Download link
File List
-
文件过大导致无法格式化,将以元数据展示。
[{"path": "Interview on GSM Cracking/3 - Countermeasures.mp4", "length": 84714658}, {"path": "Interview on GSM Cracking/2 - Timememory.mp4", "length": 63244656}, {"path": "Q & A Session 1/3 - Open Discussion.mp4", "length": 62281455}, {"path": "Lesson 1/43 - Colossus.mp4", "length": 57718787}, {"path": "Lesson 1/35 - Lorenz Cipher Machine.mp4", "length": 51505084}, {"path": "Interview on GSM Cracking/1 - Demo.mp4", "length": 48295063}, {"path": "Lesson 1/44 - Modern Symmetric Ciphers.mp4", "length": 45399856}, {"path": "Lesson 2/39 - Strong Collision Resistance.mp4", "length": 41847617}, {"path": "Lesson 1/42 - Guessing Keys Solution.mp4", "length": 39232039}, {"path": "Q & A Session 2/1 - Questions And Answers.mp4", "length": 37525673}, {"path": "Lesson 3/15 - Discrete Log Problem.mp4", "length": 37444703}, {"path": "Q & A Session 3/4 - Question 3.mp4", "length": 35847153}, {"path": "Lesson 5/37 - TLS Record Protocol.mp4", "length": 35033471}, {"path": "Lesson 5/21 - Master Secret.mp4", "length": 33620856}, {"path": "Lesson 2/03 - Randomness Quiz Solution.mp4", "length": 32656606}, {"path": "Lesson 6/55 - Longest Block Chain.mp4", "length": 31708208}, {"path": "Lesson 6/53 - Double Hash.mp4", "length": 31394363}, {"path": "Lesson 3/06 - Merkles Puzzles.mp4", "length": 31362103}, {"path": "Lesson 1/13 - One Time Pad.mp4", "length": 30571846}, {"path": "Lesson 1/32 - Lorenz Cipher.mp4", "length": 29711207}, {"path": "Lesson 5/38 - TLS Record Protocol Solution.mp4", "length": 29513439}, {"path": "Lesson 7/01 - Summary.mp4", "length": 29153896}, {"path": "Lesson 2/42 - Early Unix Implementation.mp4", "length": 29057848}, {"path": "Lesson 1/34 - Intercepting Messages Solution.mp4", "length": 28807368}, {"path": "Problem Set 6 Solutions/3 - Cut and Choose.mp4", "length": 28364411}, {"path": "Lesson 2/31 - Cryptographic Hash Function.mp4", "length": 28359157}, {"path": "Lesson 4/35 - Factoring Is Still Hard.mp4", "length": 28253890}, {"path": "Lesson 2/50 - Hotel Door Locks.mp4", "length": 27745298}, {"path": "Lesson 2/21 - Cipher Feedback Mode.mp4", "length": 27588650}, {"path": "Interview on GSM Cracking/4 - Ethics.mp4", "length": 27169518}, {"path": "Lesson 2/18 - Counter Mode.mp4", "length": 26457701}, {"path": "Lesson 5/34 - Signature Validation Solution.mp4", "length": 26280841}, {"path": "Q & A Session 1/2 - Otp And Quantum Crypto.mp4", "length": 26147518}, {"path": "Q & A Session 3/3 - Question 2.mp4", "length": 25908850}, {"path": "Lesson 3/30 - Faster Primality Test.mp4", "length": 25795341}, {"path": "Lesson 2/07 - Sources Of Randomness.mp4", "length": 25497372}, {"path": "Lesson 1/31 - Perfect Cipher Is Impractical Solution.mp4", "length": 25354383}, {"path": "Lesson 5/33 - Signature Validation.mp4", "length": 25199464}, {"path": "Lesson 2/26 - Protocols.mp4", "length": 25187630}, {"path": "Lesson 1/29 - Otp Is A Perfect Cipher Pt 3.mp4", "length": 24489047}, {"path": "Lesson 2/04 - Kolmogorov Complexity.mp4", "length": 24037532}, {"path": "Lesson 5/10 - Secure Shell.mp4", "length": 24035498}, {"path": "Lesson 5/04 - Encrypted Key Exchange.mp4", "length": 23890235}, {"path": "Lesson 2/14 - File Encryption Solution.mp4", "length": 23734141}, {"path": "Lesson 5/39 - CBC Attack.mp4", "length": 23568779}, {"path": "Lesson 6/10 - Eavesdropper Solution.mp4", "length": 23548581}, {"path": "Lesson 1/36 - Lorenz Cipher Machine Solution.mp4", "length": 22748801}, {"path": "Lesson 1/04 - Do Not Implement Your Own Crypto.mp4", "length": 22369792}, {"path": "Lesson 1/30 - Perfect Cipher Is Impractical.mp4", "length": 21643114}, {"path": "Lesson 2/40 - Storing Passwords.mp4", "length": 21622987}, {"path": "Lesson 1/02 - Introduction Solution.mp4", "length": 21571465}, {"path": "Lesson 5/17 - Basic TLS.mp4", "length": 21479076}, {"path": "Lesson 2/11 - PRNG Implementation Solution.mp4", "length": 21320146}, {"path": "Lesson 1/10 - Correctness And Security Solution.mp4", "length": 21265155}, {"path": "Lesson 1/28 - Otp Is A Perfect Cipher Pt 2.mp4", "length": 21240360}, {"path": "Lesson 4/07 - RSA Cryptosystem.mp4", "length": 21090884}, {"path": "Lesson 1/16 - Proving Security Solution.mp4", "length": 20943688}, {"path": "Lesson 5/14 - Ssh Authentication In Practice.mp4", "length": 20904253}, {"path": "Lesson 1/45 - Advanced Encryption Standard.mp4", "length": 20785551}, {"path": "Lesson 7/12 - Oblivious Transfer.mp4", "length": 20709241}, {"path": "Lesson 6/51 - Provide Scarcity.mp4", "length": 20650658}, {"path": "Lesson 1/07 - Keys And Kerchoffs Principle.mp4", "length": 20644222}, {"path": "Lesson 1/09 - Correctness And Security.mp4", "length": 20488370}, {"path": "Lesson 2/05 - Kolmogorov Complexity Solution.mp4", "length": 20442837}, {"path": "Lesson 6/04 - Envelopes Solution.mp4", "length": 20370563}, {"path": "Lesson 1/17 - Probability Review Pt 1.mp4", "length": 20204458}, {"path": "Lesson 2/17 - Cbc Initialization Vector Solution.mp4", "length": 20055441}, {"path": "Lesson 1/06 - Symmetric Cryptosystems.mp4", "length": 20001986}, {"path": "Lesson 2/27 - Mutual Distrust.mp4", "length": 19785306}, {"path": "Lesson 6/36 - Blindfolded Signatures.mp4", "length": 19779462}, {"path": "Lesson 6/47 - Identity Challenges.mp4", "length": 19589620}, {"path": "Lesson 2/32 - Cryptographic Hash Function Solution.mp4", "length": 19586864}, {"path": "Lesson 7/04 - Logic Gate.mp4", "length": 19469784}, {"path": "Lesson 1/33 - Intercepting Messages.mp4", "length": 19304431}, {"path": "Lesson 4/01 - Asymmetric Cryptosystems.mp4", "length": 19086019}, {"path": "Lesson 5/01 - Threat Model.mp4", "length": 19015986}, {"path": "Lesson 2/41 - Storing Passwords Solution.mp4", "length": 18701112}, {"path": "Lesson 6/35 - Digital Cash Solution.mp4", "length": 18566350}, {"path": "Lesson 4/28 - Security Of RSA.mp4", "length": 18518373}, {"path": "Lesson 2/25 - Properties Of Modes Solution.mp4", "length": 18346163}, {"path": "Lesson 3/09 - Secret Paint Mixing.mp4", "length": 17756233}, {"path": "Lesson 1/03 - Course Overview.mp4", "length": 17316278}, {"path": "Lesson 2/52 - Summary.mp4", "length": 17186954}, {"path": "Lesson 6/33 - Money Solution.mp4", "length": 16884098}, {"path": "Lesson 1/14 - One Time Pad Solution.mp4", "length": 16650533}, {"path": "Lesson 1/21 - Probability Review Pt 3.mp4", "length": 16583736}, {"path": "Lesson 6/08 - The First Hop Solution.mp4", "length": 16536128}, {"path": "Lesson 1/22 - Probability Review Pt 3 Solution.mp4", "length": 16370250}, {"path": "Lesson 4/17 - Proving Eulers Theorem Pt1 Solution.mp4", "length": 16366919}, {"path": "Lesson 2/49 - Hash Chain Solution.mp4", "length": 16347647}, {"path": "Lesson 4/15 - Totient Function Solution.mp4", "length": 16313450}, {"path": "Lesson 4/45 - Summary.mp4", "length": 16303450}, {"path": "Lesson 1/46 - Summary.mp4", "length": 16254041}, {"path": "Q & A Session 3/2 - Question 1.mp4", "length": 16162402}, {"path": "Lesson 3/17 - DH Security.mp4", "length": 16058493}, {"path": "Lesson 2/15 - Cipher Block Chaining Mode.mp4", "length": 16032613}, {"path": "Lesson 4/37 - Optional Complexity Solution.mp4", "length": 15979528}, {"path": "Lesson 2/43 - Salted Password Scheme.mp4", "length": 15688339}, {"path": "Lesson 4/31 - Totient and Factoring.mp4", "length": 15632381}, {"path": "Lesson 4/19 - Proving Eulers Theorem Pt2 Solution.mp4", "length": 15532692}, {"path": "Lesson 5/25 - Looking At A Certificate.mp4", "length": 15481514}, {"path": "Lesson 5/41 - TLS Information Leak Solution.mp4", "length": 15331064}, {"path": "Lesson 3/04 - Trusted Third Party.mp4", "length": 15245297}, {"path": "Lesson 6/05 - Onion Routing.mp4", "length": 15145631}, {"path": "Problem Set 2/04 - Decrpytion In Parallel Solution.mp4", "length": 14781780}, {"path": "Lesson 1/23 - Perfect Cipher.mp4", "length": 14760520}, {"path": "Lesson 3/01 - Introduction.mp4", "length": 14726936}, {"path": "Lesson 5/28 - Certificate Details.mp4", "length": 14706058}, {"path": "Problem Set 1/16 - Challenge Question.mp4", "length": 14658682}, {"path": "Lesson 6/49 - Bitcoin.mp4", "length": 14576694}, {"path": "Lesson 1/01 - Introduction.mp4", "length": 14427161}, {"path": "Lesson 5/20 - What Could Go Wrong Solution.mp4", "length": 14323689}, {"path": "Lesson 5/15 - Transport Layer Security.mp4", "length": 14285873}, {"path": "Lesson 1/26 - Otp Is A Perfect Cipher Pt 1 Solution.mp4", "length": 14224133}, {"path": "Lesson 2/01 - Applications Of Symmetric Ciphers.mp4", "length": 14088042}, {"path": "Lesson 1/41 - Guessing Keys.mp4", "length": 14042503}, {"path": "Lesson 3/34 - Diffie Hellman Summary.mp4", "length": 13965721}, {"path": "Lesson 2/38 - Weak Collision Resistance Solution.mp4", "length": 13942209}, {"path": "Lesson 3/11 - Key Exchange.mp4", "length": 13940383}, {"path": "Lesson 2/06 - Unpredictability.mp4", "length": 13936635}, {"path": "Lesson 2/08 - Pseudo Random Number Generator.mp4", "length": 13825366}, {"path": "Lesson 6/02 - Traffic Analysis.mp4", "length": 13731728}, {"path": "Lesson 6/01 - Solving Problems.mp4", "length": 13654094}, {"path": "Lesson 4/41 - Small Messages Solution.mp4", "length": 13644765}, {"path": "Lesson 4/09 - Small M Solution.mp4", "length": 13541070}, {"path": "Lesson 6/13 - Voting.mp4", "length": 13532678}, {"path": "Problem Set 2/06 - Output Feedback Mode Solution.mp4", "length": 13460427}, {"path": "Lesson 6/34 - Digital Cash.mp4", "length": 13400840}, {"path": "Lesson 2/30 - Padding Solution.mp4", "length": 13371891}, {"path": "Lesson 4/33 - 40 Quadrillion Years.mp4", "length": 13319015}, {"path": "Lesson 5/13 - SSH Authentication Solution.mp4", "length": 13141051}, {"path": "Lesson 6/37 - RSA Blind Signatures.mp4", "length": 13131760}, {"path": "Q & A Session 3/1 - Welcome.mp4", "length": 12952376}, {"path": "Lesson 6/12 - Tor Solution.mp4", "length": 12924818}, {"path": "Problem Set 2/10 - Hash Collision Solution.mp4", "length": 12911607}, {"path": "Lesson 6/03 - Envelopes.mp4", "length": 12870425}, {"path": "Lesson 6/29 - Getting Caught Solution.mp4", "length": 12780133}, {"path": "Lesson 3/19 - Implementing Dh Solution.mp4", "length": 12633224}, {"path": "Lesson 3/03 - Pairwise Distribution Solution.mp4", "length": 12607503}, {"path": "Lesson 6/42 - Blind Signatures Protocol Solution.mp4", "length": 12551990}, {"path": "Problem Set 3/6 - Timing Side Channel.mp4", "length": 12460761}, {"path": "Lesson 3/08 - Diffie Hellman.mp4", "length": 12344777}, {"path": "Lesson 6/14 - Apple Blue Crazy.mp4", "length": 12333615}, {"path": "Lesson 5/05 - Encrypted Key Exchange Solution.mp4", "length": 12328255}, {"path": "Lesson 1/12 - Xor Function Solution.mp4", "length": 12275818}, {"path": "Lesson 7/10 - Garbled Circuit Protocol.mp4", "length": 12206847}, {"path": "Lesson 4/04 - Signatures.mp4", "length": 11936842}, {"path": "Lesson 5/18 - Basic Tls Solution.mp4", "length": 11870705}, {"path": "Lesson 1/15 - Proving Security.mp4", "length": 11777502}, {"path": "Problem Set 1/01 - Introduction.mp4", "length": 11725034}, {"path": "Lesson 2/48 - Hash Chain.mp4", "length": 11718614}, {"path": "Lesson 6/56 - Summary.mp4", "length": 11663534}, {"path": "Lesson 7/02 - Secure Computation.mp4", "length": 11638699}, {"path": "Problem Set 6 Solutions/8 - TOR Extended 5.mp4", "length": 11587902}, {"path": "Lesson 2/47 - Password Reuse.mp4", "length": 11329987}, {"path": "Lesson 3/21 - Modular Exponentiation Quiz Solution.mp4", "length": 11316621}, {"path": "Lesson 6/32 - Money.mp4", "length": 11263162}, {"path": "Lesson 2/09 - Pseudo Random Number Generator Solution.mp4", "length": 11200999}, {"path": "Problem Set 1/08 - One Time Pad.mp4", "length": 11180347}, {"path": "Lesson 1/20 - Probability Review Pt 2 Solution.mp4", "length": 11165602}, {"path": "Lesson 1/24 - Perfect Cipher Solution.mp4", "length": 11000076}, {"path": "Problem Set 1/09 - One Time Pad Solution.mp4", "length": 10841805}, {"path": "Lesson 7/13 - Oblivious Transfer Solution.mp4", "length": 10809563}, {"path": "Lesson 2/28 - Mutual Distrust Solution.mp4", "length": 10804310}, {"path": "Problem Set 1/14 - Secret Sharing.mp4", "length": 10761089}, {"path": "Lesson 4/32 - Computing D Still Hard.mp4", "length": 10635685}, {"path": "Lesson 1/40 - Weakness In Keys Solution.mp4", "length": 10561151}, {"path": "Lesson 1/11 - Xor Function.mp4", "length": 10561009}, {"path": "Lesson 7/07 - Encrypt Outputs Solution.mp4", "length": 10501640}, {"path": "Lesson 5/24 - Trusting A Server Solution.mp4", "length": 10484606}, {"path": "Lesson 4/11 - Correctness Of Rsa Solution.mp4", "length": 10438601}, {"path": "Lesson 6/20 - Crazy Crazy.mp4", "length": 10367354}, {"path": "Lesson 3/28 - Primality Test.mp4", "length": 10247986}, {"path": "Lesson 4/06 - One Way Function.mp4", "length": 10242542}, {"path": "Problem Set 6/7 - Tor Extended 5.mp4", "length": 10210270}, {"path": "Lesson 6/24 - Auditing Mixes.mp4", "length": 10165798}, {"path": "Lesson 4/44 - Back To Signatures Solution.mp4", "length": 10163553}, {"path": "Lesson 7/16 - Putting It All Together.mp4", "length": 10105497}, {"path": "Lesson 2/10 - Prng Implementation.mp4", "length": 10070074}, {"path": "Lesson 4/21 - Invertibility Of RSA Solution.mp4", "length": 10066418}, {"path": "Lesson 4/43 - Back To Signatures.mp4", "length": 9964072}, {"path": "Lesson 5/09 - Eke Authentication Implementation Solution.mp4", "length": 9880740}, {"path": "Lesson 4/42 - Thwarting Guessing.mp4", "length": 9793861}, {"path": "Lesson 3/02 - Pairwise Distribution.mp4", "length": 9722875}, {"path": "Problem Set 6 Solutions/5 - TOR Extended 2.mp4", "length": 9699286}, {"path": "Lesson 3/33 - Diffie Hellman Summary.mp4", "length": 9682325}, {"path": "Lesson 4/02 - Private Messages.mp4", "length": 9653635}, {"path": "Lesson 5/08 - Eke Authentication Implementation.mp4", "length": 9588287}, {"path": "Lesson 6/25 - Auditing Mixes Solution.mp4", "length": 9517780}, {"path": "Lesson 3/16 - Discrete Log Problem Solution.mp4", "length": 9492887}, {"path": "Problem Set 2/02 - Randomness Solution.mp4", "length": 9415255}, {"path": "Lesson 3/10 - Properties Of Multiplication.mp4", "length": 9234800}, {"path": "Lesson 3/05 - Trusted Third Party Solution.mp4", "length": 9196320}, {"path": "Lesson 7/05 - Logic Gate Solution.mp4", "length": 9195690}, {"path": "Lesson 5/11 - Secure Shell Solution.mp4", "length": 9119823}, {"path": "Lesson 5/31 - Certificates And Signatures.mp4", "length": 9020981}, {"path": "Lesson 1/19 - Probability Review Pt 2.mp4", "length": 8992307}, {"path": "Lesson 5/02 - Threat Model Solution.mp4", "length": 8813377}, {"path": "Problem Set 3/8 - Rabin Miller Primality Test Solution.mp4", "length": 8787397}, {"path": "Lesson 6/45 - Identity List.mp4", "length": 8774843}, {"path": "Lesson 5/03 - Overview.mp4", "length": 8571260}, {"path": "Lesson 6/38 - Rsa Blind Signatures Solution.mp4", "length": 