TorBT - Torrents and Magnet Links Search Engine

Stanford

File Name
Size
2 - Stream Ciphers (week 1)/2 - 5 - PRG Security Definitions (25 min).mp4
27 MB
2 - Stream Ciphers (week 1)/2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4
25 MB
4 - Using Block Ciphers (week 2)/4 - 3 - Security for many-time key (23 min).mp4
25 MB
3 - Block Ciphers (week 2)/3 - 2 - The Data Encryption Standard (22 min).mp4
24 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 4 - PKCS 1 (23 min).mp4
23 MB
7 - Authenticated Encryption (week 4)/7 - 4 - Constructions from ciphers and MACs (21 min).mp4
23 MB
5 - Message Integrity (week 3)/5 - 3 - CBC-MAC and NMAC (20 min).mp4
22 MB
8 - Odds and ends (week 4)/8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4
22 MB
3 - Block Ciphers (week 2)/3 - 3 - Exhaustive search attacks (20 min).mp4
22 MB
2 - Stream Ciphers (week 1)/2 - 4 - Real-world stream ciphers (20 min).mp4
22 MB
12 - Public key encryption from Diffie-Hellman (week 6)/12 - 1 - The ElGamal Public-key System (23 min).mp4
21 MB
10 - Intro. Number Theory (week 5)/10 - 5 - Intractable problems (19 min).mp4
21 MB
2 - Stream Ciphers (week 1)/2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4
21 MB
9 - Basic key exchange (week 5)/9 - 3 - The Diffie-Hellman protocol (19 min).mp4
21 MB
1 - Introduction (week 1)/1 - 3 - History of cryptography (19 min).mp4
20 MB
10 - Intro. Number Theory (week 5)/10 - 2 - Fermat and Euler (18 min).mp4
20 MB
2 - Stream Ciphers (week 1)/2 - 1 - Information theoretic security and the one time pad (19 min).mp4
20 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 3 - The RSA trapdoor permutation (18 min).mp4
20 MB
10 - Intro. Number Theory (week 5)/10 - 3 - Modular e'th roots (17 min).mp4
19 MB
7 - Authenticated Encryption (week 4)/7 - 5 - Case study TLS (18 min).mp4
19 MB
3 - Block Ciphers (week 2)/3 - 1 - What are block ciphers- (17 min).mp4
19 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 5 - Is RSA a one-way function (17 min).mp4
18 MB
4 - Using Block Ciphers (week 2)/4 - 4 - Modes of operation many time key (CBC) (16 min).mp4
18 MB
3 - Block Ciphers (week 2)/3 - 4 - More attacks on block ciphers (16 min).mp4
18 MB
1 - Introduction (week 1)/1 - 4 - Discrete probability (16 min).mp4
18 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 1 - Definitions and security (16 min).mp4
17 MB
5 - Message Integrity (week 3)/5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4
17 MB
1 - Introduction (week 1)/1 - 2 - What is cryptography- (15 min).mp4
17 MB
2 - Stream Ciphers (week 1)/2 - 6 - Semantic Security (16 min).mp4
17 MB
5 - Message Integrity (week 3)/5 - 1 - Message Authentication Codes (16 min).mp4
17 MB
6 - Collision Resistance (week 3)/6 - 2 - Generic birthday attack (16 min).mp4
16 MB
10 - Intro. Number Theory (week 5)/10 - 1 - Notation (15 min).mp4
16 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 6 - RSA in practice (14 min).mp4
16 MB
8 - Odds and ends (week 4)/8 - 2 - Deterministic Encryption (15 min).mp4
16 MB
8 - Odds and ends (week 4)/8 - 4 - Tweakable encryption (15 min).mp4
16 MB
7 - Authenticated Encryption (week 4)/7 - 6 - CBC padding attacks (14 min).mp4
15 MB
8 - Odds and ends (week 4)/8 - 1 - Key Derivation (14 min).mp4
15 MB
12 - Public key encryption from Diffie-Hellman (week 6)/12 - 2 - ElGamal Security (14 min).mp4
14 MB
3 - Block Ciphers (week 2)/3 - 5 - The AES block cipher (14 min).mp4
14 MB
