farewell (for now) (6 min).srt 9.04KB
Distribution statistics by country
France (FR) 1
United States (US) 1
Palestine (PS) 1
Total 3
IP List List of IP addresses which were distributed this torrent