8463113}, {"path": "Lesson 1/25 - Otp Is A Perfect Cipher Pt 1.mp4", "length": 8438776}, {"path": "Lesson 3/23 - Finding Large Primes Solution.mp4", "length": 8296110}, {"path": "Lesson 3/25 - Infinite Primes Solution.mp4", "length": 8286034}, {"path": "Problem Set 6 Solutions/6 - TOR Extended 3.mp4", "length": 8284027}, {"path": "Lesson 2/35 - Coin Tossing Again.mp4", "length": 8283704}, {"path": "Lesson 7/08 - Permute Outputs.mp4", "length": 8185219}, {"path": "Lesson 5/42 - Summary.mp4", "length": 8096278}, {"path": "Lesson 5/23 - Trusting A Server.mp4", "length": 8057201}, {"path": "Lesson 6/23 - Prove A Vote Solution.mp4", "length": 8042731}, {"path": "Problem Set 1/07 - Conditional Probability 3 Solution.mp4", "length": 8030815}, {"path": "Problem Set 4/08 - OAEP.mp4", "length": 7840837}, {"path": "Lesson 5/27 - Certificates Solution.mp4", "length": 7820242}, {"path": "Lesson 6/06 - Onion Routing Solution.mp4", "length": 7793353}, {"path": "Lesson 6/17 - Mixnet Solution.mp4", "length": 7760003}, {"path": "Problem Set 1/11 - Toy Substitution Cipher 1 Solution.mp4", "length": 7740115}, {"path": "Q & A Session 1/1 - Mathematics And Programming.mp4", "length": 7719308}, {"path": "Lesson 2/29 - Padding.mp4", "length": 7663536}, {"path": "Problem Set 6 Solutions/1 - Onion Routing.mp4", "length": 7611267}, {"path": "Lesson 6/27 - Auditing Tradeoffs Solution.mp4", "length": 7586705}, {"path": "Lesson 3/07 - Merkles Puzzles Solution.mp4", "length": 7533007}, {"path": "Lesson 4/30 - Totient and Factoring.mp4", "length": 7530345}, {"path": "Problem Set 2/05 - Output Feedback Mode.mp4", "length": 7527097}, {"path": "Lesson 2/37 - Weak Collision Resistance.mp4", "length": 7493087}, {"path": "Lesson 4/39 - Insecurity In Practice.mp4", "length": 7446855}, {"path": "Final Assessment/9 - Proofs Of Work.mp4", "length": 7418802}, {"path": "Problem Set 2/07 - CBC Implementation.mp4", "length": 7382911}, {"path": "Lesson 4/20 - Invertibility Of RSA.mp4", "length": 7323009}, {"path": "Lesson 3/18 - Implementing Dh.mp4", "length": 7292268}, {"path": "Lesson 3/13 - Passive Eavesdropper.mp4", "length": 7280143}, {"path": "Lesson 4/16 - Proving Eulers Theorem Pt1.mp4", "length": 7253077}, {"path": "Lesson 6/41 - Blind Signatures Protocol.mp4", "length": 7246293}, {"path": "Lesson 4/05 - Signatures Solution.mp4", "length": 7239958}, {"path": "Lesson 4/12 - Eulers Theorem.mp4", "length": 7206732}, {"path": "Problem Set 5/6 - Useful Certificates Solution.mp4", "length": 7194230}, {"path": "Final Assessment/3 - Perfect Ciphers.mp4", "length": 7169684}, {"path": "Problem Set 6/4 - Tor Extended 2.mp4", "length": 7103465}, {"path": "Lesson 5/36 - Handshake Recap.mp4", "length": 6954215}, {"path": "Lesson 3/12 - Key Exchange Solution.mp4", "length": 6844745}, {"path": "Lesson 1/39 - Weakness In Keys.mp4", "length": 6840746}, {"path": "Problem Set 2/09 - Hash Collision.mp4", "length": 6827993}, {"path": "Lesson 4/24 - Compute E.mp4", "length": 6804281}, {"path": "Lesson 2/20 - Parallel Processing Solution.mp4", "length": 6790099}, {"path": "Lesson 5/07 - EKE Authentication Solution.mp4", "length": 6776234}, {"path": "Lesson 3/35 - Summary.mp4", "length": 6762582}, {"path": "Lesson 7/06 - Encrypt Outputs.mp4", "length": 6731188}, {"path": "Problem Set 3/2 - Diffie Hellman Solution.mp4", "length": 6650824}, {"path": "Problem Set 1/02 - Conditional Probability 1.mp4", "length": 6625663}, {"path": "Problem Set 3/7 - Rabin Miller Primality Test.mp4", "length": 6621385}, {"path": "Lesson 1/38 - Importance Of Keys Solution.mp4", "length": 6589902}, {"path": "Lesson 6/16 - Mixnet.mp4", "length": 6533526}, {"path": "Problem Set 6 Solutions/7 - TOR Extended 4.mp4", "length": 6519718}, {"path": "Lesson 2/34 - Random Oracle Solution.mp4", "length": 6492674}, {"path": "Lesson 2/51 - Hotel Door Locks Solution.mp4", "length": 6434585}, {"path": "Problem Set 5/3 - Hashing And EKE.mp4", "length": 6326375}, {"path": "Problem Set 1/10 - Toy Substitution Cipher 1.mp4", "length": 6314663}, {"path": "Lesson 6/31 - Observing A Vote Solution.mp4", "length": 6311789}, {"path": "Lesson 2/12 - Weak PRNGs.mp4", "length": 6299380}, {"path": "Lesson 4/38 - Insecurity In Practice.mp4", "length": 6296178}, {"path": "Lesson 4/29 - Security Of Rsa Solution.mp4", "length": 6210196}, {"path": "Final Assessment/8 - Garbled Circuits.mp4", "length": 6190370}, {"path": "Problem Set 3/1 - Diffie Hellman.mp4", "length": 6165254}, {"path": "Problem Set 6/6 - Tor Extended 4.mp4", "length": 6150454}, {"path": "Lesson 6/46 - Identity List Solution.mp4", "length": 6073840}, {"path": "Lesson 2/36 - Coin Tossing Again Solution.mp4", "length": 6066245}, {"path": "Lesson 2/22 - Cfb Decryption.mp4", "length": 6063913}, {"path": "Lesson 7/15 - Wire Labels Solution.mp4", "length": 6022952}, {"path": "Lesson 3/14 - Passive Eavesdropper Solution.mp4", "length": 6019935}, {"path": "Lesson 3/26 - Density Of Primes.mp4", "length": 5977416}, {"path": "Lesson 2/33 - Random Oracle.mp4", "length": 5929499}, {"path": "Lesson 6/21 - Crazy Crazy Solution.mp4", "length": 5864600}, {"path": "Lesson 2/24 - Properties Of Modes.mp4", "length": 5836746}, {"path": "Lesson 4/18 - Proving Eulers Theorem Pt2.mp4", "length": 5813242}, {"path": "Final Assessment/4 - Symmetric Ciphers.mp4", "length": 5778162}, {"path": "Lesson 5/22 - Weak Ciphers.mp4", "length": 5733406}, {"path": "Lesson 4/27 - Compute D Solution.mp4", "length": 5615551}, {"path": "Lesson 1/37 - Importance Of Keys.mp4", "length": 5597942}, {"path": "Lesson 7/11 - Garbled Circuit Protocol Solution.mp4", "length": 5499865}, {"path": "Problem Set 4/02 - Public Key Cryptography Solution.mp4", "length": 5496473}, {"path": "Problem Set 1/05 - Conditional Probability 2 Solution.mp4", "length": 5177120}, {"path": "Final Assessment/7 - Signing Certificates.mp4", "length": 5173744}, {"path": "Lesson 4/23 - Picking E And D Solution.mp4", "length": 5096860}, {"path": "Lesson 5/32 - Certificates And Signatures Solution.mp4", "length": 5071557}, {"path": "Lesson 6/19 - Voter Identity Solution.mp4", "length": 5052386}, {"path": "Lesson 5/35 - Interesting Certificate Chains.mp4", "length": 5011048}, {"path": "Lesson 6/54 - Double Hash Solution.mp4", "length": 4983172}, {"path": "Lesson 5/26 - Certificates.mp4", "length": 4958093}, {"path": "Lesson 7/14 - Wire Labels.mp4", "length": 4920371}, {"path": "Lesson 6/52 - Provide Scarcity Solution.mp4", "length": 4883381}, {"path": "Lesson 5/16 - Transport Layer Security Solution.mp4", "length": 4874753}, {"path": "Lesson 6/30 - Observing A Vote.mp4", "length": 4766516}, {"path": "Problem Set 6 Solutions/2 - Voting.mp4", "length": 4735597}, {"path": "Problem Set 2/03 - Decrpytion In Parallel.mp4", "length": 4734437}, {"path": "Problem Set 2/01 - Randomness.mp4", "length": 4622931}, {"path": "Lesson 2/16 - Cbc Initialization Vector.mp4", "length": 4592366}, {"path": "Lesson 4/08 - Small M.mp4", "length": 4591797}, {"path": "Lesson 6/18 - Voter Identity.mp4", "length": 4542375}, {"path": "Problem Set 4/09 - Oaep Solution.mp4", "length": 4521113}, {"path": "Lesson 6/09 - Eavesdropper.mp4", "length": 4429554}, {"path": "Lesson 4/34 - 40 Quadrillion Years Solution.mp4", "length": 4411091}, {"path": "Lesson 7/09 - Permute Outputs Solution.mp4", "length": 4402556}, {"path": "Problem Set 4/07 - RSA Signature.mp4", "length": 4401340}, {"path": "Lesson 2/23 - Cfb Decryption Solution.mp4", "length": 4371140}, {"path": "Problem