Real-World Cryptography, video edition
Focused View
13:53:46
78 View
01-Part 1. Primitives - The ingredients of cryptography.mp4
00:59
02-Chapter 1. Introduction.mp4
08:48
03-Chapter 1. Kerckhoffs principle - Only the key is kept secret.mp4
07:18
04-Chapter 1. Key exchanges or how to get a shared secret.mp4
10:57
05-Chapter 1. Classifying and abstracting cryptography.mp4
08:33
06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4
07:41
07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4
08:07
08-Chapter 2. Hash functions.mp4
10:45
09-Chapter 2. Security considerations for hash functions.mp4
11:48
10-Chapter 2. Standardized hash functions.mp4
08:51
11-Chapter 2. The SHA-3 hash function.mp4
11:10
12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4
10:37
13-Chapter 3. Message authentication codes.mp4
08:00
14-Chapter 3. Security properties of a MAC.mp4
11:12
15-Chapter 3. Integrity of cookies.mp4
11:23
16-Chapter 4. Authenticated encryption.mp4
10:11
17-Chapter 4. The interface of AES.mp4
11:45
18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4
05:56
19-Chapter 4. The AES-GCM AEAD.mp4
09:17
20-Chapter 4. ChaCha20-Poly1305.mp4
07:32
21-Chapter 4. Other kinds of symmetric encryption.mp4
08:21
22-Chapter 5. Key exchanges.mp4
08:32
23-Chapter 5. Group theory.mp4
10:18
24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4
09:01
25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4
06:55
26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4
07:54
27-Chapter 5. Small subgroup attacks and other security considerations.mp4
10:39
28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4
08:04
29-Chapter 6. Hybrid encryption.mp4
06:26
30-Chapter 6. Textbook RSA.mp4
12:10
31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4
10:30
32-Chapter 7. Signatures and zero-knowledge proofs.mp4
09:56
33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4
10:48
34-Chapter 7. The signature algorithms you should use (or not).mp4
10:32
35-Chapter 7. RSA-PSS - A better standard.mp4
10:57
36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4
09:34
37-Chapter 7. Subtle behaviors of signature schemes.mp4
07:25
38-Chapter 8. Randomness and secrets.mp4
07:00
39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4
08:31
40-Chapter 8. Obtaining randomness in practice.mp4
11:44
41-Chapter 8. Public randomness.mp4
12:11
42-Chapter 8. Managing keys and secrets.mp4
11:42
43-Part 2. Protocols - The recipes of cryptography.mp4
02:47
44-Chapter 9. Secure transport.mp4
09:27
45-Chapter 9. How does the TLS protocol work.mp4
09:19
46-Chapter 9. The TLS handshake - Part 1.mp4
11:44
47-Chapter 9. The TLS handshake - Part 2.mp4
09:04
48-Chapter 9. How TLS 1.3 encrypts application data.mp4
12:06
49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4
08:30
50-Chapter 10. End-to-end encryption.mp4
10:33
51-Chapter 10. The failure of encrypted email.mp4
08:42
52-Chapter 10. Key discovery is a real issue.mp4
10:18
53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4
09:36
54-Chapter 10. Double Ratchet - Signals post-handshake protocol.mp4
12:36
55-Chapter 11. User authentication.mp4
09:39
56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4
06:50
57-Chapter 11. Dont want to see their passwords Use an asymmetric password-authenticated key exchange.mp4
06:19
58-Chapter 11. One-time passwords arent really passwords - Going passwordless with symmetric keys.mp4
11:32
59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4
11:52
60-Chapter 11. Was my key exchange MITMd Just check a short authenticated string (SAS).mp4
08:57
61-Chapter 12. Crypto as in cryptocurrency.mp4
08:21
62-Chapter 12. A problem of trust Decentralization helps.mp4
09:21
63-Chapter 12. How does Bitcoin work.mp4
11:44
64-Chapter 12. Forking hell! Solving conflicts in mining.mp4
10:51
65-Chapter 12. A tour of cryptocurrencies.mp4
09:48
66-Chapter 12. A round in the DiemBFT protocol.mp4
10:01
67-Chapter 13. Hardware cryptography.mp4
09:22
68-Chapter 13. Theyre in your wallet - Smart cards and secure elements.mp4
07:13
69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4
07:09
70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4
07:46
71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4
05:05
72-Chapter 13. What solution is good for me.mp4
11:03
73-Chapter 13. Constant-time programming.mp4
11:49
74-Chapter 14. Post-quantum cryptography.mp4
12:24
75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4
10:21
76-Chapter 14. Hash-based signatures - Dont need anything but a hash function.mp4
05:55
77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4
08:00
78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4
08:43
79-Chapter 14. Kyber, a lattice-based key exchange.mp4
09:50
80-Chapter 14. Do I need to panic.mp4
08:35
81-Chapter 15. Is this it Next-generation cryptography.mp4
10:32
82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4
10:15
83-Chapter 15 Where is it used..mp4
12:08
84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4
09:17
85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4
11:19
86-Chapter 16. When and where cryptography fails.mp4
12:14
87-Chapter 16. Where are the good libraries.mp4
08:18
88-Chapter 16. Cryptography is not an island.mp4
08:07
89-Appendix. Answers to exercises.mp4
08:24
More details
User Reviews
Rating
average 0
Focused display
Category

Manning Publications
View courses Manning PublicationsManning Publications is an American publisher specializing in content relating to computers. Manning mainly publishes textbooks but also release videos and projects for professionals within the computing world.
- language english
- Training sessions 89
- duration 13:53:46
- Release Date 2023/11/06