Oreilly Secret Key Cryptography
Download Free Download : Oreilly Secret Key Cryptography
mp4 | Video: h264,1280X720 | Audio: AAC, 44.1 KHz
Genre:eLearning | Language: English | Size:2.57 GB
Files Included :
001 Chapter 1 Introduction.mp4 (18.33 MB)
MP4
002 Chapter 2 What is cryptography.mp4 (21.84 MB)
MP4
003 Chapter 2 Types of cryptography.mp4 (29.37 MB)
MP4
004 Chapter 2 Mechanical vs digital.mp4 (30.96 MB)
MP4
005 Chapter 2 Why choose Secret Key.mp4 (25.64 MB)
MP4
006 Chapter 3 Preliminary concepts.mp4 (17.95 MB)
MP4
007 Chapter 3 Number bases.mp4 (18.99 MB)
MP4
008 Chapter 3 Prime numbers.mp4 (21.42 MB)
MP4
009 Chapter 4 Cryptographer's toolbox.mp4 (29.25 MB)
MP4
010 Chapter 4 Transposition.mp4 (22.76 MB)
MP4
011 Chapter 4 Chained digit generator.mp4 (20.78 MB)
MP4
012 Chapter 5 Substitution ciphers.mp4 (14.23 MB)
MP4
013 Chapter 5 Simple substitution.mp4 (11.8 MB)
MP4
014 Chapter 5 Mixing the alphabet.mp4 (17.77 MB)
MP4
015 Chapter 5 Nomenclators.mp4 (18.75 MB)
MP4
016 Chapter 5 The Kasiski method.mp4 (24.23 MB)
MP4
017 Chapter 5 Index of Coincidence.mp4 (21.15 MB)
MP4
018 Chapter 5 Solving a polyalphabetic cipher.mp4 (20.9 MB)
MP4
019 Chapter 5 Solving a general polyalphabetic cipher.mp4 (21.43 MB)
MP4
020 Chapter 5 Running key.mp4 (29.32 MB)
MP4
021 Chapter 5 Simulated rotor machines.mp4 (23.06 MB)
MP4
022 Chapter 5 Three-rotor machine.mp4 (28.6 MB)
MP4
023 Chapter 6 Countermeasures.mp4 (19.55 MB)
MP4
024 Chapter 6 Interrupted key.mp4 (28.24 MB)
MP4
025 Chapter 6 Bigram and trigram substitution.mp4 (24.6 MB)
MP4
026 Chapter 6 Adding null bits.mp4 (32.42 MB)
MP4
027 Chapter 7 Transposition.mp4 (23.91 MB)
MP4
028 Chapter 7 Columnar transposition.mp4 (20.29 MB)
MP4
029 Chapter 7 Double columnar transposition.mp4 (28.31 MB)
MP4
030 Chapter 7 Key transposition Part 1.mp4 (18.87 MB)
MP4
031 Chapter 7 Key transposition Part 2.mp4 (16.46 MB)
MP4
032 Chapter 8 Jefferson Wheel Cypher.mp4 (36.47 MB)
MP4
033 Chapter 8 Ciphertext-only solution.mp4 (21.47 MB)
MP4
034 Chapter 9 Fractionation.mp4 (28.71 MB)
MP4
035 Chapter 9 Solving a Playfair cipher.mp4 (25.18 MB)
MP4
036 Chapter 9 Three Square.mp4 (24.87 MB)
MP4
037 Chapter 9 Bifid.mp4 (22.89 MB)
MP4
038 Chapter 9 Diagonal bifid.mp4 (23.66 MB)
MP4
039 Chapter 9 Rectangular grids.mp4 (25.29 MB)
MP4
040 Chapter 9 Cyclic 8xN.mp4 (19.15 MB)
MP4
041 Chapter 10 Variable-length fractionation.mp4 (21.62 MB)
MP4
042 Chapter 10 Periodic lengths.mp4 (23.2 MB)
MP4
043 Chapter 10 Post tag systems.mp4 (31.24 MB)
MP4
044 Chapter 10 Different-length tags.mp4 (29.74 MB)
MP4
045 Chapter 10 Text compression.mp4 (30.33 MB)
MP4
046 Chapter 10 Arithmetic coding.mp4 (28.5 MB)
MP4
047 Chapter 10 Adaptive arithmetic coding.mp4 (26.04 MB)
MP4
048 Chapter 11 Block ciphers.mp4 (34.41 MB)
MP4
049 Chapter 11 Double DES.mp4 (21.29 MB)
MP4
050 Chapter 11 Matrix multiplication.mp4 (26.22 MB)
MP4
051 Chapter 11 Fixed vs keyed substitution.mp4 (22.75 MB)
MP4
052 Chapter 11 Involutory block cipher.mp4 (19.74 MB)
MP4
053 Chapter 11 Ripple ciphers.mp4 (26.39 MB)
MP4
054 Chapter 11 Block chaining.mp4 (23.01 MB)
MP4
055 Chapter 11 Chaining mode summary.mp4 (16.53 MB)