Set 4/10 - RSA SIgnature Solution.mp4", "length": 4317642}, {"path": "Lesson 7/03 - Secure Computation Solution.mp4", "length": 4256310}, {"path": "Lesson 4/40 - Small Messages.mp4", "length": 4250058}, {"path": "Lesson 3/27 - Density Of Primes Solution.mp4", "length": 4240219}, {"path": "Problem Set 3/9 - Challenge Question.mp4", "length": 4223645}, {"path": "Problem Set 3/5 - Timing Side Channel.mp4", "length": 4218340}, {"path": "Problem Set 4/06 - Rsa Encryption Solution.mp4", "length": 4148555}, {"path": "Problem Set 1/15 - Secret Sharing Solution.mp4", "length": 4124488}, {"path": "Lesson 2/02 - Randomness Quiz.mp4", "length": 4088012}, {"path": "Problem Set 4/04 - Totient Solution.mp4", "length": 4052139}, {"path": "Problem Set 2/08 - Cbc Implementation Solution.mp4", "length": 4047698}, {"path": "Problem Set 5/4 - Hashing And EKE Solution.mp4", "length": 3999687}, {"path": "Final Assessment/1 - One Time Pad.mp4", "length": 3978425}, {"path": "Problem Set 3/4 - Primitive Roots Solution.mp4", "length": 3970229}, {"path": "Lesson 4/22 - Picking E And D.mp4", "length": 3969028}, {"path": "Problem Set 5/7 - Signing.mp4", "length": 3948546}, {"path": "Lesson 1/18 - Probability Review Pt 1 Solution.mp4", "length": 3916488}, {"path": "Lesson 6/48 - Identity Challenges Solution.mp4", "length": 3889995}, {"path": "Problem Set 2/11 - Challenge Question.mp4", "length": 3874662}, {"path": "Problem Set 5/8 - Signing Solution.mp4", "length": 3832384}, {"path": "Problem Set 5/2 - One Time Pad Reborn Solution.mp4", "length": 3775676}, {"path": "Problem Set 6/1 - Onion Routing.mp4", "length": 3771802}, {"path": "Lesson 1/08 - Keys And Kerchoffs Principle Solution.mp4", "length": 3753538}, {"path": "Lesson 1/27 - Otp Is A Perfect Cipher Pt 2.mp4", "length": 3719737}, {"path": "Problem Set 6/5 - Tor Extended 3.mp4", "length": 3713315}, {"path": "Lesson 5/06 - EKE Authentication.mp4", "length": 3606395}, {"path": "Lesson 6/40 - Worry Solution.mp4", "length": 3580431}, {"path": "Lesson 2/46 - Thwarting Dictionary Attacks Solution.mp4", "length": 3499109}, {"path": "Lesson 5/19 - What Could Go Wrong.mp4", "length": 3490123}, {"path": "Lesson 3/29 - Primality Test Solution.mp4", "length": 3485922}, {"path": "Lesson 4/03 - Private Messages Solution.mp4", "length": 3451634}, {"path": "Final Assessment/2 - Biased Generator.mp4", "length": 3423571}, {"path": "Lesson 2/19 - Parallel Processing.mp4", "length": 3383972}, {"path": "Problem Set 5/1 - One Time Pad Reborn.mp4", "length": 3360318}, {"path": "Final Assessment/5 - Key Distribution.mp4", "length": 3359412}, {"path": "Lesson 5/12 - SSH Authentication.mp4", "length": 3343297}, {"path": "Lesson 2/44 - Salted Password Scheme Solution.mp4", "length": 3324424}, {"path": "Problem Set 4/05 - Rsa Encryption.mp4", "length": 3308226}, {"path": "Lesson 5/30 - Convincing Solution.mp4", "length": 3295841}, {"path": "Problem Set 6/3 - Tor Extended 1.mp4", "length": 3268084}, {"path": "Lesson 6/11 - Tor.mp4", "length": 3250757}, {"path": "Problem Set 4/01 - Public Key Cryptography.mp4", "length": 3245740}, {"path": "Lesson 6/43 - Deanonymizing Double Spenders.mp4", "length": 3205691}, {"path": "Lesson 4/10 - Correctness Of RSA.mp4", "length": 3099979}, {"path": "Lesson 5/40 - TLS Information Leak.mp4", "length": 3063633}, {"path": "Problem Set 5/5 - Useful Certificates.mp4", "length": 3055288}, {"path": "Problem Set 3/3 - Primitive Roots.mp4", "length": 3004143}, {"path": "Lesson 6/15 - Apple Blue Crazy Solution.mp4", "length": 2967076}, {"path": "Lesson 6/44 - Deanonymizing Double Spenders Solution.mp4", "length": 2943817}, {"path": "Problem Set 6/2 - Voting.mp4", "length": 2891673}, {"path": "Lesson 6/50 - Bitcoin Solution.mp4", "length": 2662873}, {"path": "Lesson 4/13 - Eulers Theorem Solution.mp4", "length": 2537819}, {"path": "Problem Set 1/13 - Toy Substitution Cipher 2 Solution.mp4", "length": 2524887}, {"path": "Lesson 3/20 - Modular Exponentiation Quiz.mp4", "length": 2519928}, {"path": "Lesson 4/26 - Compute D.mp4", "length": 2489057}, {"path": "Lesson 3/24 - Infinite Primes.mp4", "length": 2488092}, {"path": "Lesson 2/45 - Thwarting Dictionary Attacks.mp4", "length": 2469612}, {"path": "Problem Set 6 Solutions/4 - TOR Extended 1.mp4", "length": 2468087}, {"path": "Lesson 4/36 - Optional Complexity.mp4", "length": 2286995}, {"path": "Final Assessment/6 - Rsa.mp4", "length": 2218270}, {"path": "Lesson 7/17 - Congratulations.mp4", "length": 2066590}, {"path": "Lesson 6/22 - Prove A Vote.mp4", "length": 1818098}, {"path": "Problem Set 1/03 - Conditional Probability 1 Solution.mp4", "length": 1695430}, {"path": "Problem Set 1/12 - Toy Substitution Cipher 2.mp4", "length": 1649554}, {"path": "Lesson 4/25 - Compute E Solution.mp4", "length": 1638705}, {"path": "Lesson 3/31 - Primality Quiz.mp4", "length": 1518075}, {"path": "Lesson 3/32 - Primality Quiz Solution.mp4", "length": 1443604}, {"path": "Lesson 6/07 - The First Hop.mp4", "length": 1276091}, {"path": "Lesson 5/29 - Convincing.mp4", "length": 1246251}, {"path": "Lesson 6/28 - Getting Caught.mp4", "length": 1222906}, {"path": "Lesson 6/26 - Auditing Tradeoffs.mp4", "length": 858441}, {"path": "Problem Set 1/06 - Conditional Probability 3.mp4", "length": 836435}, {"path": "Problem Set 1/04 - Conditional Probability 2.mp4", "length": 794458}, {"path": "Lesson 1/05 - Do Not Implement Your Own Crypto Solution.mp4", "length": 722574}, {"path": "Problem Set 4/03 - Totient.mp4", "length": 558877}, {"path": "Lesson 4/14 - Totient Function.mp4", "length": 431117}, {"path": "Lesson 6/39 - Worry.mp4", "length": 326605}, {"path": "Applied Cryptography Subtitles/Interview on GSM Cracking/3 - Countermeasures.srt", "length": 12798}, {"path": "Applied Cryptography Subtitles/Q & A Session 1/3 - Open Discussion.srt", "length": 12250}, {"path": "Applied Cryptography Subtitles/Lesson 1/43 - Colossus.srt", "length": 11112}, {"path": "Applied Cryptography Subtitles/Interview on GSM Cracking/2 - Timememory.srt", "length": 8983}, {"path": "Applied Cryptography Subtitles/Lesson 3/15 - Discrete Log Problem.srt", "length": 8655}, {"path": "Applied Cryptography Subtitles/Lesson 1/35 - Lorenz Cipher Machine.srt", "length": 8654}, {"path": "Applied Cryptography Subtitles/Q & A Session 3/4 - Question 3.srt", "length": 8094}, {"path": "Applied Cryptography Subtitles/Interview on GSM Cracking/1 - Demo.srt", "length": 8068}, {"path": "Applied Cryptography Subtitles/Lesson 1/44 - Modern Symmetric Ciphers.srt", "length": 7861}, {"path": "Applied Cryptography Subtitles/Q & A Session 2/1 - Questions And Answers.srt", "length": 7840}, {"path": "Applied Cryptography Subtitles/Lesson 2/39 - Strong Collision Resistance.srt", "length": 7742}, {"path": "Applied Cryptography Subtitles/Lesson 2/03 - Randomness Quiz Solution.srt", "length": 6877}, {"path": "Applied Cryptography Subtitles/Lesson 1/42 - Guessing Keys Solution.srt", "length": 6873}, {"path": "Applied Cryptography Subtitles/Lesson 6/55 - Longest Block Chain.srt", "length": 6749}, {"path": "Applied Cryptography Subtitles/Lesson 5/37 - TLS Record Protocol.srt", "length": 6697}, {"path": "Applied Cryptography Subtitles/Lesson 1/13 - One Time Pad.srt", "length": 6627}, {"path": "Applied Cryptography Subtitles/Lesson 5/21 - Master Secret.srt", "length": 6457}, {"path": "Applied Cryptography Subtitles/Lesson 6/53 - Double Hash.srt", "length": 6383}, {"path": "Applied Cryptography Subtitles/Lesson 3/06 - Merkles Puzzles.srt", "length": 6292}, {"path": "Applied Cryptography Subtitles/Q & A Session 1/2 - Otp And Quantum Crypto.srt", "length": 5826}, {"path": "Applied Cryptography Subtitles/Lesson 2/31 - Cryptographic Hash Function.srt", "length": 5760}, {"path": "Applied Cryptography Subtitles/Lesson 7/01 - Summary.srt", "length": 5742}, {"path": "Applied Cryptography Subtitles/Lesson 5/34 - Signature Validation Solution.srt", "length": 5642}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/3 - Cut and Choose.srt", "length": 5563}, {"path": "Applied Cryptography Subtitles/Lesson 2/50 - Hotel Door Locks.srt", "length": 5540}, {"path": "Applied Cryptography Subtitles/Lesson 1/32 - Lorenz Cipher.srt", "length": 5502}, {"path": "Applied Cryptography Subtitles/Lesson 2/42 - Early Unix Implementation.srt", "length": 5484}, {"path": "Applied Cryptography Subtitles/Lesson 1/04 - Do Not Implement Your Own Crypto.srt", "length": 5445}, {"path": "Applied Cryptography Subtitles/Lesson 4/35 - Factoring Is Still Hard.srt", "length": 5407}, {"path": "Applied Cryptography Subtitles/Lesson 1/34 - Intercepting Messages Solution.srt", "length": 5206}, {"path": "Applied Cryptography Subtitles/Lesson 6/10 - Eavesdropper Solution.srt", "length": 5180}, {"path": "Applied Cryptography Subtitles/Lesson 2/21 - Cipher Feedback Mode.srt", "length": 5136}, {"path": "Applied Cryptography Subtitles/Lesson 1/02 - Introduction Solution.srt", "length": 5105}, {"path": "Applied Cryptography Subtitles/Lesson 5/04 - Encrypted Key Exchange.srt", "length": 5008}, {"path": "Applied Cryptography Subtitles/Lesson 5/38 - TLS Record Protocol Solution.srt", "length": 5004}, {"path": "Applied Cryptography Subtitles/Lesson 2/26 - Protocols.srt", "length": 4912}, {"path": "Applied Cryptography Subtitles/Lesson 1/31 - Perfect Cipher Is Impractical Solution.srt", "length": 4902}, {"path": "Applied Cryptography Subtitles/Q & A Session 3/3 - Question 2.srt", "length": 4868}, {"path": "Applied Cryptography Subtitles/Lesson 3/30 - Faster Primality Test.srt", "length": 4839}, {"path": "Applied Cryptography Subtitles/Lesson 2/07 - Sources Of Randomness.srt", "length": 4831}, {"path": "Applied Cryptography Subtitles/Lesson 2/04 - Kolmogorov Complexity.srt", "length": 4752}, {"path": "Applied Cryptography Subtitles/Lesson 5/33 - Signature Validation.srt", "length": 4701}, {"path": "Applied Cryptography Subtitles/Lesson 1/16 - Proving Security Solution.srt", "length": 4666}, {"path": "Applied Cryptography Subtitles/Lesson 2/05 - Kolmogorov Complexity Solution.srt", "length": 4661}, {"path": "Applied Cryptography Subtitles/Lesson 1/29 - Otp Is A Perfect Cipher Pt 3.srt", "length": 4623}, {"path": "Applied Cryptography Subtitles/Lesson 2/18 - Counter Mode.srt", "length": 4621}, {"path": "Applied Cryptography Subtitles/Lesson 2/40 - Storing Passwords.srt", "length": 4614}, {"path": "Applied Cryptography Subtitles/Lesson 2/14 - File Encryption Solution.srt", "length": 4609}, {"path": "Applied Cryptography Subtitles/Lesson 5/10 - Secure Shell.srt", "length": 4517}, {"path": "Applied Cryptography Subtitles/Lesson 5/39 - CBC Attack.srt", "length": 4480}, {"path": "Applied Cryptography Subtitles/Lesson 2/11 - PRNG Implementation Solution.srt", "length": 4477}, {"path": "Applied Cryptography Subtitles/Interview on GSM Cracking/4 - Ethics.srt", "length": 4418}, {"path": "Applied Cryptography Subtitles/Lesson 6/51 - Provide Scarcity.srt", "length": 4346}, {"path": "Applied Cryptography Subtitles/Lesson 1/36 - Lorenz Cipher Machine Solution.srt", "length": 4218}, {"path": "Applied Cryptography Subtitles/Lesson 2/32 - Cryptographic Hash Function Solution.srt", "length": 4162}, {"path": "Applied Cryptography Subtitles/Lesson 1/30 - Perfect Cipher Is Impractical.srt", "length": 4152}, {"path": "Applied Cryptography Subtitles/Lesson 1/28 - Otp Is A Perfect Cipher Pt 2.srt", "length": 4129}, {"path": "Applied Cryptography Subtitles/Lesson 2/13 - File Encryption.srt", "length": 4110}, {"path": "Applied Cryptography Subtitles/Lesson 5/14 - Ssh Authentication In Practice.srt", "length": 4098}, {"path": "Applied Cryptography Subtitles/Lesson 1/07 - Keys And Kerchoffs Principle.srt", "length": 4092}, {"path": "Applied Cryptography Subtitles/Lesson 1/10 - Correctness And Security Solution.srt", "length": 4002}, {"path": "Applied Cryptography Subtitles/Lesson 2/41 - Storing Passwords Solution.srt", "length": 3991}, {"path": "Applied Cryptography Subtitles/Lesson 6/04 - Envelopes Solution.srt", "length": 3987}, {"path": "Applied Cryptography Subtitles/Lesson 6/47 - Identity Challenges.srt", "length": 3970}, {"path": "Applied Cryptography Subtitles/Lesson 1/09 - Correctness And Security.srt", "length": 3962}, {"path": "Applied Cryptography Subtitles/Lesson 4/07 - RSA Cryptosystem.srt", "length": 3955}, {"path": "Applied Cryptography Subtitles/Lesson 4/01 - Asymmetric Cryptosystems.srt", "length": 3860}, {"path": "Applied Cryptography Subtitles/Lesson 6/36 - Blindfolded Signatures.srt", "length": 3858}, {"path": "Applied Cryptography Subtitles/Lesson 5/17 - Basic TLS.srt", "length": 3839}, {"path": "Applied Cryptography Subtitles/Lesson 6/35 - Digital Cash Solution.srt", "length": 3822}, {"path": "Applied Cryptography Subtitles/Lesson 5/01 - Threat Model.srt", "length": 3814}, {"path": "Applied Cryptography Subtitles/Lesson 7/12 - Oblivious Transfer.srt", "length": 3813}, {"path": "Applied Cryptography Subtitles/Lesson 2/25 - Properties Of Modes Solution.srt", "length": 3786}, {"path": "Applied Cryptography Subtitles/Lesson 7/04 - Logic Gate.srt", "length": 3770}, {"path": "Applied Cryptography Subtitles/Lesson 4/28 - Security Of RSA.srt", "length": 3761}, {"path": "Applied Cryptography Subtitles/Lesson 1/06 - Symmetric Cryptosystems.srt", "length": 3737}, {"path": "Applied Cryptography Subtitles/Lesson 2/17 - Cbc Initialization Vector Solution.srt", "length": 3674}, {"path": "Applied Cryptography Subtitles/Lesson 1/14 - One Time Pad Solution.srt", "length": 3625}, {"path": "Applied Cryptography Subtitles/Lesson 1/17 - Probability Review Pt 1.srt", "length": 3613}, {"path": "Applied Cryptography Subtitles/Lesson 1/45 - Advanced Encryption Standard.srt", "length": 3535}, {"path": "Applied Cryptography Subtitles/Lesson 3/09 - Secret Paint Mixing.srt", "length": 3535}, {"path": "Applied Cryptography Subtitles/Lesson 4/45 - Summary.srt", "length": 3530}, {"path": "Applied Cryptography Subtitles/Lesson 3/17 - DH Security.srt", "length": 3520}, {"path": "Applied Cryptography Subtitles/Lesson 2/27 - Mutual Distrust.srt", "length": 3493}, {"path": "Applied Cryptography Subtitles/Lesson 1/33 - Intercepting Messages.srt", "length": 3474}, {"path": "Applied Cryptography Subtitles/Lesson 1/03 - Course Overview.srt", "length": 3452}, {"path": "Applied Cryptography Subtitles/Lesson 1/01 - Introduction.srt", "length": 3451}, {"path": "Applied Cryptography Subtitles/Lesson 2/52 - Summary.srt", "length": 3372}, {"path": "Applied Cryptography Subtitles/Lesson 5/41 - TLS Information Leak Solution.srt", "length": 3360}, {"path": "Applied Cryptography Subtitles/Lesson 3/01 - Introduction.srt", "length": 3342}, {"path": "Applied Cryptography Subtitles/Lesson 2/49 - Hash Chain Solution.srt", "length": 3322}, {"path": "Applied Cryptography Subtitles/Lesson 1/46 - Summary.srt", "length": 3264}, {"path": "Applied Cryptography Subtitles/Lesson 6/33 - Money Solution.srt", "length": 