7 - Authenticated Encryption (week 4)/7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4
14 MB
10 - Intro. Number Theory (week 5)/10 - 4 - Arithmetic algorithms (13 min).mp4
14 MB
8 - Odds and ends (week 4)/8 - 5 - Format preserving encryption (13 min).mp4
13 MB
7 - Authenticated Encryption (week 4)/7 - 3 - Chosen ciphertext attacks (12 min).mp4
13 MB
12 - Public key encryption from Diffie-Hellman (week 6)/12 - 4 - A Unifying Theme (12 min).mp4
13 MB
3 - Block Ciphers (week 2)/3 - 6 - Block ciphers from PRGs(12 min).mp4
13 MB
4 - Using Block Ciphers (week 2)/4 - 1 - Review PRPs and PRFs (12 min).mp4
13 MB
6 - Collision Resistance (week 3)/6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4
13 MB
9 - Basic key exchange (week 5)/9 - 2 - Merkle Puzzles (11 min).mp4
12 MB
9 - Basic key exchange (week 5)/9 - 1 - Trusted 3rd parties (11 min).mp4
12 MB
6 - Collision Resistance (week 3)/6 - 1 - Introduction (11 min).mp4
12 MB
9 - Basic key exchange (week 5)/9 - 4 - Public-key encryption (11 min).mp4
12 MB
2 - Stream Ciphers (week 1)/2 - 7 - Stream ciphers are semantically secure (11 min).mp4
12 MB
1 - Introduction (week 1)/1 - 1 - Course Overview (11 min).mp4
12 MB
11 - Public Key Encryption from trapdoor permutations (week 6)/11 - 2 - Constructions (11 min) .mp4
11 MB
12 - Public key encryption from Diffie-Hellman (week 6)/12 - 3 - ElGamal Variants With Better Security (11 min).mp4
11 MB
5 - Message Integrity (week 3)/5 - 2 - MACs Based On PRFs (10 min).mp4
11 MB
7 - Authenticated Encryption (week 4)/7 - 7 - Attacking non-atomic decryption (10 min).mp4
11 MB
4 - Using Block Ciphers (week 2)/4 - 5 - Modes of operation many time key (CTR) (10 min).mp4
10 MB
6 - Collision Resistance (week 3)/6 - 6 - Timing attacks on MAC verification (9 min).mp4
9.4 MB
5 - Message Integrity (week 3)/5 - 4 - MAC padding (9 min).mp4
9.3 MB
6 - Collision Resistance (week 3)/6 - 4 - Constructing compression functions (8 min).mp4
8.8 MB
4 - Using Block Ciphers (week 2)/4 - 2 - Modes of operation one time key (8 min).mp4
8.0 MB
6 - Collision Resistance (week 3)/6 - 5 - HMAC (7 min).mp4
7.8 MB
12 - Public key encryption from Diffie-Hellman (week 6)/12 - 5 - Farewell (for now) (6 min).mp4
5.7 MB
7 - Authenticated Encryption (week 4)/7 - 2 - Definitions (6 min).mp4
5.6 MB
1 - Introduction (week 1)/01.3-intro-annotated.pdf
1.4 MB
3 - Block Ciphers (week 2)/03.2-block-annotated.pdf
1.1 MB
7 - Authenticated Encryption (week 4)/07.1-authenc-annotated.pdf
873 kB
1 - Introduction (week 1)/01.2-intro-annotated.pdf
866 kB
3 - Block Ciphers (week 2)/03.5-block-annotated.pdf
808 kB
7 - Authenticated Encryption (week 4)/07.6-authenc-annotated.pdf
716 kB
7 - Authenticated Encryption (week 4)/07.4-authenc-annotated.pdf
686 kB
7 - Authenticated Encryption (week 4)/07.3-authenc-annotated.pdf
681 kB
7 - Authenticated Encryption (week 4)/07.5-authenc-annotated.pdf
673 kB
2 - Stream Ciphers (week 1)/02.3-stream-annotated.pdf
593 kB
8 - Odds and ends (week 4)/08.4-odds-and-ends.pdf
551 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.1-pubkey-trapdoor.pdf
550 kB
12 - Public key encryption from Diffie-Hellman (week 6)/12.1-pubkey-dh.pdf
536 kB
7 - Authenticated Encryption (week 4)/07.2-authenc-annotated.pdf
533 kB
8 - Odds and ends (week 4)/08.3-odds-and-ends.pdf
515 kB
3 - Block Ciphers (week 2)/03.3-block-annotated.pdf
468 kB
7 - Authenticated Encryption (week 4)/07.7-authenc-annotated.pdf
462 kB
2 - Stream Ciphers (week 1)/02.4-stream-annotated.pdf
452 kB
