RAR-files |
booktime-itsmpcs.rar |
15,000,000 |
227445F4 |
booktime-itsmpcs.r00 |
15,000,000 |
23E7DB2C |
booktime-itsmpcs.r01 |
15,000,000 |
6BCF822E |
booktime-itsmpcs.r02 |
15,000,000 |
1D819C6E |
booktime-itsmpcs.r03 |
15,000,000 |
94D120B5 |
booktime-itsmpcs.r04 |
15,000,000 |
10875834 |
booktime-itsmpcs.r05 |
15,000,000 |
C2C1BD2F |
booktime-itsmpcs.r06 |
15,000,000 |
2E2DC6D7 |
booktime-itsmpcs.r07 |
15,000,000 |
6D688973 |
booktime-itsmpcs.r08 |
15,000,000 |
8CE137D5 |
booktime-itsmpcs.r09 |
15,000,000 |
96A1F580 |
booktime-itsmpcs.r10 |
15,000,000 |
5F9B31BF |
booktime-itsmpcs.r11 |
15,000,000 |
1EDDF696 |
booktime-itsmpcs.r12 |
15,000,000 |
BE23A519 |
booktime-itsmpcs.r13 |
15,000,000 |
4FADD9D1 |
booktime-itsmpcs.r14 |
15,000,000 |
5F503286 |
booktime-itsmpcs.r15 |
15,000,000 |
5C6091F6 |
booktime-itsmpcs.r16 |
15,000,000 |
52B68725 |
booktime-itsmpcs.r17 |
15,000,000 |
6381C852 |
booktime-itsmpcs.r18 |
15,000,000 |
3C2556F0 |
booktime-itsmpcs.r19 |
15,000,000 |
BF732A23 |
booktime-itsmpcs.r20 |
15,000,000 |
51340253 |
booktime-itsmpcs.r21 |
15,000,000 |
D7544300 |
booktime-itsmpcs.r22 |
15,000,000 |
BB1A94A3 |
booktime-itsmpcs.r23 |
15,000,000 |
96AACDCE |
booktime-itsmpcs.r24 |
15,000,000 |
9AC65E07 |
booktime-itsmpcs.r25 |
15,000,000 |
8C9EE183 |
booktime-itsmpcs.r26 |
15,000,000 |
533EFCF0 |
booktime-itsmpcs.r27 |
15,000,000 |
3B13CB65 |
booktime-itsmpcs.r28 |
15,000,000 |
36BA724C |
booktime-itsmpcs.r29 |
15,000,000 |
1DA6D08E |
booktime-itsmpcs.r30 |
15,000,000 |
9DBA5101 |
booktime-itsmpcs.r31 |
15,000,000 |
37213FB2 |
booktime-itsmpcs.r32 |
15,000,000 |
4D512C20 |
booktime-itsmpcs.r33 |
15,000,000 |
429C009C |
booktime-itsmpcs.r34 |
15,000,000 |
DBF12692 |
booktime-itsmpcs.r35 |
15,000,000 |
8F24BBD3 |
booktime-itsmpcs.r36 |
15,000,000 |
A92E2804 |
booktime-itsmpcs.r37 |
15,000,000 |
ECB16C2B |
booktime-itsmpcs.r38 |
15,000,000 |
345A9D13 |
booktime-itsmpcs.r39 |
15,000,000 |
F74872E1 |
booktime-itsmpcs.r40 |
15,000,000 |
17CA8D17 |
booktime-itsmpcs.r41 |
15,000,000 |
E5D7D434 |
booktime-itsmpcs.r42 |
15,000,000 |
6A9677F3 |
booktime-itsmpcs.r43 |
15,000,000 |
E8EB68B3 |
booktime-itsmpcs.r44 |
15,000,000 |
F81BA905 |
booktime-itsmpcs.r45 |
15,000,000 |
D85705DD |
booktime-itsmpcs.r46 |
15,000,000 |
3E3DF6E8 |
booktime-itsmpcs.r47 |
15,000,000 |
2B08FB38 |
booktime-itsmpcs.r48 |
15,000,000 |
36AD46CC |
booktime-itsmpcs.r49 |
15,000,000 |
CDECDDBC |
booktime-itsmpcs.r50 |
1,012,114 |
F9ADB254 |
|
Total size: |
766,012,114 |
|
|
Archived
files |
Chapter_3-Primer_on_Cryptography\7. Basics of cryptography.mp4
[ff5d173bffee62ad]
|
31,872,062 |
AC0747CB |
Chapter_3-Primer_on_Cryptography\8. Symmetric and Asymmetric Cryptography.mp4
[56aacc0a6651ed9]
|
60,013,913 |
650B2E3D |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\10. Garbled Circuits.mp4
[859d65b58b4163a3]
|
27,688,920 |
4A9003E3 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\11. Oblivious Transfer.mp4
[fdac36bce74ab7f1]
|
35,739,813 |
E5EB891A |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\12. Homomorphic Encryption.mp4
[f2f39dcc0f70522d]