MP4
056 Chapter 12 Principles for secure encryption.mp4 (22.43 MB)
MP4
057 Chapter 12 Confusion.mp4 (34.29 MB)
MP4
058 Chapter 12 Correlation coefficient.mp4 (19.62 MB)
MP4
059 Chapter 12 Base-26 linearity.mp4 (30.4 MB)
MP4
060 Chapter 12 Base-256 linearity.mp4 (19.01 MB)
MP4
061 Chapter 12 Adding a backdoor.mp4 (18.68 MB)
MP4
062 Chapter 12 Condensed linearity.mp4 (20.3 MB)
MP4
063 Chapter 12 Constructing an S-box.mp4 (29.43 MB)
MP4
064 Chapter 12 Diffusion.mp4 (23.63 MB)
MP4
065 Chapter 12 Saturation Part 1.mp4 (17.93 MB)
MP4
066 Chapter 12 Saturation Part 2.mp4 (20.65 MB)
MP4
067 Chapter 13 Stream ciphers.mp4 (22.84 MB)
MP4
068 Chapter 13 Multiplicative congruential generator Part 1.mp4 (27.3 MB)
MP4
069 Chapter 13 Multiplicative congruential generator Part 2.mp4 (18.27 MB)
MP4
070 Chapter 13 Linear congruential generator.mp4 (23.57 MB)
MP4
071 Chapter 13 Chained addition generator.mp4 (20.43 MB)
MP4
072 Chapter 13 Mersenne Twister.mp4 (26.74 MB)
MP4
073 Chapter 13 Estimating the period.mp4 (24.26 MB)
MP4
074 Chapter 13 Combining generators Part 1.mp4 (24.12 MB)
MP4
075 Chapter 13 Combining generators Part 2.mp4 (23.2 MB)
MP4
076 Chapter 13 True random numbers.mp4 (18.38 MB)
MP4
077 Chapter 13 Refreshing the random bytes.mp4 (33.1 MB)
MP4
078 Chapter 13 Hash functions.mp4 (18.2 MB)
MP4
079 Chapter 14 One-time pad.mp4 (31.96 MB)
MP4
080 Chapter 14 Key supply.mp4 (33.84 MB)
MP4
081 Chapter 14 Diffie-Hellman key exchange.mp4 (36.63 MB)
MP4
082 Chapter 14 Constructing large primes, new Part 1.mp4 (35.12 MB)
MP4
083 Chapter 14 Constructing large primes, new Part 2.mp4 (31.09 MB)
MP4
084 Chapter 15 Matrix methods.mp4 (13.39 MB)
MP4
085 Chapter 15 Transposition matrix.mp4 (32.8 MB)
MP4
086 Chapter 15 Hill cipher, computer versions.mp4 (30.18 MB)
MP4
087 Chapter 15 Large integer multiplication.mp4 (23.57 MB)
MP4
088 Chapter 15 Solving a linear congruence.mp4 (18.11 MB)
MP4
089 Chapter 15 Laddering.mp4 (12.95 MB)
MP4
090 Chapter 15 Large integer ciphers.mp4 (26.3 MB)
MP4
091 Chapter 15 Multiplication modulo P.mp4 (22.99 MB)
MP4
092 Chapter 15 Rings.mp4 (20.19 MB)
MP4
093 Chapter 15 Matrices over a ring.mp4 (26.98 MB)
MP4
094 Chapter 15 Finding an invertible matrix.mp4 (14.78 MB)
MP4
095 Chapter 16 Three pass protocol.mp4 (30.52 MB)
MP4
096 Chapter 16 Discrete logarithm.mp4 (23.82 MB)
MP4
097 Chapter 16 Factoring.mp4 (25.5 MB)
MP4
098 Chapter 16 Matrix three pass protocol.mp4 (26.52 MB)
MP4
099 Chapter 16 Maximum order.mp4 (22.83 MB)
MP4
100 Chapter 16 Solving bilinear equations.mp4 (27.33 MB)
MP4
101 Chapter 16 Two-sided three pass protocol.mp4 (18.05 MB)
MP4
102 Chapter 17 Codes.mp4 (27.75 MB)
MP4
103 Chapter 18 Quantum computers.mp4 (29.84 MB)
MP4
104 Chapter 18 Error correction.mp4 (32.27 MB)
MP4
105 Chapter 18 Equations.mp4 (16.6 MB)
MP4
106 Chapter 18 Minimization.mp4 (37.17 MB)
MP4
107 Chapter 18 Ultracomputers.mp4 (23.9 MB)
MP4
108 Chapter 18 Ultrasubstitution cipher US-A.mp4 (14.96 MB)
MP4
109 Epilogue.mp4 (13.63 MB)
MP4
Free search engine download: Oreilly Secret Key Cryptography
Коментарии
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.