3237}, {"path": "Applied Cryptography Subtitles/Lesson 6/01 - Solving Problems.srt", "length": 3198}, {"path": "Applied Cryptography Subtitles/Lesson 3/22 - Finding Large Primes.srt", "length": 3164}, {"path": "Applied Cryptography Subtitles/Lesson 2/15 - Cipher Block Chaining Mode.srt", "length": 3130}, {"path": "Applied Cryptography Subtitles/Lesson 1/23 - Perfect Cipher.srt", "length": 3112}, {"path": "Applied Cryptography Subtitles/Lesson 2/06 - Unpredictability.srt", "length": 3111}, {"path": "Applied Cryptography Subtitles/Lesson 6/49 - Bitcoin.srt", "length": 3110}, {"path": "Applied Cryptography Subtitles/Lesson 4/37 - Optional Complexity Solution.srt", "length": 3061}, {"path": "Applied Cryptography Subtitles/Lesson 6/05 - Onion Routing.srt", "length": 3032}, {"path": "Applied Cryptography Subtitles/Lesson 5/20 - What Could Go Wrong Solution.srt", "length": 3025}, {"path": "Applied Cryptography Subtitles/Lesson 6/08 - The First Hop Solution.srt", "length": 3013}, {"path": "Applied Cryptography Subtitles/Lesson 2/43 - Salted Password Scheme.srt", "length": 3009}, {"path": "Applied Cryptography Subtitles/Lesson 5/28 - Certificate Details.srt", "length": 3006}, {"path": "Applied Cryptography Subtitles/Lesson 6/13 - Voting.srt", "length": 3000}, {"path": "Applied Cryptography Subtitles/Lesson 5/15 - Transport Layer Security.srt", "length": 2976}, {"path": "Applied Cryptography Subtitles/Problem Set 2/04 - Decrpytion In Parallel Solution.srt", "length": 2966}, {"path": "Applied Cryptography Subtitles/Q & A Session 3/2 - Question 1.srt", "length": 2906}, {"path": "Applied Cryptography Subtitles/Lesson 3/08 - Diffie Hellman.srt", "length": 2900}, {"path": "Applied Cryptography Subtitles/Lesson 3/11 - Key Exchange.srt", "length": 2899}, {"path": "Applied Cryptography Subtitles/Lesson 3/04 - Trusted Third Party.srt", "length": 2889}, {"path": "Applied Cryptography Subtitles/Lesson 2/01 - Applications Of Symmetric Ciphers.srt", "length": 2885}, {"path": "Applied Cryptography Subtitles/Lesson 1/21 - Probability Review Pt 3.srt", "length": 2878}, {"path": "Applied Cryptography Subtitles/Lesson 6/02 - Traffic Analysis.srt", "length": 2874}, {"path": "Applied Cryptography Subtitles/Lesson 5/25 - Looking At A Certificate.srt", "length": 2862}, {"path": "Applied Cryptography Subtitles/Problem Set 2/06 - Output Feedback Mode Solution.srt", "length": 2846}, {"path": "Applied Cryptography Subtitles/Lesson 4/15 - Totient Function Solution.srt", "length": 2771}, {"path": "Applied Cryptography Subtitles/Lesson 4/09 - Small M Solution.srt", "length": 2761}, {"path": "Applied Cryptography Subtitles/Lesson 3/34 - Diffie Hellman Summary.srt", "length": 2757}, {"path": "Applied Cryptography Subtitles/Lesson 4/31 - Totient and Factoring.srt", "length": 2754}, {"path": "Applied Cryptography Subtitles/Lesson 1/26 - Otp Is A Perfect Cipher Pt 1 Solution.srt", "length": 2720}, {"path": "Applied Cryptography Subtitles/Problem Set 1/16 - Challenge Question.srt", "length": 2709}, {"path": "Applied Cryptography Subtitles/Problem Set 1/01 - Introduction.srt", "length": 2699}, {"path": "Applied Cryptography Subtitles/Lesson 6/56 - Summary.srt", "length": 2690}, {"path": "Applied Cryptography Subtitles/Lesson 2/30 - Padding Solution.srt", "length": 2678}, {"path": "Applied Cryptography Subtitles/Lesson 5/13 - SSH Authentication Solution.srt", "length": 2677}, {"path": "Applied Cryptography Subtitles/Lesson 6/03 - Envelopes.srt", "length": 2662}, {"path": "Applied Cryptography Subtitles/Lesson 1/22 - Probability Review Pt 3 Solution.srt", "length": 2662}, {"path": "Applied Cryptography Subtitles/Lesson 7/10 - Garbled Circuit Protocol.srt", "length": 2655}, {"path": "Applied Cryptography Subtitles/Lesson 1/15 - Proving Security.srt", "length": 2622}, {"path": "Applied Cryptography Subtitles/Lesson 2/08 - Pseudo Random Number Generator.srt", "length": 2619}, {"path": "Applied Cryptography Subtitles/Lesson 4/41 - Small Messages Solution.srt", "length": 2619}, {"path": "Applied Cryptography Subtitles/Lesson 4/17 - Proving Eulers Theorem Pt1 Solution.srt", "length": 2615}, {"path": "Applied Cryptography Subtitles/Lesson 4/19 - Proving Eulers Theorem Pt2 Solution.srt", "length": 2591}, {"path": "Applied Cryptography Subtitles/Lesson 2/38 - Weak Collision Resistance Solution.srt", "length": 2578}, {"path": "Applied Cryptography Subtitles/Lesson 6/12 - Tor Solution.srt", "length": 2558}, {"path": "Applied Cryptography Subtitles/Lesson 5/05 - Encrypted Key Exchange Solution.srt", "length": 2549}, {"path": "Applied Cryptography Subtitles/Lesson 7/02 - Secure Computation.srt", "length": 2545}, {"path": "Applied Cryptography Subtitles/Lesson 6/34 - Digital Cash.srt", "length": 2542}, {"path": "Applied Cryptography Subtitles/Problem Set 2/10 - Hash Collision Solution.srt", "length": 2529}, {"path": "Applied Cryptography Subtitles/Lesson 6/42 - Blind Signatures Protocol Solution.srt", "length": 2472}, {"path": "Applied Cryptography Subtitles/Lesson 1/41 - Guessing Keys.srt", "length": 2472}, {"path": "Applied Cryptography Subtitles/Q & A Session 3/1 - Welcome.srt", "length": 2464}, {"path": "Applied Cryptography Subtitles/Lesson 5/18 - Basic Tls Solution.srt", "length": 2445}, {"path": "Applied Cryptography Subtitles/Lesson 2/47 - Password Reuse.srt", "length": 2430}, {"path": "Applied Cryptography Subtitles/Lesson 3/16 - Discrete Log Problem Solution.srt", "length": 2393}, {"path": "Applied Cryptography Subtitles/Lesson 4/33 - 40 Quadrillion Years.srt", "length": 2377}, {"path": "Applied Cryptography Subtitles/Lesson 6/14 - Apple Blue Crazy.srt", "length": 2362}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/8 - TOR Extended 5.srt", "length": 2346}, {"path": "Applied Cryptography Subtitles/Problem Set 6/7 - Tor Extended 5.srt", "length": 2316}, {"path": "Applied Cryptography Subtitles/Lesson 2/48 - Hash Chain.srt", "length": 2262}, {"path": "Applied Cryptography Subtitles/Lesson 2/09 - Pseudo Random Number Generator Solution.srt", "length": 2258}, {"path": "Applied Cryptography Subtitles/Problem Set 1/08 - One Time Pad.srt", "length": 2207}, {"path": "Applied Cryptography Subtitles/Lesson 6/32 - Money.srt", "length": 2198}, {"path": "Applied Cryptography Subtitles/Lesson 5/24 - Trusting A Server Solution.srt", "length": 2179}, {"path": "Applied Cryptography Subtitles/Lesson 6/37 - RSA Blind Signatures.srt", "length": 2174}, {"path": "Applied Cryptography Subtitles/Lesson 4/04 - Signatures.srt", "length": 2173}, {"path": "Applied Cryptography Subtitles/Lesson 4/44 - Back To Signatures Solution.srt", "length": 2169}, {"path": "Applied Cryptography Subtitles/Lesson 1/24 - Perfect Cipher Solution.srt", "length": 2168}, {"path": "Applied Cryptography Subtitles/Lesson 6/29 - Getting Caught Solution.srt", "length": 2155}, {"path": "Applied Cryptography Subtitles/Lesson 3/28 - Primality Test.srt", "length": 2145}, {"path": "Applied Cryptography Subtitles/Lesson 3/05 - Trusted Third Party Solution.srt", "length": 2140}, {"path": "Applied Cryptography Subtitles/Lesson 3/03 - Pairwise Distribution Solution.srt", "length": 2130}, {"path": "Applied Cryptography Subtitles/Lesson 3/02 - Pairwise Distribution.srt", "length": 2108}, {"path": "Applied Cryptography Subtitles/Lesson 2/28 - Mutual Distrust Solution.srt", "length": 2100}, {"path": "Applied Cryptography Subtitles/Lesson 3/21 - Modular Exponentiation Quiz Solution.srt", "length": 