|
13,541,090 |
E3616B8C |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\13. Zero-Knowledge Proofs.mp4
[d16ebc881f0c9fe7]
|
8,758,072 |
7FA5E253 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\9. Secret Sharing.mp4
[48c8f0f1ce3ea673]
|
38,562,128 |
4CBC6A25 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\A+FULLY+HOMOMORPHIC+ENCRYPTION+SCHEME_GENTRY.pdf |
952,183 |
F004D1AB |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\A+Gentle+Introduction+to+Yao’s+Garbled+Circuits.pdf |
415,489 |
53BEC4B5 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\A+New+Efficient+Protocol+for+k-out-of-n.pdf |
168,184 |
39BC7A97 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Garbled_Circuit_Example.py |
1,865 |
B9167F6C |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Homomorphic_Encryption.py |
2,054 |
BD837548 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\How+to+Exchange+Secrets+with+Oblivious+Transfer.pdf |
367,017 |
C918A451 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\How+to+Share+a+Secret.+A+Shamir.pdf |
194,459 |
68F9659E |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Non-Interactive+Oblivious+Transfer+and+Applications.pdf |
249,275 |
F4AC2734 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Oblivious_Transfer_1outofn_Example.py |
1,791 |
3D94A82D |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\On+Data+Banks+and+Privacy+Homomorphisms.pdf |
1,245,667 |
CE7A6E96 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Secret_Sharing_Example.py |
1,728 |
6B8B9668 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files\Yao’s+Garbled+Circuits.pdf |
227,195 |
98C3FC21 |
Chapter_5-Secure_Multiparty_Operations\14. Introduction.mp4
[9039fe822f2a554d]
|
12,344,289 |
5CCBD6ED |
Chapter_5-Secure_Multiparty_Operations\15. Secure Multiparty Summation.mp4
[3be51daf7ed3b75b]
|
28,065,521 |
C424D9DF |
Chapter_5-Secure_Multiparty_Operations\16. Secure Multiparty Comparison.mp4
[57e47be6db92ff66]
|
29,123,933 |
41B15329 |
Chapter_5-Secure_Multiparty_Operations\17. Secure Function Evaluation.mp4
[e3ea283b4f65af76]
|
31,032,386 |
7A41EE02 |
Chapter_5-Secure_Multiparty_Operations\Additional_Files\SMC_example.py |
2,269 |
D3D08CCC |
Chapter_5-Secure_Multiparty_Operations\Additional_Files\SME_example.py |
2,113 |
E4F93036 |
Chapter_5-Secure_Multiparty_Operations\Additional_Files\SMS_example.py |
1,686 |
483CBBA4 |
Chapter_6-Advanced_Operations\18. Secure Set Intersection.mp4
[ca674eb5a6d2e31]
|
30,794,567 |
755A4A7D |
Chapter_6-Advanced_Operations\19. Secure Matrix Multiplication.mp4
[97b05901557aec18]
|
25,594,752 |
C78E2019 |
Chapter_6-Advanced_Operations\20. Secure Machine Learning Algorithms.mp4
[8040debe893ef7a4]
|
48,454,393 |
8CBCF274 |
Chapter_6-Advanced_Operations\Additional_Files\Practical+Secure+Aggregation+for+Federated+Learning+on+User-Held+Data.pdf |
380,389 |
C05BCF04 |
Chapter_6-Advanced_Operations\Additional_Files\SMM_example.py |
2,529 |
7AC4D0D3 |
Chapter_6-Advanced_Operations\Additional_Files\SSI_example.py |
1,862 |
C13B633C |
