RAR-files |
impart-rn224.rar |
15,000,000 |
0482701C |
impart-rn224.r00 |
15,000,000 |
8800BE32 |
impart-rn224.r01 |
15,000,000 |
90BA4C62 |
impart-rn224.r02 |
15,000,000 |
7EA29AFF |
impart-rn224.r03 |
15,000,000 |
5CE204D2 |
impart-rn224.r04 |
15,000,000 |
AED365F0 |
impart-rn224.r05 |
15,000,000 |
9844CD54 |
impart-rn224.r06 |
15,000,000 |
24BE1B87 |
impart-rn224.r07 |
15,000,000 |
492C0929 |
impart-rn224.r08 |
15,000,000 |
25D691CC |
impart-rn224.r09 |
15,000,000 |
304EF6AF |
impart-rn224.r10 |
15,000,000 |
BAB119A3 |
impart-rn224.r11 |
15,000,000 |
B0961538 |
impart-rn224.r12 |
15,000,000 |
F6B0E425 |
impart-rn224.r13 |
15,000,000 |
1A5D5F3B |
impart-rn224.r14 |
15,000,000 |
C4F88331 |
impart-rn224.r15 |
15,000,000 |
E59EBD48 |
impart-rn224.r16 |
8,972,830 |
4EAA0412 |
|
Total size: |
263,972,830 |
|
|
Archived
files |
01 - Introduction\01 - Cryptography is everywhere.mp4
[5dfa53a322e122de]
|
2,267,523 |
55F13F89 |
01 - Introduction\02 - Basic terminology.mp4
[a84c4b08e2927d15]
|
3,808,272 |
2B6AC2D5 |
01 - Introduction\03 - Intro to Codespaces.mp4
[8a230d42777880c7]
|
4,479,651 |
42D90569 |
02 - Symmetric Cryptography Overview\01 - Cryptography's role.mp4
[7484491e242aca7d]
|
6,137,693 |
776CCBC8 |
02 - Symmetric Cryptography Overview\02 - Kerckhoffs's principle.mp4
[febc4c3861d218ca]
|
7,961,908 |
08A359E4 |
02 - Symmetric Cryptography Overview\03 - Symmetric keys.mp4
[320d666fde0f336f]
|
6,260,460 |
B4DEBFCD |
02 - Symmetric Cryptography Overview\04 - Block vs. stream ciphers.mp4
[f7d35cb79421a85f]
|
5,918,500 |
4EE3A2DD |
02 - Symmetric Cryptography Overview\05 - Cryptographic hash algorithms.mp4
[43be065de8d8ba79]
|
5,819,801 |
ED6BD6B5 |
02 - Symmetric Cryptography Overview\06 - Challenge Building a hash algorithm.mp4
[dd66a18a10a824d3]
|
6,621,479 |
6126E2A3 |
02 - Symmetric Cryptography Overview\07 - Solution Building a hash algorithm.mp4
[e83aea50722e5909]
|
5,234,498 |
8D07560A |
03 - Representing and Manipulating Binary Data\01 - Binary representation.mp4
[5de35136156bfc4c]
|
6,216,170 |
FA5AA2D5 |
03 - Representing and Manipulating Binary Data\02 - Characters.mp4
[45737048837bd5e2]
|
9,321,414 |
5DBA007F |
03 - Representing and Manipulating Binary Data\03 - Integers.mp4
[4aad6297e671ffbf]
|
7,732,624 |
CEDACDAC |
03 - Representing and Manipulating Binary Data\04 - Floating point numbers.mp4
[6d349da3ca757635]
|
8,056,704 |
CF6E1F74 |
03 - Representing and Manipulating Binary Data\05 - Boolean operations.mp4
[154edd1bff90e706]
|
7,740,491 |
0F33FE50 |
03 - Representing and Manipulating Binary Data\06 - Padding.mp4
[ce17e22527ab3080]
|
9,156,798 |
332161CB |
03 - Representing and Manipulating Binary Data\07 - Challenge QR code printer.mp4
[dd8ee2a45954957c]
|
5,186,679 |
F1813D27 |
03 - Representing and Manipulating Binary Data\08 - Solution QR code printer.mp4
[ff362b83caa14dea]
|
3,511,100 |
401769A5 |
04 - Fundamental Algorithms and Components\01 - Simple substitution ciphers.mp4
[43ff8b253752499d]
|
9,816,029 |
8D8CACDE |
04 - Fundamental Algorithms and Components\02 - Polyalphabetic substitution ciphers.mp4
[444856d9a0933fb4]
|
12,912,406 |
76013F91 |
04 - Fundamental Algorithms and Components\03 - Permutation and transposition ciphers.mp4
[bef457c017599d29]
|
5,092,927 |
08BC48D6 |
04 - Fundamental Algorithms and Components\04 - Simple one-time pads with XOR.mp4
[85165ce0ef5d42cc]
|
8,009,638 |
716E14D9 |
