Companies Home Search Profile

Real-World Cryptography

Focused View

13:53:46

72 View
  • 00001 Part 1. Primitives - The ingredients of cryptography.mp4
    00:59
  • 00002 Chapter 1. Introduction.mp4
    08:48
  • 00003 Chapter 1. Kerckhoff s principle - Only the key is kept secret.mp4
    07:18
  • 00004 Chapter 1. Key exchanges or how to get a shared secret.mp4
    10:57
  • 00005 Chapter 1. Classifying and abstracting cryptography.mp4
    08:33
  • 00006 Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4
    07:41
  • 00007 Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4
    08:07
  • 00008 Chapter 2. Hash functions.mp4
    10:45
  • 00009 Chapter 2. Security considerations for hash functions.mp4
    11:48
  • 00010 Chapter 2. Standardized hash functions.mp4
    08:51
  • 00011 Chapter 2. The SHA-3 hash function.mp4
    11:10
  • 00012 Chapter 2. Avoid ambiguous hashing with TupleHash.mp4
    10:37
  • 00013 Chapter 3. Message authentication codes.mp4
    08:00
  • 00014 Chapter 3. Security properties of a MAC.mp4
    11:12
  • 00015 Chapter 3. Integrity of cookies.mp4
    11:23
  • 00016 Chapter 4. Authenticated encryption.mp4
    10:11
  • 00017 Chapter 4. The interface of AES.mp4
    11:45
  • 00018 Chapter 4. A lack of authenticity hence AES-CBC-HMAC.mp4
    05:56
  • 00019 Chapter 4. The AES-GCM AEAD.mp4
    09:17
  • 00020 Chapter 4. ChaCha20-Poly1305.mp4
    07:32
  • 00021 Chapter 4. Other kinds of symmetric encryption.mp4
    08:21
  • 00022 Chapter 5. Key exchanges.mp4
    08:32
  • 00023 Chapter 5. Group theory.mp4
    10:18
  • 00024 Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4
    09:01
  • 00025 Chapter 5. The Elliptic Curve Diffie-Hellman ECDH key exchange.mp4
    06:55
  • 00026 Chapter 5. How does the Elliptic Curve Diffie-Hellman ECDH key exchange work.mp4
    07:54
  • 00027 Chapter 5. Small subgroup attacks and other security considerations.mp4
    10:39
  • 00028 Chapter 6. Asymmetric encryption and hybrid encryption.mp4
    08:04
  • 00029 Chapter 6. Hybrid encryption.mp4
    06:26
  • 00030 Chapter 6. Textbook RSA.mp4
    12:10
  • 00031 Chapter 6. Asymmetric encryption with RSA-OAEP.mp4
    10:30
  • 00032 Chapter 7. Signatures and zero-knowledge proofs.mp4
    09:56
  • 00033 Chapter 7. Zero-knowledge proofs ZKPs - The origin of signatures.mp4
    10:48
  • 00034 Chapter 7. The signature algorithms you should use or not.mp4
    10:32
  • 00035 Chapter 7. RSA-PSS - A better standard.mp4
    10:57
  • 00036 Chapter 7. The Edwards-curve Digital Signature Algorithm EdDSA.mp4
    09:34
  • 00037 Chapter 7. Subtle behaviors of signature schemes.mp4
    07:25
  • 00038 Chapter 8. Randomness and secrets.mp4
    07:00
  • 00039 Chapter 8. Slow randomness Use a pseudorandom number generator PRNG.mp4
    08:31
  • 00040 Chapter 8. Obtaining randomness in practice.mp4
    11:44
  • 00041 Chapter 8. Public randomness.mp4
    12:11
  • 00042 Chapter 8. Managing keys and secrets.mp4
    11:42
  • 00043 Part 2. Protocols - The recipes of cryptography.mp4
    02:47
  • 00044 Chapter 9. Secure transport.mp4
    09:27
  • 00045 Chapter 9. How does the TLS protocol work.mp4
    09:19
  • 00046 Chapter 9. The TLS handshake - Part 1.mp4
    11:44
  • 00047 Chapter 9. The TLS handshake - Part 2.mp4
    09:04
  • 00048 Chapter 9. How TLS 1.3 encrypts application data.mp4
    12:06
  • 00049 Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4
    08:30
  • 00050 Chapter 10. End-to-end encryption.mp4
