本站已收录 番号和无损神作磁力链接/BT种子 

Real-World Cryptography

种子简介

种子名称: Real-World Cryptography
文件类型: 视频
文件数目: 89个文件
文件大小: 4.98 GB
收录时间: 2024-1-6 11:08
已经下载: 3
资源热度: 89
最近下载: 2024-12-24 09:06

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:bc57a153a2cdbc56b7e584b64d22081e20e540f6&dn=Real-World Cryptography 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Real-World Cryptography.torrent
  • [TutsNode.com] - Real-World Cryptography/74-Chapter 14. Post-quantum cryptography.mp483.39MB
  • [TutsNode.com] - Real-World Cryptography/86-Chapter 16. When and where cryptography fails.mp479.99MB
  • [TutsNode.com] - Real-World Cryptography/83-Chapter 15 Where is it used..mp479.54MB
  • [TutsNode.com] - Real-World Cryptography/73-Chapter 13. Constant-time programming.mp477.54MB
  • [TutsNode.com] - Real-World Cryptography/72-Chapter 13. What solution is good for me.mp477.43MB
  • [TutsNode.com] - Real-World Cryptography/48-Chapter 9. How TLS 1.3 encrypts application data.mp475.15MB
  • [TutsNode.com] - Real-World Cryptography/54-Chapter 10. Double Ratchet - Signal’s post-handshake protocol.mp474.57MB
  • [TutsNode.com] - Real-World Cryptography/58-Chapter 11. One-time passwords aren’t really passwords - Going passwordless with symmetric keys.mp473.68MB
  • [TutsNode.com] - Real-World Cryptography/27-Chapter 5. Small subgroup attacks and other security considerations.mp473.42MB
  • [TutsNode.com] - Real-World Cryptography/41-Chapter 8. Public randomness.mp473.13MB
  • [TutsNode.com] - Real-World Cryptography/85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp471.88MB
  • [TutsNode.com] - Real-World Cryptography/63-Chapter 12. How does Bitcoin work.mp471.74MB
  • [TutsNode.com] - Real-World Cryptography/59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp471.31MB
  • [TutsNode.com] - Real-World Cryptography/75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp471.13MB
  • [TutsNode.com] - Real-World Cryptography/09-Chapter 2. Security considerations for hash functions.mp471.06MB
  • [TutsNode.com] - Real-World Cryptography/40-Chapter 8. Obtaining randomness in practice.mp470.06MB
  • [TutsNode.com] - Real-World Cryptography/14-Chapter 3. Security properties of a MAC.mp468.03MB
  • [TutsNode.com] - Real-World Cryptography/30-Chapter 6. Textbook RSA.mp468.02MB
  • [TutsNode.com] - Real-World Cryptography/42-Chapter 8. Managing keys and secrets.mp467.3MB
  • [TutsNode.com] - Real-World Cryptography/52-Chapter 10. Key discovery is a real issue.mp467.24MB
  • [TutsNode.com] - Real-World Cryptography/64-Chapter 12. Forking hell! Solving conflicts in mining.mp466.52MB
  • [TutsNode.com] - Real-World Cryptography/46-Chapter 9. The TLS handshake - Part 1.mp466.04MB
  • [TutsNode.com] - Real-World Cryptography/17-Chapter 4. The interface of AES.mp465.84MB
  • [TutsNode.com] - Real-World Cryptography/11-Chapter 2. The SHA-3 hash function.mp465.67MB
  • [TutsNode.com] - Real-World Cryptography/50-Chapter 10. End-to-end encryption.mp465.6MB
  • [TutsNode.com] - Real-World Cryptography/34-Chapter 7. The signature algorithms you should use (or not).mp464.83MB
  • [TutsNode.com] - Real-World Cryptography/35-Chapter 7. RSA-PSS - A better standard.mp464.51MB
  • [TutsNode.com] - Real-World Cryptography/81-Chapter 15. Is this it Next-generation cryptography.mp463.83MB
  • [TutsNode.com] - Real-World Cryptography/08-Chapter 2. Hash functions.mp463.46MB
  • [TutsNode.com] - Real-World Cryptography/65-Chapter 12. A tour of cryptocurrencies.mp463.38MB
  • [TutsNode.com] - Real-World Cryptography/16-Chapter 4. Authenticated encryption.mp463.29MB
  • [TutsNode.com] - Real-World Cryptography/12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp462.31MB
  • [TutsNode.com] - Real-World Cryptography/36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp461.11MB
  • [TutsNode.com] - Real-World Cryptography/66-Chapter 12. A round in the DiemBFT protocol.mp460.87MB
  • [TutsNode.com] - Real-World Cryptography/82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp460.68MB
  • [TutsNode.com] - Real-World Cryptography/33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp460.66MB
  • [TutsNode.com] - Real-World Cryptography/31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp460.55MB
  • [TutsNode.com] - Real-World Cryptography/79-Chapter 14. Kyber, a lattice-based key exchange.mp460.53MB
  • [TutsNode.com] - Real-World Cryptography/62-Chapter 12. A problem of trust Decentralization helps.mp460.47MB
  • [TutsNode.com] - Real-World Cryptography/15-Chapter 3. Integrity of cookies.mp459.87MB
  • [TutsNode.com] - Real-World Cryptography/04-Chapter 1. Key exchanges or how to get a shared secret.mp459.29MB
  • [TutsNode.com] - Real-World Cryptography/67-Chapter 13. Hardware cryptography.mp459.26MB
  • [TutsNode.com] - Real-World Cryptography/39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp459.22MB
  • [TutsNode.com] - Real-World Cryptography/45-Chapter 9. How does the TLS protocol work.mp458.86MB
  • [TutsNode.com] - Real-World Cryptography/23-Chapter 5. Group theory.mp458.21MB
  • [TutsNode.com] - Real-World Cryptography/32-Chapter 7. Signatures and zero-knowledge proofs.mp457.64MB
  • [TutsNode.com] - Real-World Cryptography/44-Chapter 9. Secure transport.mp457.48MB
  • [TutsNode.com] - Real-World Cryptography/61-Chapter 12. Crypto as in cryptocurrency.mp456.68MB
  • [TutsNode.com] - Real-World Cryptography/55-Chapter 11. User authentication.mp456.51MB
  • [TutsNode.com] - Real-World Cryptography/05-Chapter 1. Classifying and abstracting cryptography.mp456.23MB
  • [TutsNode.com] - Real-World Cryptography/88-Chapter 16. Cryptography is not an island.mp456.05MB
  • [TutsNode.com] - Real-World Cryptography/53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp455.95MB
  • [TutsNode.com] - Real-World Cryptography/70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp455.92MB
  • [TutsNode.com] - Real-World Cryptography/47-Chapter 9. The TLS handshake - Part 2.mp454.79MB
  • [TutsNode.com] - Real-World Cryptography/24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp454.55MB
  • [TutsNode.com] - Real-World Cryptography/77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp453.95MB
  • [TutsNode.com] - Real-World Cryptography/80-Chapter 14. Do I need to panic.mp453.66MB
  • [TutsNode.com] - Real-World Cryptography/19-Chapter 4. The AES-GCM AEAD.mp453.05MB
  • [TutsNode.com] - Real-World Cryptography/49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp453.01MB
  • [TutsNode.com] - Real-World Cryptography/84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp452.77MB
  • [TutsNode.com] - Real-World Cryptography/07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp452.75MB
  • [TutsNode.com] - Real-World Cryptography/21-Chapter 4. Other kinds of symmetric encryption.mp452.66MB
  • [TutsNode.com] - Real-World Cryptography/60-Chapter 11. Was my key exchange MITM’d Just check a short authenticated string (SAS).mp452.63MB
  • [TutsNode.com] - Real-World Cryptography/22-Chapter 5. Key exchanges.mp452.27MB
  • [TutsNode.com] - Real-World Cryptography/51-Chapter 10. The failure of encrypted email.mp451.81MB
  • [TutsNode.com] - Real-World Cryptography/10-Chapter 2. Standardized hash functions.mp450.95MB
  • [TutsNode.com] - Real-World Cryptography/87-Chapter 16. Where are the good libraries.mp450.66MB
  • [TutsNode.com] - Real-World Cryptography/02-Chapter 1. Introduction.mp450.3MB
  • [TutsNode.com] - Real-World Cryptography/68-Chapter 13. They’re in your wallet - Smart cards and secure elements.mp449.7MB
  • [TutsNode.com] - Real-World Cryptography/78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp448.75MB
  • [TutsNode.com] - Real-World Cryptography/69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp448.26MB
  • [TutsNode.com] - Real-World Cryptography/06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp447.39MB
  • [TutsNode.com] - Real-World Cryptography/03-Chapter 1. Kerckhoff’s principle - Only the key is kept secret.mp446.25MB
  • [TutsNode.com] - Real-World Cryptography/13-Chapter 3. Message authentication codes.mp446.06MB
  • [TutsNode.com] - Real-World Cryptography/26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp444.17MB
  • [TutsNode.com] - Real-World Cryptography/28-Chapter 6. Asymmetric encryption and hybrid encryption.mp444.12MB
  • [TutsNode.com] - Real-World Cryptography/37-Chapter 7. Subtle behaviors of signature schemes.mp443.68MB
  • [TutsNode.com] - Real-World Cryptography/38-Chapter 8. Randomness and secrets.mp443.67MB
  • [TutsNode.com] - Real-World Cryptography/56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp443.54MB
  • [TutsNode.com] - Real-World Cryptography/89-Appendix. Answers to exercises.mp443.52MB
  • [TutsNode.com] - Real-World Cryptography/20-Chapter 4. ChaCha20-Poly1305.mp440.89MB
  • [TutsNode.com] - Real-World Cryptography/57-Chapter 11. Don’t want to see their passwords Use an asymmetric password-authenticated key exchange.mp440.48MB
  • [TutsNode.com] - Real-World Cryptography/29-Chapter 6. Hybrid encryption.mp437.13MB
  • [TutsNode.com] - Real-World Cryptography/25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp436.17MB
  • [TutsNode.com] - Real-World Cryptography/71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp435.51MB
  • [TutsNode.com] - Real-World Cryptography/76-Chapter 14. Hash-based signatures - Don’t need anything but a hash function.mp435.24MB
  • [TutsNode.com] - Real-World Cryptography/18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp435MB
  • [TutsNode.com] - Real-World Cryptography/43-Part 2. Protocols - The recipes of cryptography.mp420.07MB
  • [TutsNode.com] - Real-World Cryptography/01-Part 1. Primitives - The ingredients of cryptography.mp46MB