Companies Home Search Profile

Real-World Cryptography, video edition

Focused View

13:53:46

78 View
  • 01-Part 1. Primitives - The ingredients of cryptography.mp4
    00:59
  • 02-Chapter 1. Introduction.mp4
    08:48
  • 03-Chapter 1. Kerckhoffs principle - Only the key is kept secret.mp4
    07:18
  • 04-Chapter 1. Key exchanges or how to get a shared secret.mp4
    10:57
  • 05-Chapter 1. Classifying and abstracting cryptography.mp4
    08:33
  • 06-Chapter 1. From theoretical to practical - Choose your own adventure - Part 1.mp4
    07:41
  • 07-Chapter 1. From theoretical to practical - Choose your own adventure - Part 2.mp4
    08:07
  • 08-Chapter 2. Hash functions.mp4
    10:45
  • 09-Chapter 2. Security considerations for hash functions.mp4
    11:48
  • 10-Chapter 2. Standardized hash functions.mp4
    08:51
  • 11-Chapter 2. The SHA-3 hash function.mp4
    11:10
  • 12-Chapter 2. Avoid ambiguous hashing with TupleHash.mp4
    10:37
  • 13-Chapter 3. Message authentication codes.mp4
    08:00
  • 14-Chapter 3. Security properties of a MAC.mp4
    11:12
  • 15-Chapter 3. Integrity of cookies.mp4
    11:23
  • 16-Chapter 4. Authenticated encryption.mp4
    10:11
  • 17-Chapter 4. The interface of AES.mp4
    11:45
  • 18-Chapter 4. A lack of authenticity, hence AES-CBC-HMAC.mp4
    05:56
  • 19-Chapter 4. The AES-GCM AEAD.mp4
    09:17
  • 20-Chapter 4. ChaCha20-Poly1305.mp4
    07:32
  • 21-Chapter 4. Other kinds of symmetric encryption.mp4
    08:21
  • 22-Chapter 5. Key exchanges.mp4
    08:32
  • 23-Chapter 5. Group theory.mp4
    10:18
  • 24-Chapter 5. The discrete logarithm problem - The basis of Diffie-Hellman.mp4
    09:01
  • 25-Chapter 5. The Elliptic Curve Diffie-Hellman (ECDH) key exchange.mp4
    06:55
  • 26-Chapter 5. How does the Elliptic Curve Diffie-Hellman (ECDH) key exchange work.mp4
    07:54
  • 27-Chapter 5. Small subgroup attacks and other security considerations.mp4
    10:39
  • 28-Chapter 6. Asymmetric encryption and hybrid encryption.mp4
    08:04
  • 29-Chapter 6. Hybrid encryption.mp4
    06:26
  • 30-Chapter 6. Textbook RSA.mp4
    12:10
  • 31-Chapter 6. Asymmetric encryption with RSA-OAEP.mp4
    10:30
  • 32-Chapter 7. Signatures and zero-knowledge proofs.mp4
    09:56
  • 33-Chapter 7. Zero-knowledge proofs (ZKPs) - The origin of signatures.mp4
    10:48
  • 34-Chapter 7. The signature algorithms you should use (or not).mp4
    10:32
  • 35-Chapter 7. RSA-PSS - A better standard.mp4
    10:57
  • 36-Chapter 7. The Edwards-curve Digital Signature Algorithm (EdDSA).mp4
    09:34
  • 37-Chapter 7. Subtle behaviors of signature schemes.mp4
    07:25
  • 38-Chapter 8. Randomness and secrets.mp4
    07:00
  • 39-Chapter 8. Slow randomness Use a pseudorandom number generator (PRNG).mp4
    08:31
  • 40-Chapter 8. Obtaining randomness in practice.mp4
    11:44
  • 41-Chapter 8. Public randomness.mp4
    12:11
  • 42-Chapter 8. Managing keys and secrets.mp4
    11:42
  • 43-Part 2. Protocols - The recipes of cryptography.mp4
    02:47
  • 44-Chapter 9. Secure transport.mp4
    09:27
  • 45-Chapter 9. How does the TLS protocol work.mp4
    09:19
  • 46-Chapter 9. The TLS handshake - Part 1.mp4
    11:44
  • 47-Chapter 9. The TLS handshake - Part 2.mp4
    09:04
  • 48-Chapter 9. How TLS 1.3 encrypts application data.mp4
    12:06
  • 49-Chapter 9. The Noise protocol framework - A modern alternative to TLS.mp4
    08:30
  • 50-Chapter 10. End-to-end encryption.mp4
