O`REILLY - Secret Key Cryptography 2022-8

mp4   Hot:2   Size:2.57 GB   Created:2024-06-16 12:39:02   Update:2024-06-16 14:56:31  

File List

  • 106. Chapter 18. Minimization.mp4 37.17 MB
    002. Chapter 2. What is cryptography.mp4 21.84 MB
    003. Chapter 2. Types of cryptography.mp4 29.37 MB
    004. Chapter 2. Mechanical vs. digital.mp4 30.96 MB
    005. Chapter 2. Why choose Secret Key.mp4 25.64 MB
    006. Chapter 3. Preliminary concepts.mp4 17.95 MB
    007. Chapter 3. Number bases.mp4 18.99 MB
    008. Chapter 3. Prime numbers.mp4 21.42 MB
    009. Chapter 4. Cryptographer’s toolbox.mp4 29.25 MB
    010. Chapter 4. Transposition.mp4 22.76 MB
    011. Chapter 4. Chained digit generator.mp4 20.78 MB
    012. Chapter 5. Substitution ciphers.mp4 14.23 MB
    013. Chapter 5. Simple substitution.mp4 11.8 MB
    014. Chapter 5. Mixing the alphabet.mp4 17.77 MB
    015. Chapter 5. Nomenclators.mp4 18.75 MB
    016. Chapter 5. The Kasiski method.mp4 24.23 MB
    017. Chapter 5. Index of Coincidence.mp4 21.15 MB
    018. Chapter 5. Solving a polyalphabetic cipher.mp4 20.9 MB
    019. Chapter 5. Solving a general polyalphabetic cipher.mp4 21.43 MB
    020. Chapter 5. Running key.mp4 29.32 MB
    021. Chapter 5. Simulated rotor machines.mp4 23.06 MB
    022. Chapter 5. Three-rotor machine.mp4 28.6 MB
    023. Chapter 6. Countermeasures.mp4 19.55 MB
    024. Chapter 6. Interrupted key.mp4 28.24 MB
    025. Chapter 6. Bigram and trigram substitution.mp4 24.6 MB
    026. Chapter 6. Adding null bits.mp4 32.42 MB
    027. Chapter 7. Transposition.mp4 23.91 MB
    028. Chapter 7. Columnar transposition.mp4 20.29 MB
    029. Chapter 7. Double columnar transposition.mp4 28.31 MB
    030. Chapter 7. Key transposition Part 1.mp4 18.87 MB
    031. Chapter 7. Key transposition Part 2.mp4 16.46 MB
    032. Chapter 8. Jefferson Wheel Cypher.mp4 36.47 MB
    033. Chapter 8. Ciphertext-only solution.mp4 21.47 MB
    034. Chapter 9. Fractionation.mp4 28.71 MB
    035. Chapter 9. Solving a Playfair cipher.mp4 25.18 MB
    036. Chapter 9. Three Square.mp4 24.87 MB
    037. Chapter 9. Bifid.mp4 22.89 MB
    038. Chapter 9. Diagonal bifid.mp4 23.66 MB
    039. Chapter 9. Rectangular grids.mp4 25.29 MB
    040. Chapter 9. Cyclic 8×N.mp4 19.15 MB
    041. Chapter 10. Variable-length fractionation.mp4 21.62 MB
    042. Chapter 10. Periodic lengths.mp4 23.2 MB
    043. Chapter 10. Post tag systems.mp4 31.24 MB
    044. Chapter 10. Different-length tags.mp4 29.74 MB
    045. Chapter 10. Text compression.mp4 30.33 MB
    046. Chapter 10. Arithmetic coding.mp4 28.5 MB
    047. Chapter 10. Adaptive arithmetic coding.mp4 26.04 MB
    048. Chapter 11. Block ciphers.mp4 34.41 MB
    049. Chapter 11. Double DES.mp4 21.29 MB
    050. Chapter 11. Matrix multiplication.mp4 26.22 MB
    051. Chapter 11. Fixed vs. keyed substitution.mp4 22.75 MB
    052. Chapter 11. Involutory block cipher.mp4 19.74 MB
    053. Chapter 11. Ripple ciphers.mp4 26.39 MB
    054. Chapter 11. Block chaining.mp4 23.01 MB
    055. Chapter 11. Chaining mode summary.mp4 16.53 MB
