Stanford - Cryptography I

mp4   Hot:405   Size:1.06 GB   Created:2017-08-26 23:01:12   Update:2021-12-09 06:56:22  

Download link

File List

  • 02 - Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4 26.8 MB
    02 - Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 25.43 MB
    04- Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4 24.92 MB
    03 - Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4 24.5 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4 23.4 MB
    07 - Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4 22.84 MB
    05 - Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4 22.34 MB
    08 - Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).mp4 22.06 MB
    03 - Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4 21.91 MB
    02 - Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4 21.87 MB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4 21.36 MB
    10 - Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4 21.22 MB
    02 - Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 21.17 MB
    09 - Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4 20.96 MB
    01 - Introduction ( Week 1 )/1 - 3 - History of cryptography (19 min).mp4 20.47 MB
    10 - Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4 20.06 MB
    02 - Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4 20.04 MB
    01 - Introduction ( Week 1 )/1 - 4 - Discrete probability (Crash course) (18 min).mp4 19.82 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4 19.82 MB
    10 - Intro. Number Theory (week 5)/10 - 3 - Modular e_'th roots (17 min)14.mp4 19.09 MB
    07 - Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).mp4 18.96 MB
    03 - Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).mp4 18.67 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).mp4 18.53 MB
    04- Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).mp4 17.96 MB
    03 - Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4 17.75 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4 17.22 MB
    05 - Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 17.06 MB
    01 - Introduction ( Week 1 )/1 - 2 - What is cryptography_ (15 min).mp4 17.01 MB
    02 - Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4 16.8 MB
    05 - Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4 16.55 MB
    06 - Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4 16.14 MB
    10 - Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4 15.7 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4 15.63 MB
    08 - Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4 15.62 MB
    08 - Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4 15.58 MB
    07 - Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4 14.99 MB
    01 - Introduction ( Week 1 )/1 - 5 - Discrete probability (crash course, cont.) (14 min).mp4 14.64 MB
    08 - Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4 14.57 MB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4 14.53 MB
    03 - Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4 14.52 MB
    07 - Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 14.02 MB
    10 - Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4 13.89 MB
    08 - Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4 13.21 MB
    07 - Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4 13.04 MB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4 12.93 MB
    03 - Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4 12.88 MB
    04- Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).mp4 12.72 MB
    06 - Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 12.58 MB
    09 - Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4 12.4 MB
    09 - Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4 12.22 MB
    06 - Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4 11.92 MB
    09 - Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4 11.83 MB
    02 - Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].mp4 11.73 MB
    01 - Introduction ( Week 1 )/1 - 1 - Course Overview (11 min).mp4 11.72 MB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4 11.29 MB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4 11.27 MB
    05 - Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4 11.18 MB
    07 - Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4 11.09 MB
    04- Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).mp4 10.44 MB
    06 - Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4 9.39 MB
    05 - Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4 9.3 MB
    06 - Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4 8.78 MB
    04- Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).mp4 7.98 MB
    06 - Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4 7.83 MB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4 5.73 MB
    07 - Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4 5.61 MB
    01 - Introduction ( Week 1 )/01.3-intro-annotated.pdf 1.39 MB
    03 - Block Ciphers (week 2)/03.2-block-annotated.pdf 1.06 MB
    07 - Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf 873.34 KB
    01 - Introduction ( Week 1 )/01.2-intro-annotated.pdf 866.09 KB
    03 - Block Ciphers (week 2)/03.5-block-annotated.pdf 808.05 KB
    07 - Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf 715.66 KB
    07 - Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf 685.97 KB
    07 - Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf 681.45 KB
    07 - Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf 672.57 KB
    02 - Stream Ciphers (week 1)/02.3-stream-annotated.pdf 593.05 KB
    08 - Odds and ends (week 4)/08.4-odds-and-ends.pdf 550.71 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf 549.58 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf 536.15 KB
    07 - Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf 533.29 KB
    01 - Introduction ( Week 1 )/01.4-intro-v2.pdf 532.22 KB
    08 - Odds and ends (week 4)/08.3-odds-and-ends.pdf 515.4 KB
    01 - Introduction ( Week 1 )/01.5-intro-v2.pdf 473.11 KB
    03 - Block Ciphers (week 2)/03.3-block-annotated.pdf 467.89 KB
    07 - Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf 461.98 KB
    02 - Stream Ciphers (week 1)/02.4-stream-annotated.pdf 452.05 KB
    08 - Odds and ends (week 4)/08.2-odds-and-ends.pdf 449.21 KB
    09 - Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf 434.87 KB
    03 - Block Ciphers (week 2)/03.6-block-annotated.pdf 434.19 KB
    03 - Block Ciphers (week 2)/03.4-block-annotated.pdf 419.63 KB
    04- Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf 387.28 KB
    02 - Stream Ciphers (week 1)/02.1-stream-annotated.pdf 380.28 KB
    08 - Odds and ends (week 4)/08.5-odds-and-ends.pdf 375.59 KB
    05 - Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf 348.08 KB
    02 - Stream Ciphers (week 1)/02.2-stream-annotated.pdf 331.5 KB
    08 - Odds and ends (week 4)/08.1-odds-and-ends.pdf 328.66 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf 320.82 KB
    04- Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf 316.89 KB
    01 - Introduction ( Week 1 )/01.1-intro-annotated.pdf 307.34 KB
    02 - Stream Ciphers (week 1)/02.5-stream-annotated.pdf 301.67 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf 294.64 KB
    03 - Block Ciphers (week 2)/03.1-block-annotated.pdf 290.57 KB
    10 - Intro. Number Theory (week 5)/10.3-numth-annotated.pdf 287.45 KB
    10 - Intro. Number Theory (week 5)/10.4-numth-annotated.pdf 269.58 KB
    09 - Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf 268.92 KB
    06 - Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf 267.74 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf 264.4 KB
    04- Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf 263.42 KB
    04- Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf 259.45 KB
    06 - Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf 258.63 KB
    06 - Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf 245.86 KB
    02 - Stream Ciphers (week 1)/02.6-stream-annotated.pdf 242.4 KB
    10 - Intro. Number Theory (week 5)/10.1-numth-annotated.pdf 241.83 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf 239.02 KB
    05 - Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf 236.25 KB
    10 - Intro. Number Theory (week 5)/10.5-numth-annotated.pdf 236.15 KB
    06 - Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf 232.22 KB
    06 - Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf 230.19 KB
    09 - Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf 229.86 KB
    05 - Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf 223.58 KB
    09 - Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf 223.1 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf 211.62 KB
    02 - Stream Ciphers (week 1)/02.7-stream-annotated.pdf 210.13 KB
    04- Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf 204.65 KB
    06 - Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf 200.02 KB
    05 - Message Integrity (week 3)/05.4-integrity-mac-padding.pdf 199.94 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf 196.6 KB
    05 - Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf 194.29 KB
    10 - Intro. Number Theory (week 5)/10.2-numth-annotated.pdf 187.29 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf 184.75 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf 179.3 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf 166.27 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).srt 37.11 KB
    02 - Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).srt 35.79 KB
    02 - Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).srt 34.8 KB
    04- Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).srt 34.34 KB
    03 - Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).srt 31.32 KB
    08 - Odds and ends (week 4)/8 - 3 - Deterministic Encryption_SIV and wide PRP (21 min).srt 30.87 KB
    07 - Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).srt 30.67 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).srt 30.62 KB
    09 - Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).srt 29.2 KB
    05 - Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).srt 29.15 KB
    02 - Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).srt 28.39 KB
    02 - Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).srt 27.69 KB
    10 - Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).srt 27.61 KB
    03 - Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).srt 27.31 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function_ (17 min).srt 26.84 KB
    07 - Authenticated Encryption (week 4)/7 - 5 - Case study_ TLS (18 min).srt 26.38 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).srt 26.14 KB
    01 - Introduction ( Week 1 )/1 - 3 - History of cryptography (19 min).srt 26.08 KB
    02 - Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).srt 25.63 KB
    10 - Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).srt 25.59 KB
    01 - Introduction ( Week 1 )/1 - 2 - What is cryptography_ (15 min).srt 25.42 KB
    01 - Introduction ( Week 1 )/1 - 4 - Discrete probability (Crash course) (18 min).srt 25.35 KB
    03 - Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).srt 25.03 KB
    03 - Block Ciphers (week 2)/3 - 1 - What are block ciphers_ (17 min).srt 24.94 KB
    04- Using Block Ciphers (week 2)/4 - 4 - Modes of operation_ many time key (CBC) (16 min).srt 24.42 KB
    05 - Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).srt 24.36 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).srt 24.21 KB
    02 - Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).srt 23.97 KB
    05 - Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).srt 23.42 KB
    08 - Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).srt 22.99 KB
    10 - Intro. Number Theory (week 5)/10 - 3 - Modular e_'th roots (17 min)14.srt 22.91 KB
    08 - Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).srt 22.03 KB
    06 - Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).srt 21.99 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).srt 21.57 KB
    08 - Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).srt 21.44 KB
    07 - Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).srt 21.21 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).srt 20.95 KB
    03 - Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).srt 20.24 KB
    01 - Introduction ( Week 1 )/1 - 5 - Discrete probability (crash course, cont.) (14 min).srt 20.02 KB
    09 - Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).srt 19.67 KB
    07 - Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).srt 19.52 KB
    10 - Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).srt 19.28 KB
    07 - Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).srt 18.7 KB
    08 - Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).srt 18.54 KB
    10 - Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).srt 18.07 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).srt 17.78 KB
    03 - Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).srt 17.47 KB
    06 - Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).srt 17.34 KB
    09 - Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).srt 17.32 KB
    09 - Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).srt 16.95 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).srt 16.81 KB
    04- Using Block Ciphers (week 2)/4 - 1 - Review_ PRPs and PRFs (12 min).srt 16.8 KB
    01 - Introduction ( Week 1 )/1 - 1 - Course Overview (11 min).srt 16.76 KB
    06 - Collision Resistance (week 3)/6 - 1 - Introduction (11 min).srt 16.7 KB
    11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .srt 16.52 KB
    02 - Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min) [optional].srt 16.21 KB
    05 - Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).srt 15.36 KB
    07 - Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).srt 14.91 KB
    04- Using Block Ciphers (week 2)/4 - 5 - Modes of operation_ many time key (CTR) (10 min).srt 14.15 KB
    06 - Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).srt 13.35 KB
    05 - Message Integrity (week 3)/5 - 4 - MAC padding (9 min).srt 13.18 KB
    06 - Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).srt 12.89 KB
    04- Using Block Ciphers (week 2)/4 - 2 - Modes of operation_ one time key (8 min).srt 11.84 KB
    06 - Collision Resistance (week 3)/6 - 5 - HMAC (7 min).srt 10.06 KB
    12 - Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).srt 9.04 KB
    07 - Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).srt 8.27 KB

Download Info

  • Tips

    “Stanford - Cryptography I” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.