    10:33
  • 51-Chapter 10. The failure of encrypted email.mp4
    08:42
  • 52-Chapter 10. Key discovery is a real issue.mp4
    10:18
  • 53-Chapter 10. More user-friendly than the WOT - Trust but verify.mp4
    09:36
  • 54-Chapter 10. Double Ratchet - Signals post-handshake protocol.mp4
    12:36
  • 55-Chapter 11. User authentication.mp4
    09:39
  • 56-Chapter 11. One password to rule them all - Single sign-on (SSO) and password managers.mp4
    06:50
  • 57-Chapter 11. Dont want to see their passwords Use an asymmetric password-authenticated key exchange.mp4
    06:19
  • 58-Chapter 11. One-time passwords arent really passwords - Going passwordless with symmetric keys.mp4
    11:32
  • 59-Chapter 11. User-aided authentication - Pairing devices using some human help.mp4
    11:52
  • 60-Chapter 11. Was my key exchange MITMd Just check a short authenticated string (SAS).mp4
    08:57
  • 61-Chapter 12. Crypto as in cryptocurrency.mp4
    08:21
  • 62-Chapter 12. A problem of trust Decentralization helps.mp4
    09:21
  • 63-Chapter 12. How does Bitcoin work.mp4
    11:44
  • 64-Chapter 12. Forking hell! Solving conflicts in mining.mp4
    10:51
  • 65-Chapter 12. A tour of cryptocurrencies.mp4
    09:48
  • 66-Chapter 12. A round in the DiemBFT protocol.mp4
    10:01
  • 67-Chapter 13. Hardware cryptography.mp4
    09:22
  • 68-Chapter 13. Theyre in your wallet - Smart cards and secure elements.mp4
    07:13
  • 69-Chapter 13. Banks love them - Hardware security modules (HSMs).mp4
    07:09
  • 70-Chapter 13. Trusted Platform Modules (TPMs) - A useful standardization of secure elements.mp4
    07:46
  • 71-Chapter 13. Confidential computing with a trusted execution environment (TEE).mp4
    05:05
  • 72-Chapter 13. What solution is good for me.mp4
    11:03
  • 73-Chapter 13. Constant-time programming.mp4
    11:49
  • 74-Chapter 14. Post-quantum cryptography.mp4
    12:24
  • 75-Chapter 14. From the birth of quantum computers to quantum supremacy.mp4
    10:21
  • 76-Chapter 14. Hash-based signatures - Dont need anything but a hash function.mp4
    05:55
  • 77-Chapter 14. Many-times signatures with XMSS and SPHINCS+.mp4
    08:00
  • 78-Chapter 14. Shorter keys and signatures with lattice-based cryptography.mp4
    08:43
  • 79-Chapter 14. Kyber, a lattice-based key exchange.mp4
    09:50
  • 80-Chapter 14. Do I need to panic.mp4
    08:35
  • 81-Chapter 15. Is this it Next-generation cryptography.mp4
    10:32
  • 82-Chapter 15. Fully homomorphic encryption (FHE) and the promises of an encrypted cloud.mp4
    10:15
  • 83-Chapter 15 Where is it used..mp4
    12:08
  • 84-Chapter 15. Homomorphic commitments to hide parts of the proof.mp4
    09:17
  • 85-Chapter 15. An arithmetic circuit to a rank-1 constraint system (R1CS).mp4
    11:19
  • 86-Chapter 16. When and where cryptography fails.mp4
    12:14
  • 87-Chapter 16. Where are the good libraries.mp4
    08:18
  • 88-Chapter 16. Cryptography is not an island.mp4
    08:07
  • 89-Appendix. Answers to exercises.mp4
    08:24
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Manning Publications is an American publisher specializing in content relating to computers. Manning mainly publishes textbooks but also release videos and projects for professionals within the computing world.
    • language english
    • Training sessions 89
    • duration 13:53:46
    • Release Date 2023/11/06

    Courses related to Cryptography