Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #Table of contents
- Coursera Crypto-015 class overview
- Class URL: https://class.coursera.org/crypto-015/lecture
- ##Week 1
- ###01-intro
- Introduction (week 1)
- * 01.1, Course Overview (11 min)
- * 01.2, What is cryptography? (15 min)
- * 01.3, History of cryptography (19 min)
- * 01.4, Discrete probability (Crash course) (18 min)
- * 01.5, Discrete probability (crash course, cont.) (14 min)
- ###02-stream
- Stream Ciphers (week 1)
- * 02.1, Information theoretic security and the one time pad (19 min)
- * 02.2, Stream ciphers and pseudo random generators (20 min)
- * 02.3, Attacks on stream ciphers and the one time pad (24 min)
- * 02.4, Real-world stream ciphers (20 min)
- * 02.5, PRG Security Definitions (25 min),
- * 02.6, Semantic Security (16 min)
- * 02.7, Stream ciphers are semantically secure (11 min) [optional]
- ##Week 2
- ###03-block
- Block Ciphers (week 2)
- * 03.1, What are block ciphers? (17 min)
- * 03.2, The Data Encryption Standard (22 min)
- * 03.3, Exhaustive search attacks (20 min)
- * 03.4, More attacks on block ciphers (16 min)
- * 03.5, The AES block cipher (14 min)
- * 03.6, Block ciphers from PRGs(12 min)
- ###04-using-block
- Using Block Ciphers (week 2)
- * 04.1, Review: PRPs and PRFs (12 min)
- * 04.2, Modes of operation: one time key (8 min)
- * 04.3, Security for many-time key (23 min),
- * 04.4, Modes of operation: many time key (CBC) (16 min)
- * 04.5, Modes of operation: many time key (CTR) (10 min)
- ##Week 3
- ###05-integrity
- Message Integrity (week 3)
- * 05.1, Message Authentication Codes (16 min)
- * 05.2, MACs Based On PRFs (10 min)
- * 05.3, CBC-MAC and NMAC (20 min)
- * 05.4, MAC padding (9 min)
- * 05.5, PMAC and the Carter-Wegman MAC (16 min)
- ###06-collision-resistance
- Collision Resistance (week 3)
- * 06.1, Introduction (11 min)
- * 06.2, Generic birthday attack (16 min)
- * 06.3, The Merkle-Damgard Paradigm (12 min)
- * 06.4, Constructing compression functions (8 min)
- * 06.5, HMAC (7 min)
- * 06.6, Timing attacks on MAC verification (9 min)
- ##Week 4
- ###07-authenc
- Authenticated Encryption (week 4)
- * 07.1, Active attacks on CPA-secure encryption (13 min)
- * 07.2, Definitions (6 min)
- * 07.3, Chosen ciphertext attacks (12 min)
- * 07.4, Constructions from ciphers and MACs (21 min)
- * 07.5, Case study: TLS (18 min)
- * 07.6, CBC padding attacks (14 min)
- * 07.7, Attacking non-atomic decryption (10 min)
- ###08-odds-and-ends.
- Odds and ends (week 4)
- * 08.1, Key Derivation (14 min)
- * 08.2, Deterministic Encryption (15 min)
- * 08.3, Deterministic Encryption:SIV and wide PRP (21 min)
- * 08.4, Tweakable encryption (15 min)
- * 08.5, Format preserving encryption (13 min)
- ##Week 5
- ###09-basic-key-exchange
- Basic key exchange (week 5)
- * 09.1, Trusted 3rd parties (11 min)
- * 09.2, Merkle Puzzles (11 min)
- * 09.3, The Diffie-Hellman protocol (19 min)
- * 09.4, Public-key encryption (11 min)
- ###10-numth.
- Intro. Number Theory (week 5)
- * 10.1, Notation (15 min)
- * 10.2, Fermat and Euler (18 min)
- * 10.3, Modular e´th roots (17 min)
- * 10.4, Arithmetic algorithms (13 min)
- * 10.5, Intractable problems (19 min)
- ##Week 6
- ###11-pubkey-trapdoor.
- Public Key Encryption from trapdoor permutations (week 6)
- * 11.1, Definitions and security (16 min)
- * 11.2, Constructions (11 min)
- * 11.3, The RSA trapdoor permutation (18 min)
- * 11.4, PKCS 1 (23 min)
- * 11.5, Is RSA a one-way function? (17 min)
- * 11.6, RSA in practice (14 min)
- ###12-pubkey-dh.{
- Public key encryption from Diffie-Hellman (week 6)
- * 12.1, The ElGamal Public-key System (23 min)
- * 12.2, ElGamal Security (14 min)
- * 12.3, ElGamal Variants With Better Security (11 min)
- * 12.4, A Unifying Theme (12 min)
- * 12.5, Farewell (for now) (6 min)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement