SHARE
TWEET

Coursera Crypto-015 class overview

a guest Nov 23rd, 2015 375 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #Table of contents
  2. Coursera Crypto-015 class overview
  3. Class URL: https://class.coursera.org/crypto-015/lecture
  4.  
  5. ##Week 1
  6. ###01-intro
  7. Introduction (week 1)
  8.  
  9. * 01.1, Course Overview (11 min)
  10. * 01.2, What is cryptography? (15 min)
  11. * 01.3, History of cryptography (19 min)
  12. * 01.4, Discrete probability (Crash course) (18 min)
  13. * 01.5, Discrete probability (crash course, cont.) (14 min)
  14.  
  15.  
  16. ###02-stream
  17. Stream Ciphers (week 1)
  18.  
  19. * 02.1, Information theoretic security and the one time pad (19 min)
  20. * 02.2, Stream ciphers and pseudo random generators (20 min)
  21. * 02.3, Attacks on stream ciphers and the one time pad (24 min)
  22. * 02.4, Real-world stream ciphers (20 min)
  23. * 02.5, PRG Security Definitions (25 min),
  24. * 02.6, Semantic Security (16 min)
  25. * 02.7, Stream ciphers are semantically secure (11 min) [optional]
  26.    
  27.  
  28. ##Week 2
  29. ###03-block
  30. Block Ciphers (week 2)
  31.  
  32. * 03.1, What are block ciphers? (17 min)
  33. * 03.2, The Data Encryption Standard (22 min)
  34. * 03.3, Exhaustive search attacks (20 min)
  35. * 03.4, More attacks on block ciphers (16 min)
  36. * 03.5, The AES block cipher (14 min)
  37. * 03.6, Block ciphers from PRGs(12 min)
  38.  
  39.  
  40. ###04-using-block
  41. Using Block Ciphers (week 2)
  42.  
  43. * 04.1, Review: PRPs and PRFs (12 min)
  44. * 04.2, Modes of operation: one time key (8 min)
  45. * 04.3, Security for many-time key (23 min),
  46. * 04.4, Modes of operation: many time key (CBC) (16 min)
  47. * 04.5, Modes of operation: many time key (CTR) (10 min)
  48.  
  49.  
  50. ##Week 3
  51. ###05-integrity
  52. Message Integrity (week 3)
  53.  
  54. * 05.1, Message Authentication Codes (16 min)
  55. * 05.2, MACs Based On PRFs (10 min)
  56. * 05.3, CBC-MAC and NMAC (20 min)
  57. * 05.4, MAC padding (9 min)
  58. * 05.5, PMAC and the Carter-Wegman MAC (16 min)
  59.  
  60.  
  61. ###06-collision-resistance
  62. Collision Resistance (week 3)
  63.  
  64. * 06.1, Introduction (11 min)
  65. * 06.2, Generic birthday attack (16 min)
  66. * 06.3, The Merkle-Damgard Paradigm (12 min)
  67. * 06.4, Constructing compression functions (8 min)
  68. * 06.5, HMAC (7 min)
  69. * 06.6, Timing attacks on MAC verification (9 min)
  70.  
  71.  
  72. ##Week 4
  73. ###07-authenc
  74. Authenticated Encryption (week 4)
  75.  
  76. * 07.1, Active attacks on CPA-secure encryption (13 min)
  77. * 07.2, Definitions (6 min)
  78. * 07.3, Chosen ciphertext attacks (12 min)
  79. * 07.4, Constructions from ciphers and MACs (21 min)
  80. * 07.5, Case study: TLS (18 min)
  81. * 07.6, CBC padding attacks (14 min)
  82. * 07.7, Attacking non-atomic decryption (10 min)
  83.  
  84.  
  85. ###08-odds-and-ends.
  86. Odds and ends (week 4)
  87.  
  88. * 08.1, Key Derivation (14 min)
  89. * 08.2, Deterministic Encryption (15 min)
  90. * 08.3, Deterministic Encryption:SIV and wide PRP (21 min)
  91. * 08.4, Tweakable encryption (15 min)
  92. * 08.5, Format preserving encryption (13 min)
  93.  
  94. ##Week 5
  95. ###09-basic-key-exchange
  96. Basic key exchange (week 5)
  97.  
  98. * 09.1, Trusted 3rd parties (11 min)
  99. * 09.2, Merkle Puzzles (11 min)
  100. * 09.3, The Diffie-Hellman protocol (19 min)
  101. * 09.4, Public-key encryption (11 min)
  102.  
  103. ###10-numth.
  104. Intro. Number Theory (week 5)
  105.  
  106. * 10.1, Notation (15 min)
  107. * 10.2, Fermat and Euler (18 min)
  108. * 10.3, Modular e´th roots (17 min)
  109. * 10.4, Arithmetic algorithms (13 min)
  110. * 10.5, Intractable problems (19 min)
  111.  
  112. ##Week 6
  113. ###11-pubkey-trapdoor.
  114. Public Key Encryption from trapdoor permutations (week 6)
  115.  
  116. * 11.1, Definitions and security (16 min)
  117. * 11.2, Constructions (11 min)
  118. * 11.3, The RSA trapdoor permutation (18 min)
  119. * 11.4, PKCS 1 (23 min)
  120. * 11.5, Is RSA a one-way function? (17 min)
  121. * 11.6, RSA in practice (14 min)
  122.  
  123.  
  124. ###12-pubkey-dh.{
  125. Public key encryption from Diffie-Hellman (week 6)
  126.  
  127. * 12.1, The ElGamal Public-key System (23 min)
  128. * 12.2, ElGamal Security (14 min)
  129. * 12.3, ElGamal Variants With Better Security (11 min)
  130. * 12.4, A Unifying Theme (12 min)
  131. * 12.5, Farewell (for now) (6 min)
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top