    056. Chapter 12. Principles for secure encryption.mp4 22.43 MB
    057. Chapter 12. Confusion.mp4 34.29 MB
    058. Chapter 12. Correlation coefficient.mp4 19.62 MB
    059. Chapter 12. Base-26 linearity.mp4 30.4 MB
    060. Chapter 12. Base-256 linearity.mp4 19.01 MB
    061. Chapter 12. Adding a backdoor.mp4 18.68 MB
    062. Chapter 12. Condensed linearity.mp4 20.3 MB
    063. Chapter 12. Constructing an S-box.mp4 29.43 MB
    064. Chapter 12. Diffusion.mp4 23.63 MB
    065. Chapter 12. Saturation Part 1.mp4 17.93 MB
    066. Chapter 12. Saturation Part 2.mp4 20.65 MB
    067. Chapter 13. Stream ciphers.mp4 22.84 MB
    068. Chapter 13. Multiplicative congruential generator Part 1.mp4 27.3 MB
    069. Chapter 13. Multiplicative congruential generator Part 2.mp4 18.27 MB
    070. Chapter 13. Linear congruential generator.mp4 23.57 MB
    071. Chapter 13. Chained addition generator.mp4 20.43 MB
    072. Chapter 13. Mersenne Twister.mp4 26.74 MB
    073. Chapter 13. Estimating the period.mp4 24.26 MB
    074. Chapter 13. Combining generators Part 1.mp4 24.12 MB
    075. Chapter 13. Combining generators Part 2.mp4 23.2 MB
    076. Chapter 13. True random numbers.mp4 18.38 MB
    077. Chapter 13. Refreshing the random bytes.mp4 33.1 MB
    078. Chapter 13. Hash functions.mp4 18.2 MB
    079. Chapter 14. One-time pad.mp4 31.96 MB
    080. Chapter 14. Key supply.mp4 33.84 MB
    081. Chapter 14. Diffie-Hellman key exchange.mp4 36.63 MB
    082. Chapter 14. Constructing large primes, new Part 1.mp4 35.12 MB
    083. Chapter 14. Constructing large primes, new Part 2.mp4 31.09 MB
    084. Chapter 15. Matrix methods.mp4 13.39 MB
    085. Chapter 15. Transposition matrix.mp4 32.8 MB
    086. Chapter 15. Hill cipher, computer versions.mp4 30.18 MB
    087. Chapter 15. Large integer multiplication.mp4 23.57 MB
    088. Chapter 15. Solving a linear congruence.mp4 18.11 MB
    089. Chapter 15. Laddering.mp4 12.95 MB
    090. Chapter 15. Large integer ciphers.mp4 26.3 MB
    091. Chapter 15. Multiplication modulo P.mp4 22.99 MB
    092. Chapter 15. Rings.mp4 20.19 MB
    093. Chapter 15. Matrices over a ring.mp4 26.98 MB
    094. Chapter 15. Finding an invertible matrix.mp4 14.78 MB
    095. Chapter 16. Three pass protocol.mp4 30.52 MB
    096. Chapter 16. Discrete logarithm.mp4 23.82 MB
    097. Chapter 16. Factoring.mp4 25.5 MB
    098. Chapter 16. Matrix three pass protocol.mp4 26.52 MB
    099. Chapter 16. Maximum order.mp4 22.83 MB
    100. Chapter 16. Solving bilinear equations.mp4 27.33 MB
    101. Chapter 16. Two-sided three pass protocol.mp4 18.05 MB
    102. Chapter 17. Codes.mp4 27.75 MB
    103. Chapter 18. Quantum computers.mp4 29.84 MB
    104. Chapter 18. Error correction.mp4 32.27 MB
    105. Chapter 18. Equations.mp4 16.6 MB
    001. Chapter 1. Introduction.mp4 18.33 MB
    107. Chapter 18. Ultracomputers.mp4 23.9 MB
    108. Chapter 18. Ultrasubstitution cipher US-A.mp4 14.96 MB
    109. Epilogue.mp4 13.63 MB
    Read me.txt 108 B

Download Info

  • Tips

    “O`REILLY - Secret Key Cryptography 2022-8” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.