2079}, {"path": "Applied Cryptography Subtitles/Lesson 5/02 - Threat Model Solution.srt", "length": 2072}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/5 - TOR Extended 2.srt", "length": 2045}, {"path": "Applied Cryptography Subtitles/Lesson 4/43 - Back To Signatures.srt", "length": 2044}, {"path": "Applied Cryptography Subtitles/Lesson 5/09 - Eke Authentication Implementation Solution.srt", "length": 2025}, {"path": "Applied Cryptography Subtitles/Lesson 7/16 - Putting It All Together.srt", "length": 2014}, {"path": "Applied Cryptography Subtitles/Lesson 3/33 - Diffie Hellman Summary.srt", "length": 2003}, {"path": "Applied Cryptography Subtitles/Lesson 4/32 - Computing D Still Hard.srt", "length": 1987}, {"path": "Applied Cryptography Subtitles/Problem Set 2/02 - Randomness Solution.srt", "length": 1986}, {"path": "Applied Cryptography Subtitles/Lesson 7/13 - Oblivious Transfer Solution.srt", "length": 1956}, {"path": "Applied Cryptography Subtitles/Problem Set 3/6 - Timing Side Channel.srt", "length": 1948}, {"path": "Applied Cryptography Subtitles/Lesson 4/06 - One Way Function.srt", "length": 1933}, {"path": "Applied Cryptography Subtitles/Lesson 4/11 - Correctness Of Rsa Solution.srt", "length": 1931}, {"path": "Applied Cryptography Subtitles/Lesson 7/07 - Encrypt Outputs Solution.srt", "length": 1924}, {"path": "Applied Cryptography Subtitles/Lesson 5/08 - Eke Authentication Implementation.srt", "length": 1912}, {"path": "Applied Cryptography Subtitles/Lesson 5/03 - Overview.srt", "length": 1910}, {"path": "Applied Cryptography Subtitles/Q & A Session 1/1 - Mathematics And Programming.srt", "length": 1909}, {"path": "Applied Cryptography Subtitles/Problem Set 1/14 - Secret Sharing.srt", "length": 1903}, {"path": "Applied Cryptography Subtitles/Lesson 1/11 - Xor Function.srt", "length": 1899}, {"path": "Applied Cryptography Subtitles/Lesson 4/42 - Thwarting Guessing.srt", "length": 1893}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/1 - Onion Routing.srt", "length": 1868}, {"path": "Applied Cryptography Subtitles/Lesson 3/10 - Properties Of Multiplication.srt", "length": 1861}, {"path": "Applied Cryptography Subtitles/Lesson 4/02 - Private Messages.srt", "length": 1847}, {"path": "Applied Cryptography Subtitles/Lesson 1/40 - Weakness In Keys Solution.srt", "length": 1835}, {"path": "Applied Cryptography Subtitles/Lesson 1/12 - Xor Function Solution.srt", "length": 1811}, {"path": "Applied Cryptography Subtitles/Lesson 6/20 - Crazy Crazy.srt", "length": 1777}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/6 - TOR Extended 3.srt", "length": 1774}, {"path": "Applied Cryptography Subtitles/Lesson 5/11 - Secure Shell Solution.srt", "length": 1773}, {"path": "Applied Cryptography Subtitles/Lesson 5/31 - Certificates And Signatures.srt", "length": 1767}, {"path": "Applied Cryptography Subtitles/Lesson 1/20 - Probability Review Pt 2 Solution.srt", "length": 1762}, {"path": "Applied Cryptography Subtitles/Lesson 7/05 - Logic Gate Solution.srt", "length": 1728}, {"path": "Applied Cryptography Subtitles/Lesson 3/07 - Merkles Puzzles Solution.srt", "length": 1722}, {"path": "Applied Cryptography Subtitles/Lesson 7/08 - Permute Outputs.srt", "length": 1694}, {"path": "Applied Cryptography Subtitles/Lesson 3/25 - Infinite Primes Solution.srt", "length": 1688}, {"path": "Applied Cryptography Subtitles/Lesson 5/23 - Trusting A Server.srt", "length": 1675}, {"path": "Applied Cryptography Subtitles/Lesson 4/21 - Invertibility Of RSA Solution.srt", "length": 1664}, {"path": "Applied Cryptography Subtitles/Lesson 5/42 - Summary.srt", "length": 1635}, {"path": "Applied Cryptography Subtitles/Problem Set 1/09 - One Time Pad Solution.srt", "length": 1631}, {"path": "Applied Cryptography Subtitles/Lesson 6/23 - Prove A Vote Solution.srt", "length": 1629}, {"path": "Applied Cryptography Subtitles/Lesson 3/23 - Finding Large Primes Solution.srt", "length": 1627}, {"path": "Applied Cryptography Subtitles/Lesson 6/17 - Mixnet Solution.srt", "length": 1626}, {"path": "Applied Cryptography Subtitles/Lesson 6/25 - Auditing Mixes Solution.srt", "length": 1621}, {"path": "Applied Cryptography Subtitles/Lesson 2/35 - Coin Tossing Again.srt", "length": 1610}, {"path": "Applied Cryptography Subtitles/Lesson 6/06 - Onion Routing Solution.srt", "length": 1590}, {"path": "Applied Cryptography Subtitles/Lesson 6/24 - Auditing Mixes.srt", "length": 1589}, {"path": "Applied Cryptography Subtitles/Lesson 3/19 - Implementing Dh Solution.srt", "length": 1585}, {"path": "Applied Cryptography Subtitles/Lesson 1/25 - Otp Is A Perfect Cipher Pt 1.srt", "length": 1568}, {"path": "Applied Cryptography Subtitles/Problem Set 6/4 - Tor Extended 2.srt", "length": 1546}, {"path": "Applied Cryptography Subtitles/Lesson 5/36 - Handshake Recap.srt", "length": 1545}, {"path": "Applied Cryptography Subtitles/Problem Set 2/09 - Hash Collision.srt", "length": 1524}, {"path": "Applied Cryptography Subtitles/Lesson 6/45 - Identity List.srt", "length": 1521}, {"path": "Applied Cryptography Subtitles/Problem Set 2/05 - Output Feedback Mode.srt", "length": 1517}, {"path": "Applied Cryptography Subtitles/Lesson 5/07 - EKE Authentication Solution.srt", "length": 1507}, {"path": "Applied Cryptography Subtitles/Lesson 4/05 - Signatures Solution.srt", "length": 1493}, {"path": "Applied Cryptography Subtitles/Problem Set 4/08 - OAEP.srt", "length": 1486}, {"path": "Applied Cryptography Subtitles/Lesson 3/13 - Passive Eavesdropper.srt", "length": 1485}, {"path": "Applied Cryptography Subtitles/Problem Set 1/11 - Toy Substitution Cipher 1 Solution.srt", "length": 1476}, {"path": "Applied Cryptography Subtitles/Lesson 6/27 - Auditing Tradeoffs Solution.srt", "length": 1469}, {"path": "Applied Cryptography Subtitles/Lesson 2/29 - Padding.srt", "length": 1469}, {"path": "Applied Cryptography Subtitles/Lesson 2/20 - Parallel Processing Solution.srt", "length": 1455}, {"path": "Applied Cryptography Subtitles/Lesson 5/27 - Certificates Solution.srt", "length": 1439}, {"path": "Applied Cryptography Subtitles/Lesson 6/16 - Mixnet.srt", "length": 1437}, {"path": "Applied Cryptography Subtitles/Lesson 1/19 - Probability Review Pt 2.srt", "length": 1432}, {"path": "Applied Cryptography Subtitles/Lesson 2/51 - Hotel Door Locks Solution.srt", "length": 1431}, {"path": "Applied Cryptography Subtitles/Problem Set 3/7 - Rabin Miller Primality Test.srt", "length": 1425}, {"path": "Applied Cryptography Subtitles/Lesson 3/14 - Passive Eavesdropper Solution.srt", "length": 1423}, {"path": "Applied Cryptography Subtitles/Problem Set 3/8 - Rabin Miller Primality Test Solution.srt", "length": 1410}, {"path": "Applied Cryptography Subtitles/Lesson 3/18 - Implementing Dh.srt", "length": 1407}, {"path": "Applied Cryptography Subtitles/Lesson 3/35 - Summary.srt", "length": 1402}, {"path": "Applied Cryptography Subtitles/Lesson 2/12 - Weak PRNGs.srt", "length": 1391}, {"path": "Applied Cryptography Subtitles/Lesson 3/12 - Key Exchange Solution.srt", "length": 1385}, {"path": "Applied Cryptography Subtitles/Final Assessment/3 - Perfect Ciphers.srt", "length": 1383}, {"path": "Applied Cryptography Subtitles/Lesson 2/10 - Prng Implementation.srt", "length": 1359}, {"path": "Applied Cryptography Subtitles/Lesson 2/34 - Random Oracle Solution.srt", "length": 1357}, {"path": "Applied Cryptography Subtitles/Problem Set 5/3 - Hashing And EKE.srt", "length": 1352}, {"path": "Applied