Chapter_7-Applications_of_SMPC\21. Privacy-Preserving Data Analytics.mp4
[e0df9cda92f67cb]
|
42,500,076 |
F6F8993E |
Chapter_7-Applications_of_SMPC\22. Collaborative Machine Learning and Model Training.mp4
[ba5a0ec0bb9c2049]
|
34,196,325 |
37DD7A45 |
Chapter_7-Applications_of_SMPC\23. Secure Auctions and Bidding Mechanism.mp4
[716a1236b0e5df95]
|
37,709,554 |
C765E902 |
Chapter_7-Applications_of_SMPC\24. Private Information Retrieval.mp4
[b58e2e8f87a7fc40]
|
34,281,827 |
827A6BAD |
Chapter_7-Applications_of_SMPC\25. Other.mp4
[e4423a9dc26c1954]
|
4,107,301 |
6F25D959 |
Chapter_7-Applications_of_SMPC\Additional_Files\private_bidder.py |
2,245 |
E3D101E7 |
Chapter_7-Applications_of_SMPC\Additional_Files\The+Algorithmic+Foundations+of+Differential+Privacy.pdf |
2,130,940 |
53A190BD |
Chapter_8-SMPC_Implementation_Tools\26. SMPC Implementation Tools.mp4
[5ccb4c2c91240721]
|
34,640,924 |
68297B3B |
Chapter_8-SMPC_Implementation_Tools\Additional_Files\MPyC_example.py |
1,203 |
498BD224 |
Chapter_8-SMPC_Implementation_Tools\Additional_Files\SEAL_example.py |
2,179 |
47375F61 |
Chapter_9-Thank_You\27. Thank You.mp4
[6613cc986074c79c]
|
4,306,697 |
24434FC0 |
Chapter_1-Introduction\1. Introduction.mp4
[5e4b247f7c2cdbb4]
|
35,935,876 |
5D643B73 |
Chapter_1-Introduction\2. Who is this course for.mp4
[726a41a09ac4c0e]
|
2,853,819 |
89EF640C |
Chapter_1-Introduction\3. Course Outline.mp4
[8a2aac5305ea3d2f]
|
4,557,887 |
55E43348 |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\4. What is SMPC.mp4
[a9679acff560c04c]
|
28,566,257 |
BE7E3D1A |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\5. Example Use Case.mp4
[5cd7eca868fb35df]
|
34,470,277 |
6AF6D1ED |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\6. Historical background and development of SMPC.mp4
[e00103f8c65acb5]
|
38,597,436 |
ACCC1A44 |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\Additional_Files\Probabilistic+encryption+&+how+to+play+mental+poker+keeping+secret+all+partial+information.pdf |
1,214,253 |
550F4669 |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\Additional_Files\Protocols+for+secure+computations.pdf |
118,398 |
70D672FE |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC\Additional_Files |
0 |
00000000 |
Chapter_5-Secure_Multiparty_Operations\Additional_Files |
0 |
00000000 |
Chapter_6-Advanced_Operations\Additional_Files |
0 |
00000000 |
Chapter_7-Applications_of_SMPC\Additional_Files |
0 |
00000000 |
Chapter_8-SMPC_Implementation_Tools\Additional_Files |
0 |
00000000 |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation\Additional_Files |
0 |
00000000 |
Chapter_3-Primer_on_Cryptography |
0 |
00000000 |
Chapter_4-Cryptographic_protocols_relevant_to_SMPC |
0 |
00000000 |
Chapter_5-Secure_Multiparty_Operations |
0 |
00000000 |
Chapter_6-Advanced_Operations |
0 |
00000000 |
Chapter_7-Applications_of_SMPC |
0 |
00000000 |
Chapter_8-SMPC_Implementation_Tools |
0 |
00000000 |
Chapter_9-Thank_You |
0 |
00000000 |
Chapter_1-Introduction |
0 |
00000000 |
Chapter_2-Introduction_to_Secure_Multi_Party_Computation |
0 |
00000000 |
|
Total size: |
765,997,068 |
|
|