[Coursera] Cryptography I by Dan Boneh

seeders: 0
leechers: 11
Added on January 17, 2016 by bruno.coutinho.94in Movies
Torrent verified.



[Coursera] Cryptography I by Dan Boneh (Size: 1.14 GB)
 A Computational Introduction to Number Theory and Algebra.pdf3.48 MB
 Course Overview.pdf86.52 KB
 Cryptography.jpg3.2 MB
 Final Exam.pdf1.62 MB
 High School Mathematics Extensions - Discrete Probability.pdf271.82 KB
 syllabus.pdf83.54 KB
 1.1 - Course Overview.mp411.72 MB
 1.1 - Course Overview.pdf307.34 KB
 1.1 - Course Overview.pptx293.19 KB
 1.1 - Course Overview.txt11.48 KB
 1.2 - What is cryptography.mp417.01 MB
 1.2 - What is cryptography.pdf866.09 KB
 1.2 - What is cryptography.pptx1.03 MB
 1.2 - What is cryptography.txt17.36 KB
 1.3 - History of cryptography.mp420.47 MB
 1.3 - History of cryptography.pdf1.39 MB
 02.1-stream-annotated.pdf380.28 KB
 02.1-stream-annotated.pptx1.54 MB
 02.2-stream-annotated.pdf331.5 KB
 02.2-stream-annotated.pptx1.15 MB
 02.3-stream-annotated.pdf593.05 KB
 02.3-stream-annotated.pptx1.04 MB
 02.4-stream-annotated.pdf452.05 KB
 02.4-stream-annotated.pptx732.52 KB
 02.5-stream-annotated.pdf301.67 KB
 02.5-stream-annotated.pptx1.33 MB
 1.1 - Course Overview.pdf307.34 KB
 1.1 - Course Overview.pptx293.19 KB
 1.1 - Course Overview.txt11.48 KB
 1.2 - What is cryptography.pdf866.09 KB
 1.2 - What is cryptography.pptx1.03 MB
 1.2 - What is cryptography.txt17.36 KB
 1.3 - History of cryptography.mp420.47 MB
 1.3 - History of cryptography.pdf1.39 MB
 1.3 - History of cryptography.pptx1.57 MB
 1.3 - History of cryptography.txt17.8 KB
 03.1-block-annotated.pdf290.57 KB
 03.1-block-annotated.pptx224.32 KB
 03.2-block-annotated.pdf1.06 MB
 03.2-block-annotated.pptx809.2 KB
 03.3-block-annotated.pdf467.89 KB
 03.3-block-annotated.pptx622.09 KB
 03.4-block-annotated.pdf419.63 KB
 03.4-block-annotated.pptx524.22 KB
 03.5-block-annotated.pdf808.05 KB
 03.5-block-annotated.pptx435.02 KB
 04.1-using-block-annotated.pdf259.45 KB
 04.1-using-block-annotated.pptx415.3 KB
 04.2-using-block-annotated.pdf387.28 KB
 04.2-using-block-annotated.pptx399.32 KB
 04.3-using-block-annotated.pdf316.89 KB
 04.3-using-block-annotated.pptx318.07 KB
 04.4-using-block-annotated.pdf263.42 KB
 04.4-using-block-annotated.pptx366.22 KB
 04.5-using-block-annotated.pdf204.65 KB
 04.5-using-block-annotated.pptx223.83 KB
 Week 2 - Problem Set.pdf198.24 KB
 Week 2 - Programming Assignment.pdf94.72 KB
 05.1-integrity-message-authentication-codes.pdf236.25 KB
 05.1-integrity-message-authentication-codes.pptx279.99 KB
 05.2-integrity-macs-based-on-PRFs.pdf194.29 KB
 05.2-integrity-macs-based-on-PRFs.pptx283.57 KB
 05.3-integrity-cbc-mac-and-nmac.pdf348.08 KB
 05.3-integrity-cbc-mac-and-nmac.pptx325.45 KB
 05.4-integrity-mac-padding.pdf199.94 KB
 05.4-integrity-mac-padding.pptx249.32 KB
 05.5-integrity-a-parallel-mac.pdf223.58 KB
 05.5-integrity-a-parallel-mac.pptx240.7 KB
 06.1-collision-resistance-introduction.pdf230.19 KB
 06.1-collision-resistance-introduction.pptx204.39 KB
 06.2-collision-resistance-generic-birthday-attack.pdf245.86 KB
 06.2-collision-resistance-generic-birthday-attack.pptx514.73 KB
 06.3-collision-resistance-the-merkle-damgard-paradigm.pdf258.63 KB
 06.3-collision-resistance-the-merkle-damgard-paradigm.pptx817.76 KB
 06.4-collision-resistance-constructing-compression-functions.pdf232.22 KB
 06.4-collision-resistance-constructing-compression-functions.pptx240.14 KB
 06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pdf200.02 KB
 06.5-collision-resistance-HMAC-a-MAC-from-SHA-256.pptx243.33 KB
 Week 3 - Problem Set.pdf1.1 MB
 Week 3 - Programming Assignment.pdf914.33 KB
 07.1-authenc-annotated.pdf873.34 KB
 07.1-authenc-annotated.pptx547.85 KB
 07.2-authenc-annotated.pdf533.29 KB
 07.2-authenc-annotated.pptx222.28 KB
 07.3-authenc-annotated.pptx261.9 KB
 07.4-authenc-annotated.pdf685.97 KB
 07.4-authenc-annotated.pptx246.32 KB
 07.5-authenc-annotated.pdf672.57 KB
 07.5-authenc-annotated.pptx351.07 KB
 07.6-authenc-annotated.pdf715.66 KB
 08.1-odds-and-ends.pdf328.66 KB
 08.1-odds-and-ends.pptx205.82 KB
 08.2-odds-and-ends.pdf449.21 KB
 08.2-odds-and-ends.pptx264.1 KB
 08.3-odds-and-ends.pdf515.4 KB
 08.3-odds-and-ends.pptx512.96 KB
 08.4-odds-and-ends.pdf550.71 KB
 08.4-odds-and-ends.pptx449.88 KB
 08.5-odds-and-ends.pdf375.59 KB
 08.5-odds-and-ends.pptx239.28 KB
 Week 4 - Problem Set.pdf150.57 KB
 Week 4 - programming project.pdf135.3 KB
 09.1-basic-key-exchange-annotated.pdf223.1 KB
 09.1-basic-key-exchange-annotated.pptx602.48 KB
 09.2-basic-key-exchange-annotated.pdf229.86 KB
 09.2-basic-key-exchange-annotated.pptx210.22 KB
 09.3-basic-key-exchange-annotated.pdf434.87 KB
 09.3-basic-key-exchange-annotated.pptx735.2 KB
 09.4-basic-key-exchange-annotated.pdf268.92 KB
 09.4-basic-key-exchange-annotated.pptx478.41 KB
 9 - 1 - Trusted 3rd parties (11 min).mp412.22 MB
 9 - 1 - Trusted 3rd parties (11 min).txt11.9 KB
 10 - 1 - Notation (15 min).mp415.7 MB
 10 - 1 - Notation (15 min).txt13.08 KB
 10 - 2 - Fermat and Euler (18 min).mp420.06 MB
 10 - 2 - Fermat and Euler (18 min).txt17.49 KB
 10 - 3 - Modular e-'th roots (17 min)14.mp419.09 MB
 10 - 3 - Modular e-'th roots (17 min)14.txt15.48 KB
 10 - 4 - Arithmetic algorithms (13 min).mp413.89 MB
 10 - 4 - Arithmetic algorithms (13 min).txt12.35 KB
 10 - 5 - Intractable problems (19 min).mp421.22 MB
 10 - 5 - Intractable problems (19 min).txt18.55 KB
 Week 5 - Problem Set.pdf118.92 KB
 Week 5 - Programming Assignment.pdf83 KB
 11 - 1 - Definitions and security (16 min).mp417.22 MB
 11 - 1 - Definitions and security (16 min).txt16.56 KB
 11 - 2 - Constructions (11 min).mp411.29 MB
 11 - 2 - Constructions (11 min).txt11.32 KB
 11 - 3 - The RSA trapdoor permutation (18 min).mp419.82 MB
 11 - 3 - The RSA trapdoor permutation (18 min).txt17.9 KB
 11 - 4 - PKCS 1 (23 min).mp423.4 MB
 11 - 4 - PKCS 1 (23 min).txt20.93 KB
 11 - 5 - Is RSA a one-way function- (17 min).mp418.53 MB
 11 - 5 - Is RSA a one-way function- (17 min).txt16.85 KB
 12 - 1 - The ElGamal Public-key System (23 min).mp421.36 MB
 12 - 1 - The ElGamal Public-key System (23 min).txt21.37 KB
 12 - 2 - ElGamal Security (14 min).mp414.53 MB
 12 - 2 - ElGamal Security (14 min).txt14.74 KB
 12 - 3 - ElGamal Variants With Better Security (11 min).mp411.27 MB
 12 - 3 - ElGamal Variants With Better Security (11 min).txt11.54 KB
 12 - 4 - A Unifying Theme (12 min).mp412.93 MB
 12 - 4 - A Unifying Theme (12 min).txt12.17 KB
 12 - 5 - Farewell (for now) (6 min).mp45.73 MB
 12 - 5 - Farewell (for now) (6 min).txt6.23 KB
 Week 6 - Problem Set.pdf148.26 KB
 Week 6 - Programming Assignment.pdf1.42 MB


Sharing Widget


Download torrent
1.14 GB
seeders:0
leechers:11
[Coursera] Cryptography I by Dan Boneh