    10:33
  • 00051 Chapter 10. The failure of encrypted email.mp4
    08:42
  • 00052 Chapter 10. Key discovery is a real issue.mp4
    10:18
  • 00053 Chapter 10. More user-friendly than the WOT - Trust but verify.mp4
    09:36
  • 00054 Chapter 10. Double Ratchet - Signal s post-handshake protocol.mp4
    12:36
  • 00055 Chapter 11. User authentication.mp4
    09:39
  • 00056 Chapter 11. One password to rule them all - Single sign-on SSO and password managers.mp4
    06:50
  • 00057 Chapter 11. Don t want to see their passwords Use an asymmetric password-authenticated key exchange.mp4
    06:19
  • 00058 Chapter 11. One-time passwords aren t really passwords - Going passwordless with symmetric keys.mp4
    11:32
  • 00059 Chapter 11. User-aided authentication - Pairing devices using some human help.mp4
    11:52
  • 00060 Chapter 11. Was my key exchange MITM d Just check a short authenticated string SAS.mp4
    08:57
  • 00061 Chapter 12. Crypto as in cryptocurrency.mp4
    08:21
  • 00062 Chapter 12. A problem of trust Decentralization helps.mp4
    09:21
  • 00063 Chapter 12. How does Bitcoin work.mp4
    11:44
  • 00064 Chapter 12. Forking hell Solving conflicts in mining.mp4
    10:51
  • 00065 Chapter 12. A tour of cryptocurrencies.mp4
    09:48
  • 00066 Chapter 12. A round in the DiemBFT protocol.mp4
    10:01
  • 00067 Chapter 13. Hardware cryptography.mp4
    09:22
  • 00068 Chapter 13. They re in your wallet - Smart cards and secure elements.mp4
    07:13
  • 00069 Chapter 13. Banks love them - Hardware security modules HSMs.mp4
    07:09
  • 00070 Chapter 13. Trusted Platform Modules TPMs - A useful standardization of secure elements.mp4
    07:46
  • 00071 Chapter 13. Confidential computing with a trusted execution environment TEE.mp4
    05:05
  • 00072 Chapter 13. What solution is good for me.mp4
    11:03
  • 00073 Chapter 13. Constant-time programming.mp4
    11:49
  • 00074 Chapter 14. Post-quantum cryptography.mp4
    12:24
  • 00075 Chapter 14. From the birth of quantum computers to quantum supremacy.mp4
    10:21
  • 00076 Chapter 14. Hash-based signatures - Don t need anything but a hash function.mp4
    05:55
  • 00077 Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4
    08:00
  • 00078 Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4
    08:43
  • 00079 Chapter 14. Kyber a lattice-based key exchange.mp4
    09:50
  • 00080 Chapter 14. Do I need to panic.mp4
    08:35
  • 00081 Chapter 15. Is this it Next-generation cryptography.mp4
    10:32
  • 00082 Chapter 15. Fully homomorphic encryption FHE and the promises of an encrypted cloud.mp4
    10:15
  • 00083 Chapter 15 Where is it used..mp4
    12:08
  • 00084 Chapter 15. Homomorphic commitments to hide parts of the proof.mp4
    09:17
  • 00085 Chapter 15. An arithmetic circuit to a rank-1 constraint system R1CS.mp4
    11:19
  • 00086 Chapter 16. When and where cryptography fails.mp4
    12:14
  • 00087 Chapter 16. Where are the good libraries.mp4
    08:18
  • 00088 Chapter 16. Cryptography is not an island.mp4
    08:07
  • 00089 Appendix. Answers to exercises.mp4
    08:24
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Manning Publications is an American publisher specializing in content relating to computers. Manning mainly publishes textbooks but also release videos and projects for professionals within the computing world.
    • language english
    • Training sessions 89
    • duration 13:53:46
    • Release Date 2023/11/06