Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\16.Simple one-time pads with XOR.mp4
[e3de569dd89b6908]
|
8,082,718 |
FF783CCE |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\18.Feistel ciphers.mp4
[5d40da6794eadec3]
|
3,918,360 |
3D8D001C |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\15.Permutation and transposition ciphers.en.srt |
5,141 |
97D0C210 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\16.Simple one-time pads with XOR.en.srt |
4,484 |
F70C49AC |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\14.Polyalphabetic substitution ciphers.en.srt |
10,708 |
AEB6A9EC |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\17.S-Box and P-Box.en.srt |
3,447 |
16A85FF6 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\19.Linear-feedback shift registers (LFSRs).en.srt |
4,356 |
28DF29F3 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\13.Simple substitution ciphers.mp4
[44d4a22d230f1f1d]
|
12,853,609 |
89809650 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\18.Feistel ciphers.en.srt |
4,006 |
6B21826F |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\17.S-Box and P-Box.mp4
[7338f7d7441ded75]
|
3,647,351 |
6373A14F |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\13.Simple substitution ciphers.en.srt |
9,194 |
D0BB2082 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\19.Linear-feedback shift registers (LFSRs).mp4
[730a4394e40025f1]
|
4,768,250 |
4646E454 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\15.Permutation and transposition ciphers.mp4
[d4bf1441738f7ae1]
|
4,967,169 |
7CB6D664 |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components\14.Polyalphabetic substitution ciphers.mp4
[b5d6020b8a11bce8]
|
13,394,919 |
061B1B96 |
Symmetric Cryptography Essential Training\Exercise Files\Ex_Files_Symmetric_Cryptography_Essential_Training.zip
[cc00824bc1995990]
|
1,350,983 |
FF740568 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\07.Binary representation.en.srt |
5,723 |
CA654E0D |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\11.Boolean logical operations.mp4
[c244a106811a211a]
|
10,938,601 |
BF3BC609 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\08.Characters.en.srt |
5,001 |
61D840D8 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\09.Integers.mp4
[8233065d9a48c1db]
|
9,726,305 |
0C069AF0 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\08.Characters.mp4
[7bb0682332c729d6]
|
11,643,612 |
C68CD8DB |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\10.Floating point numbers.mp4
[bb0c2568534b5767]
|
8,908,633 |
71CB0B7C |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\12.Padding.en.srt |
6,143 |
1499EA51 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\11.Boolean logical operations.en.srt |
6,409 |
B07B7719 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\09.Integers.en.srt |
5,466 |
C74755B9 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\12.Padding.mp4
[68b58bbc340ae7ae]
|
12,372,243 |
B7F1313D |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\07.Binary representation.mp4
[9c90c8b5a9e60d06]
|
5,762,171 |
1BDDEADA |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data\10.Floating point numbers.en.srt |
6,836 |
504696C5 |
Symmetric Cryptography Essential Training\1.Introduction\01.Cryptography is everywhere.en.srt |
2,657 |
E4AB056D |
Symmetric Cryptography Essential Training\1.Introduction\02.Basic terminology.mp4
[b1acb6b2f0e73ec5]
|
3,062,721 |
D1F04F6D |
Symmetric Cryptography Essential Training\1.Introduction\01.Cryptography is everywhere.mp4
[8b455b9e9b58159a]
|
10,237,123 |
DBE48FF4 |
Symmetric Cryptography Essential Training\1.Introduction\02.Basic terminology.en.srt |
2,710 |
16019516 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\22.AES and DES in practice.mp4
[436aecff84eca72b]
|
14,017,163 |
01A5BB9B |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\23.The RC4 stream cipher.en.srt |
3,804 |
BEA7707B |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\21.The Advanced Encryption Standard (AES).en.srt |
6,951 |
660AA2E1 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\23.The RC4 stream cipher.mp4
[7fcb917aff451f33]
|
4,108,182 |
FC0811FA |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\21.The Advanced Encryption Standard (AES).mp4
[5eeeaf8e549f0bf8]
|
8,336,398 |
451B6434 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\20.The Data Encryption Standard (DES).en.srt |
6,502 |
DF5DAE22 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\22.AES and DES in practice.en.srt |
7,238 |
47229DA9 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms\20.The Data Encryption Standard (DES).mp4
[4383677349d1f930]
|
6,583,837 |
1B72E9ED |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\04.Kerckhoff's principle.en.srt |
7,602 |
4E6002F9 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\05.Symmetric keys.en.srt |
8,014 |
788815C9 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\06.Block vs. stream ciphers.en.srt |
7,111 |
156DAAD9 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\04.Kerckhoff's principle.mp4
[70818c05c0a73cac]
|
10,820,907 |
BF8AA17A |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\05.Symmetric keys.mp4
[b599ddfd838ba9e0]
|
8,466,155 |
4F98C251 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\06.Block vs. stream ciphers.mp4
[61c1cf3e84da6a7e]
|
7,074,261 |
AC350030 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\03.Cryptography's role.mp4
[72bd9e6f1b96b80f]
|
7,351,200 |
97E6D769 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography\03.Cryptography's role.en.srt |
6,075 |
594A0FD4 |
Symmetric Cryptography Essential Training\7.Conclusion\29.Next steps.mp4
[51dea4241e9bb96f]
|
2,356,931 |
AA50D95F |
Symmetric Cryptography Essential Training\7.Conclusion\29.Next steps.en.srt |
1,412 |
E2563A47 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\25.Cipher block chaining (CBC).en.srt |
3,653 |
A4B8A42B |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\24.Introduction to block cipher modes.mp4
[b24ce956f76f9e80]
|
6,165,268 |
E977D860 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\26.CFB - Cipher feedback.en.srt |
1,870 |
A8F11F54 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\27.OFB - Output feedback.mp4
[b10d4df5e3aca250]
|
2,434,726 |
5AC7507B |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\28.CTR - Counter.en.srt |
2,210 |
B81EBBE8 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\24.Introduction to block cipher modes.en.srt |
5,629 |
5777364E |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\28.CTR - Counter.mp4
[dff5405984cc9e25]
|
2,313,185 |
74861877 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\27.OFB - Output feedback.en.srt |
2,082 |
27051731 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\26.CFB - Cipher feedback.mp4
[b235365062592846]
|
2,118,307 |
35AF8CCD |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes\25.Cipher block chaining (CBC).mp4
[b48aa6b880b3f45d]
|
3,804,794 |
298BCCFC |
Symmetric Cryptography Essential Training\4.3. Fundamental Algorithms and Components |
0 |
00000000 |
Symmetric Cryptography Essential Training\Exercise Files |
0 |
00000000 |
Symmetric Cryptography Essential Training\3.2. Representing and Manipulating Binary Data |
0 |
00000000 |
Symmetric Cryptography Essential Training\1.Introduction |
0 |
00000000 |
Symmetric Cryptography Essential Training\5.4. Symmetric Algorithms |
0 |
00000000 |
Symmetric Cryptography Essential Training\2.1. Symmetric Cryptography |
0 |
00000000 |
Symmetric Cryptography Essential Training\7.Conclusion |
0 |
00000000 |
Symmetric Cryptography Essential Training\6.5. Block Cipher Modes |
0 |
00000000 |
Symmetric Cryptography Essential Training |
0 |
00000000 |
|
Total size: |
211,738,516 |
|