04 - Fundamental Algorithms and Components\05 - S-boxes and P-boxes.mp4
[fd9859fafcd4dfd3]
|
3,264,199 |
D0C3D282 |
04 - Fundamental Algorithms and Components\06 - Feistel networks.mp4
[f4aaed8a723d214b]
|
4,126,040 |
B01104FA |
04 - Fundamental Algorithms and Components\07 - Linear-feedback shift registers (LFSRs).mp4
[182709575f37637b]
|
5,730,065 |
DC1CF701 |
04 - Fundamental Algorithms and Components\08 - Challenge Software-based LFSR.mp4
[e5931d11be441f]
|
2,532,446 |
5ABD52E7 |
04 - Fundamental Algorithms and Components\09 - Solution Software-based LFSR.mp4
[1abd19502ba6eeda]
|
2,124,998 |
89A6A138 |
05 - Symmetric Algorithms\01 - The Data Encryption Standard (DES).mp4
[f7c60a9b345ddfc9]
|
6,064,684 |
1244EB3F |
05 - Symmetric Algorithms\02 - The Advanced Encryption Standard (AES).mp4
[e9ad7742731a5db2]
|
6,980,388 |
F9B352B8 |
05 - Symmetric Algorithms\03 - AES and DES in practice.mp4
[fb72d2b40ac14bbb]
|
10,883,194 |
38BEE0E9 |
05 - Symmetric Algorithms\04 - The RC4 stream cipher.mp4
[632402573da26d9e]
|
3,438,956 |
C5ABC563 |
05 - Symmetric Algorithms\05 - Challenge Encrypting, decrypting, and hashing with OpenSSL.mp4
[4f65438933c85dba]
|
3,555,125 |
B21970B7 |
05 - Symmetric Algorithms\06 - Solution Encrypting, decrypting, and hashing with OpenSSL.mp4
[fe61c60c1a841636]
|
8,799,947 |
1A462169 |
06 - Block Cipher Modes\01 - Introduction to block cipher modes.mp4
[4dde5337bcd2271f]
|
5,444,853 |
59627949 |
06 - Block Cipher Modes\02 - Cipher block chaining (CBC).mp4
[addebe4776b7c787]
|
3,398,111 |
54FC2B1F |
06 - Block Cipher Modes\03 - CFB Cipher feedback.mp4
[f548154e69bdbe6f]
|
2,539,184 |
0F9D2465 |
06 - Block Cipher Modes\04 - OFB Output feedback.mp4
[55052ea0eb4f9604]
|
2,802,512 |
8A59A289 |
06 - Block Cipher Modes\05 - CTR Counter mode.mp4
[5c31ddcf2cc12442]
|
2,330,529 |
4EC69854 |
06 - Block Cipher Modes\06 - Challenge Building a block cipher with CBC mode.mp4
[c52ff304a704f596]
|
5,284,534 |
07906F22 |
06 - Block Cipher Modes\07 - Solution Building a block cipher with CBC mode.mp4
[c30aaf951d8d28f2]
|
2,436,072 |
7A489C58 |
07 - Keys and a Little Asymmetry\01 - Exchanging keys.mp4
[a1f6050a34dd1e6a]
|
2,840,442 |
D7A43C96 |
07 - Keys and a Little Asymmetry\02 - Key length and large numbers.mp4
[b6fb3dca025c0ac5]
|
7,785,534 |
1296A74C |
07 - Keys and a Little Asymmetry\03 - The importance of randomness to cryptography.mp4
[d17d88bc4c324140]
|
4,212,310 |
8EFCD042 |
07 - Keys and a Little Asymmetry\04 - Modular arithmetic.mp4
[29af7b79b49bc13]
|
4,385,531 |
33D5A4F5 |
07 - Keys and a Little Asymmetry\05 - Diffie–Hellman key exchange.mp4
[7a1e2c2a6c523c96]
|
4,282,281 |
B82B4CCF |
07 - Keys and a Little Asymmetry\06 - Challenge Implementing Diffie–Hellman.mp4
[d882fbb1faba6354]
|
3,692,126 |
5E7ECEED |
07 - Keys and a Little Asymmetry\07 - Solution Implementing Diffie–Hellman.mp4
[87d47e6ddae7378c]
|
3,227,999 |
8301C516 |
08 - Conclusion\01 - Next steps.mp4
[37fcf8487207484e]
|
4,539,674 |
2D5892D4 |
01 - Introduction |
0 |
00000000 |
02 - Symmetric Cryptography Overview |
0 |
00000000 |
03 - Representing and Manipulating Binary Data |
0 |
00000000 |
04 - Fundamental Algorithms and Components |
0 |
00000000 |
05 - Symmetric Algorithms |
0 |
00000000 |
06 - Block Cipher Modes |
0 |
00000000 |
07 - Keys and a Little Asymmetry |
0 |
00000000 |
08 - Conclusion |
0 |
00000000 |
|
Total size: |
263,964,499 |
|
|