| Mod-01 Lec-01 Introduction |
Cryptography |
59 min |
Click to view videos |
| Mod-01 Lec-02 Overview on Modern Cryptography |
Cryptography |
58 min |
Click to view videos |
| Mod-01 Lec-03 Introduction to Number Theory |
Cryptography |
64 min |
Click to view videos |
| Mod-01 Lec-04 Probability and Information Theory |
Cryptography |
54 min |
Click to view videos |
| Mod-01 Lec-05 Classical Cryptosystems |
Cryptography |
58 min |
Click to view videos |
| Mod-01 Lec-06 Cryptanalysis of Classical Ciphers |
Cryptography |
52 min |
Click to view videos |
| Mod-01 Lec-07 Shannons Theory |
Cryptography |
45 min |
Click to view videos |
| Mod-01 Lec-08 Shannons Theory (Contd...1) |
Cryptography |
53 min |
Click to view videos |
| Mod-01 Lec-09 Shannons Theory (Contd...2) |
Cryptography |
53 min |
Click to view videos |
| Mod-01 Lec-10 Symmetric Key Ciphers |
Cryptography |
53 min |
Click to view videos |
| Mod-01 Lec-11 Block Cipher Standards (DES) |
Cryptography |
50 min |
Click to view videos |
| Mod-01 Lec-12 Block Cipher Standards (AES) |
Cryptography |
58 min |
Click to view videos |
| Mod-01 Lec-13 Block Cipher Standards (AES) (Contd.) |
Cryptography |
55 min |
Click to view videos |
| Mod-01 Lec-14 Linear Cryptanalysis |
Cryptography |
57 min |
Click to view videos |
| Mod-01 Lec-15 Differential Cryptanalysis |
Cryptography |
47 min |
Click to view videos |
| Mod-01 Lec-16 Few other Cryptanalytic Techniques |
Cryptography |
58 min |
Click to view videos |
| Mod-01 Lec-17 Overview on S-Box Design Principles |
Cryptography |
51 min |
Click to view videos |
| Mod-01 Lec-18 Modes of Operation of Block Ciphers |
Cryptography |
52 min |
Click to view videos |
| Mod-01 Lec-19 Stream Ciphers |
Cryptography |
49 min |
Click to view videos |
| Mod-01 Lec-20 Stream Ciphers (Contd...1) |
Cryptography |
55 min |
Click to view videos |
| Mod-01 Lec-21 Stream Ciphers (Contd...2) |
Cryptography |
47 min |
Click to view videos |
| Mod-01 Lec-22 Pseudorandomness |
Cryptography |
48 min |
Click to view videos |
| Mod-01 Lec-23 Cryptographic Hash Functions |
Cryptography |
50 min |
Click to view videos |
| Mod-01 Lec-24 Cryptographic Hash Functions (Contd...1) |
Cryptography |
51 min |
Click to view videos |
| Mod-01 Lec-25 Cryptographic Hash Functions (Contd...2) |
Cryptography |
49 min |
Click to view videos |
| Mod-01 Lec-26 Message Authentication Codes |
Cryptography |
52 min |
Click to view videos |
| Mod-01 Lec-27 More Number Theoretic Results |
Cryptography |
56 min |
Click to view videos |
| Mod-01 Lec-28 The RSA Cryptosystem |
Cryptography |
51 min |
Click to view videos |
| Mod-01 Lec-29 Primality Testing |
Cryptography |
51 min |
Click to view videos |
| Mod-01 Lec-30 Factoring Algorithms |
Cryptography |
60 min |
Click to view videos |
| Mod-01 Lec-31 Some Comments on the Security of RSA |
Cryptography |
41 min |
Click to view videos |
| Mod-01 Lec-32 Discrete Logarithm Problem (DLP) |
Cryptography |
59 min |
Click to view videos |
| Mod-01 Lec-33 The Diffie-Hellman Problem and Security of ElGamal Systems |
Cryptography |
58 min |
Click to view videos |
| Mod-01 Lec-34 An Introduction to Elliptic Curve Cryptography |
Cryptography |
59 min |
Click to view videos |
| Mod-01 Lec-35 Application of Elliptic Curves to Cryptography |
Cryptography |
56 min |
Click to view videos |
| Mod-01 Lec-36 Implementation of Elliptic Curve Cryptography |
Cryptography |
55 min |
Click to view videos |
| Mod-01 Lec-37 Secret Sharing Schemes |
Cryptography |
53 min |
Click to view videos |
| Mod-01 Lec-38 A Tutorial on Network Protocols |
Cryptography |
55 min |
Click to view videos |
| Mod-01 Lec-39 System Security |
Cryptography |
53 min |
Click to view videos |
| Mod-01 Lec-40 Firewalls and Intrusion Detection Systems |
Cryptography |
50 min |
Click to view videos |
| Mod-01 Lec-41 Side Channel Analysis of Cryptographic Implementations |
Cryptography |
48 min |
Click to view videos |
0 comments:
Post a Comment