Advertisement
Guest User

Coursera Crypto-015 class overview

a guest
Nov 23rd, 2015
719
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.65 KB | None | 0 0
  1. #Table of contents
  2. Coursera Crypto-015 class overview
  3. Class URL: https://class.coursera.org/crypto-015/lecture
  4.  
  5. ##Week 1
  6. ###01-intro
  7. Introduction (week 1)
  8.  
  9. * 01.1, Course Overview (11 min)
  10. * 01.2, What is cryptography? (15 min)
  11. * 01.3, History of cryptography (19 min)
  12. * 01.4, Discrete probability (Crash course) (18 min)
  13. * 01.5, Discrete probability (crash course, cont.) (14 min)
  14.  
  15.  
  16. ###02-stream
  17. Stream Ciphers (week 1)
  18.  
  19. * 02.1, Information theoretic security and the one time pad (19 min)
  20. * 02.2, Stream ciphers and pseudo random generators (20 min)
  21. * 02.3, Attacks on stream ciphers and the one time pad (24 min)
  22. * 02.4, Real-world stream ciphers (20 min)
  23. * 02.5, PRG Security Definitions (25 min),
  24. * 02.6, Semantic Security (16 min)
  25. * 02.7, Stream ciphers are semantically secure (11 min) [optional]
  26.  
  27.  
  28. ##Week 2
  29. ###03-block
  30. Block Ciphers (week 2)
  31.  
  32. * 03.1, What are block ciphers? (17 min)
  33. * 03.2, The Data Encryption Standard (22 min)
  34. * 03.3, Exhaustive search attacks (20 min)
  35. * 03.4, More attacks on block ciphers (16 min)
  36. * 03.5, The AES block cipher (14 min)
  37. * 03.6, Block ciphers from PRGs(12 min)
  38.  
  39.  
  40. ###04-using-block
  41. Using Block Ciphers (week 2)
  42.  
  43. * 04.1, Review: PRPs and PRFs (12 min)
  44. * 04.2, Modes of operation: one time key (8 min)
  45. * 04.3, Security for many-time key (23 min),
  46. * 04.4, Modes of operation: many time key (CBC) (16 min)
  47. * 04.5, Modes of operation: many time key (CTR) (10 min)
  48.  
  49.  
  50. ##Week 3
  51. ###05-integrity
  52. Message Integrity (week 3)
  53.  
  54. * 05.1, Message Authentication Codes (16 min)
  55. * 05.2, MACs Based On PRFs (10 min)
  56. * 05.3, CBC-MAC and NMAC (20 min)
  57. * 05.4, MAC padding (9 min)
  58. * 05.5, PMAC and the Carter-Wegman MAC (16 min)
  59.  
  60.  
  61. ###06-collision-resistance
  62. Collision Resistance (week 3)
  63.  
  64. * 06.1, Introduction (11 min)
  65. * 06.2, Generic birthday attack (16 min)
  66. * 06.3, The Merkle-Damgard Paradigm (12 min)
  67. * 06.4, Constructing compression functions (8 min)
  68. * 06.5, HMAC (7 min)
  69. * 06.6, Timing attacks on MAC verification (9 min)
  70.  
  71.  
  72. ##Week 4
  73. ###07-authenc
  74. Authenticated Encryption (week 4)
  75.  
  76. * 07.1, Active attacks on CPA-secure encryption (13 min)
  77. * 07.2, Definitions (6 min)
  78. * 07.3, Chosen ciphertext attacks (12 min)
  79. * 07.4, Constructions from ciphers and MACs (21 min)
  80. * 07.5, Case study: TLS (18 min)
  81. * 07.6, CBC padding attacks (14 min)
  82. * 07.7, Attacking non-atomic decryption (10 min)
  83.  
  84.  
  85. ###08-odds-and-ends.
  86. Odds and ends (week 4)
  87.  
  88. * 08.1, Key Derivation (14 min)
  89. * 08.2, Deterministic Encryption (15 min)
  90. * 08.3, Deterministic Encryption:SIV and wide PRP (21 min)
  91. * 08.4, Tweakable encryption (15 min)
  92. * 08.5, Format preserving encryption (13 min)
  93.  
  94. ##Week 5
  95. ###09-basic-key-exchange
  96. Basic key exchange (week 5)
  97.  
  98. * 09.1, Trusted 3rd parties (11 min)
  99. * 09.2, Merkle Puzzles (11 min)
  100. * 09.3, The Diffie-Hellman protocol (19 min)
  101. * 09.4, Public-key encryption (11 min)
  102.  
  103. ###10-numth.
  104. Intro. Number Theory (week 5)
  105.  
  106. * 10.1, Notation (15 min)
  107. * 10.2, Fermat and Euler (18 min)
  108. * 10.3, Modular e´th roots (17 min)
  109. * 10.4, Arithmetic algorithms (13 min)
  110. * 10.5, Intractable problems (19 min)
  111.  
  112. ##Week 6
  113. ###11-pubkey-trapdoor.
  114. Public Key Encryption from trapdoor permutations (week 6)
  115.  
  116. * 11.1, Definitions and security (16 min)
  117. * 11.2, Constructions (11 min)
  118. * 11.3, The RSA trapdoor permutation (18 min)
  119. * 11.4, PKCS 1 (23 min)
  120. * 11.5, Is RSA a one-way function? (17 min)
  121. * 11.6, RSA in practice (14 min)
  122.  
  123.  
  124. ###12-pubkey-dh.{
  125. Public key encryption from Diffie-Hellman (week 6)
  126.  
  127. * 12.1, The ElGamal Public-key System (23 min)
  128. * 12.2, ElGamal Security (14 min)
  129. * 12.3, ElGamal Variants With Better Security (11 min)
  130. * 12.4, A Unifying Theme (12 min)
  131. * 12.5, Farewell (for now) (6 min)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement