Friday, July 26, 2013

Cryptography and Network Security

Video Lecture Description Sub-Category Time Click to view video


Mod-01 Lec-01 Introduction Cryptography 59 min Click to view videos
Mod-01 Lec-02 Overview on Modern Cryptography Cryptography 58 min Click to view videos
Mod-01 Lec-03 Introduction to Number Theory Cryptography 64 min Click to view videos
Mod-01 Lec-04 Probability and Information Theory Cryptography 54 min Click to view videos
Mod-01 Lec-05 Classical Cryptosystems Cryptography 58 min Click to view videos
Mod-01 Lec-06 Cryptanalysis of Classical Ciphers Cryptography 52 min Click to view videos
Mod-01 Lec-07 Shannons Theory Cryptography 45 min Click to view videos
Mod-01 Lec-08 Shannons Theory (Contd...1) Cryptography 53 min Click to view videos
Mod-01 Lec-09 Shannons Theory (Contd...2) Cryptography 53 min Click to view videos
Mod-01 Lec-10 Symmetric Key Ciphers Cryptography 53 min Click to view videos
Mod-01 Lec-11 Block Cipher Standards (DES) Cryptography 50 min Click to view videos
Mod-01 Lec-12 Block Cipher Standards (AES) Cryptography 58 min Click to view videos
Mod-01 Lec-13 Block Cipher Standards (AES) (Contd.) Cryptography 55 min Click to view videos
Mod-01 Lec-14 Linear Cryptanalysis Cryptography 57 min Click to view videos
Mod-01 Lec-15 Differential Cryptanalysis Cryptography 47 min Click to view videos
Mod-01 Lec-16 Few other Cryptanalytic Techniques Cryptography 58 min Click to view videos
Mod-01 Lec-17 Overview on S-Box Design Principles Cryptography 51 min Click to view videos
Mod-01 Lec-18 Modes of Operation of Block Ciphers Cryptography 52 min Click to view videos
Mod-01 Lec-19 Stream Ciphers Cryptography 49 min Click to view videos
Mod-01 Lec-20 Stream Ciphers (Contd...1) Cryptography 55 min Click to view videos
Mod-01 Lec-21 Stream Ciphers (Contd...2) Cryptography 47 min Click to view videos
Mod-01 Lec-22 Pseudorandomness Cryptography 48 min Click to view videos
Mod-01 Lec-23 Cryptographic Hash Functions Cryptography 50 min Click to view videos
Mod-01 Lec-24 Cryptographic Hash Functions (Contd...1) Cryptography 51 min Click to view videos
Mod-01 Lec-25 Cryptographic Hash Functions (Contd...2) Cryptography 49 min Click to view videos
Mod-01 Lec-26 Message Authentication Codes Cryptography 52 min Click to view videos
Mod-01 Lec-27 More Number Theoretic Results Cryptography 56 min Click to view videos
Mod-01 Lec-28 The RSA Cryptosystem Cryptography 51 min Click to view videos
Mod-01 Lec-29 Primality Testing Cryptography 51 min Click to view videos
Mod-01 Lec-30 Factoring Algorithms Cryptography 60 min Click to view videos
Mod-01 Lec-31 Some Comments on the Security of RSA Cryptography 41 min Click to view videos
Mod-01 Lec-32 Discrete Logarithm Problem (DLP) Cryptography 59 min Click to view videos
Mod-01 Lec-33 The Diffie-Hellman Problem and Security of ElGamal Systems Cryptography 58 min Click to view videos
Mod-01 Lec-34 An Introduction to Elliptic Curve Cryptography Cryptography 59 min Click to view videos
Mod-01 Lec-35 Application of Elliptic Curves to Cryptography Cryptography 56 min Click to view videos
Mod-01 Lec-36 Implementation of Elliptic Curve Cryptography Cryptography 55 min Click to view videos
Mod-01 Lec-37 Secret Sharing Schemes Cryptography 53 min Click to view videos
Mod-01 Lec-38 A Tutorial on Network Protocols Cryptography 55 min Click to view videos
Mod-01 Lec-39 System Security Cryptography 53 min Click to view videos
Mod-01 Lec-40 Firewalls and Intrusion Detection Systems Cryptography 50 min Click to view videos
Mod-01 Lec-41 Side Channel Analysis of Cryptographic Implementations Cryptography 48 min Click to view videos

0 comments:

Post a Comment