8 - Odds and ends (week 4)/08.2-odds-and-ends.pdf
449 kB
9 - Basic key exchange (week 5)/09.3-basic-key-exchange-annotated.pdf
435 kB
3 - Block Ciphers (week 2)/03.6-block-annotated.pdf
434 kB
3 - Block Ciphers (week 2)/03.4-block-annotated.pdf
420 kB
4 - Using Block Ciphers (week 2)/04.2-using-block-annotated.pdf
387 kB
2 - Stream Ciphers (week 1)/02.1-stream-annotated.pdf
380 kB
8 - Odds and ends (week 4)/08.5-odds-and-ends.pdf
376 kB
5 - Message Integrity (week 3)/05.3-integrity-cbc-mac-and-nmac.pdf
348 kB
2 - Stream Ciphers (week 1)/02.2-stream-annotated.pdf
332 kB
8 - Odds and ends (week 4)/08.1-odds-and-ends.pdf
329 kB
12 - Public key encryption from Diffie-Hellman (week 6)/12.5-pubkey-dh.pdf
321 kB
4 - Using Block Ciphers (week 2)/04.3-using-block-annotated.pdf
317 kB
1 - Introduction (week 1)/01.4-intro-annotated.pdf
308 kB
1 - Introduction (week 1)/01.1-intro-annotated.pdf
307 kB
2 - Stream Ciphers (week 1)/02.5-stream-annotated.pdf
302 kB
12 - Public key encryption from Diffie-Hellman (week 6)/12.2-pubkey-dh.pdf
295 kB
3 - Block Ciphers (week 2)/03.1-block-annotated.pdf
291 kB
10 - Intro. Number Theory (week 5)/10.3-numth-annotated.pdf
287 kB
10 - Intro. Number Theory (week 5)/10.4-numth-annotated.pdf
270 kB
9 - Basic key exchange (week 5)/09.4-basic-key-exchange-annotated.pdf
269 kB
6 - Collision Resistance (week 3)/06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf
268 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.4-pubkey-trapdoor.pdf
264 kB
4 - Using Block Ciphers (week 2)/04.4-using-block-annotated.pdf
263 kB
4 - Using Block Ciphers (week 2)/04.1-using-block-annotated.pdf
260 kB
6 - Collision Resistance (week 3)/06.3-collision-resistance-the-merkle-damgard-paradigm.pdf
259 kB
6 - Collision Resistance (week 3)/06.2-collision-resistance-generic-birthday-attack.pdf
246 kB
2 - Stream Ciphers (week 1)/02.6-stream-annotated.pdf
242 kB
10 - Intro. Number Theory (week 5)/10.1-numth-annotated.pdf
242 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.3-pubkey-trapdoor.pdf
239 kB
5 - Message Integrity (week 3)/05.1-integrity-message-authentication-codes.pdf
236 kB
10 - Intro. Number Theory (week 5)/10.5-numth-annotated.pdf
236 kB
6 - Collision Resistance (week 3)/06.4-collision-resistance-constructing-compression-functions.pdf
232 kB
6 - Collision Resistance (week 3)/06.1-collision-resistance-introduction.pdf
230 kB
9 - Basic key exchange (week 5)/09.2-basic-key-exchange-annotated.pdf
230 kB
5 - Message Integrity (week 3)/05.5-integrity-a-parallel-mac.pdf
224 kB
9 - Basic key exchange (week 5)/09.1-basic-key-exchange-annotated.pdf
223 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.2-pubkey-trapdoor.pdf
212 kB
2 - Stream Ciphers (week 1)/02.7-stream-annotated.pdf
210 kB
4 - Using Block Ciphers (week 2)/04.5-using-block-annotated.pdf
205 kB
6 - Collision Resistance (week 3)/06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf
200 kB
5 - Message Integrity (week 3)/05.4-integrity-mac-padding.pdf
200 kB
12 - Public key encryption from Diffie-Hellman (week 6)/12.4-pubkey-dh.pdf
197 kB
5 - Message Integrity (week 3)/05.2-integrity-macs-based-on-PRFs.pdf
194 kB
10 - Intro. Number Theory (week 5)/10.2-numth-annotated.pdf
187 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.6-pubkey-trapdoor.pdf
185 kB
12 - Public key encryption from Diffie-Hellman (week 6)/12.3-pubkey-dh.pdf
179 kB
11 - Public Key Encryption from trapdoor permutations (week 6)/11.5-pubkey-trapdoor.pdf
166 kB