Cryptography Subtitles/Lesson 7/06 - Encrypt Outputs.srt", "length": 1351}, {"path": "Applied Cryptography Subtitles/Lesson 3/26 - Density Of Primes.srt", "length": 1349}, {"path": "Applied Cryptography Subtitles/Lesson 4/12 - Eulers Theorem.srt", "length": 1340}, {"path": "Applied Cryptography Subtitles/Problem Set 5/6 - Useful Certificates Solution.srt", "length": 1331}, {"path": "Applied Cryptography Subtitles/Lesson 2/37 - Weak Collision Resistance.srt", "length": 1319}, {"path": "Applied Cryptography Subtitles/Problem Set 1/07 - Conditional Probability 3 Solution.srt", "length": 1317}, {"path": "Applied Cryptography Subtitles/Problem Set 3/2 - Diffie Hellman Solution.srt", "length": 1316}, {"path": "Applied Cryptography Subtitles/Lesson 1/38 - Importance Of Keys Solution.srt", "length": 1287}, {"path": "Applied Cryptography Subtitles/Final Assessment/9 - Proofs Of Work.srt", "length": 1287}, {"path": "Applied Cryptography Subtitles/Problem Set 1/10 - Toy Substitution Cipher 1.srt", "length": 1276}, {"path": "Applied Cryptography Subtitles/Lesson 6/38 - Rsa Blind Signatures Solution.srt", "length": 1256}, {"path": "Applied Cryptography Subtitles/Problem Set 2/07 - CBC Implementation.srt", "length": 1249}, {"path": "Applied Cryptography Subtitles/Lesson 4/38 - Insecurity In Practice.srt", "length": 1246}, {"path": "Applied Cryptography Subtitles/Lesson 4/39 - Insecurity In Practice.srt", "length": 1245}, {"path": "Applied Cryptography Subtitles/Lesson 4/16 - Proving Eulers Theorem Pt1.srt", "length": 1224}, {"path": "Applied Cryptography Subtitles/Lesson 4/29 - Security Of Rsa Solution.srt", "length": 1221}, {"path": "Applied Cryptography Subtitles/Lesson 2/22 - Cfb Decryption.srt", "length": 1219}, {"path": "Applied Cryptography Subtitles/Lesson 2/36 - Coin Tossing Again Solution.srt", "length": 1209}, {"path": "Applied Cryptography Subtitles/Lesson 6/41 - Blind Signatures Protocol.srt", "length": 1209}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/7 - TOR Extended 4.srt", "length": 1204}, {"path": "Applied Cryptography Subtitles/Lesson 4/30 - Totient and Factoring.srt", "length": 1204}, {"path": "Applied Cryptography Subtitles/Lesson 2/33 - Random Oracle.srt", "length": 1188}, {"path": "Applied Cryptography Subtitles/Problem Set 1/02 - Conditional Probability 1.srt", "length": 1182}, {"path": "Applied Cryptography Subtitles/Lesson 5/22 - Weak Ciphers.srt", "length": 1158}, {"path": "Applied Cryptography Subtitles/Final Assessment/4 - Symmetric Ciphers.srt", "length": 1131}, {"path": "Applied Cryptography Subtitles/Final Assessment/7 - Signing Certificates.srt", "length": 1109}, {"path": "Applied Cryptography Subtitles/Lesson 4/20 - Invertibility Of RSA.srt", "length": 1109}, {"path": "Applied Cryptography Subtitles/Lesson 7/11 - Garbled Circuit Protocol Solution.srt", "length": 1105}, {"path": "Applied Cryptography Subtitles/Lesson 4/24 - Compute E.srt", "length": 1104}, {"path": "Applied Cryptography Subtitles/Final Assessment/8 - Garbled Circuits.srt", "length": 1102}, {"path": "Applied Cryptography Subtitles/Lesson 2/24 - Properties Of Modes.srt", "length": 1095}, {"path": "Applied Cryptography Subtitles/Lesson 6/46 - Identity List Solution.srt", "length": 1092}, {"path": "Applied Cryptography Subtitles/Problem Set 3/1 - Diffie Hellman.srt", "length": 1063}, {"path": "Applied Cryptography Subtitles/Lesson 4/27 - Compute D Solution.srt", "length": 1047}, {"path": "Applied Cryptography Subtitles/Lesson 1/37 - Importance Of Keys.srt", "length": 1038}, {"path": "Applied Cryptography Subtitles/Lesson 1/39 - Weakness In Keys.srt", "length": 1035}, {"path": "Applied Cryptography Subtitles/Lesson 4/18 - Proving Eulers Theorem Pt2.srt", "length": 1035}, {"path": "Applied Cryptography Subtitles/Lesson 6/31 - Observing A Vote Solution.srt", "length": 1029}, {"path": "Applied Cryptography Subtitles/Problem Set 2/03 - Decrpytion In Parallel.srt", "length": 1024}, {"path": "Applied Cryptography Subtitles/Lesson 5/16 - Transport Layer Security Solution.srt", "length": 1017}, {"path": "Applied Cryptography Subtitles/Problem Set 5/2 - One Time Pad Reborn Solution.srt", "length": 1016}, {"path": "Applied Cryptography Subtitles/Lesson 6/21 - Crazy Crazy Solution.srt", "length": 1006}, {"path": "Applied Cryptography Subtitles/Lesson 6/19 - Voter Identity Solution.srt", "length": 1005}, {"path": "Applied Cryptography Subtitles/Problem Set 2/01 - Randomness.srt", "length": 1001}, {"path": "Applied Cryptography Subtitles/Problem Set 4/07 - RSA Signature.srt", "length": 999}, {"path": "Applied Cryptography Subtitles/Lesson 5/35 - Interesting Certificate Chains.srt", "length": 992}, {"path": "Applied Cryptography Subtitles/Problem Set 4/02 - Public Key Cryptography Solution.srt", "length": 989}, {"path": "Applied Cryptography Subtitles/Problem Set 6/6 - Tor Extended 4.srt", "length": 988}, {"path": "Applied Cryptography Subtitles/Lesson 7/15 - Wire Labels Solution.srt", "length": 979}, {"path": "Applied Cryptography Subtitles/Lesson 6/52 - Provide Scarcity Solution.srt", "length": 977}, {"path": "Applied Cryptography Subtitles/Lesson 5/32 - Certificates And Signatures Solution.srt", "length": 976}, {"path": "Applied Cryptography Subtitles/Lesson 5/26 - Certificates.srt", "length": 976}, {"path": "Applied Cryptography Subtitles/Lesson 4/34 - 40 Quadrillion Years Solution.srt", "length": 973}, {"path": "Applied Cryptography Subtitles/Problem Set 4/09 - Oaep Solution.srt", "length": 971}, {"path": "Applied Cryptography Subtitles/Problem Set 5/4 - Hashing And EKE Solution.srt", "length": 949}, {"path": "Applied Cryptography Subtitles/Lesson 2/02 - Randomness Quiz.srt", "length": 938}, {"path": "Applied Cryptography Subtitles/Lesson 4/23 - Picking E And D Solution.srt", "length": 918}, {"path": "Applied Cryptography Subtitles/Lesson 6/54 - Double Hash Solution.srt", "length": 913}, {"path": "Applied Cryptography Subtitles/Lesson 2/23 - Cfb Decryption Solution.srt", "length": 909}, {"path": "Applied Cryptography Subtitles/Lesson 6/18 - Voter Identity.srt", "length": 901}, {"path": "Applied Cryptography Subtitles/Lesson 7/09 - Permute Outputs Solution.srt", "length": 899}, {"path": "Applied Cryptography Subtitles/Problem Set 1/05 - Conditional Probability 2 Solution.srt", "length": 886}, {"path": "Applied Cryptography Subtitles/Lesson 7/03 - Secure Computation Solution.srt", "length": 883}, {"path": "Applied Cryptography Subtitles/Problem Set 3/5 - Timing Side Channel.srt", "length": 871}, {"path": "Applied Cryptography Subtitles/Lesson 4/40 - Small Messages.srt", "length": 867}, {"path": "Applied Cryptography Subtitles/Problem Set 2/08 - Cbc Implementation Solution.srt", "length": 860}, {"path": "Applied Cryptography Subtitles/Lesson 1/08 - Keys And Kerchoffs Principle Solution.srt", "length": 847}, {"path": "Applied Cryptography Subtitles/Problem Set 4/10 - RSA SIgnature Solution.srt", "length": 841}, {"path": "Applied Cryptography Subtitles/Lesson 7/14 - Wire Labels.srt", "length": 833}, {"path": "Applied Cryptography Subtitles/Lesson 2/16 - Cbc Initialization Vector.srt", "length": 817}, {"path": "Applied Cryptography Subtitles/Problem Set 5/8 - Signing Solution.srt", "length": 817}, {"path": "Applied Cryptography Subtitles/Final Assessment/5 - Key Distribution.srt", "length": 813}, {"path": "Applied Cryptography Subtitles/Lesson 6/30 - Observing A Vote.srt", "length": 804}, {"path": "Applied Cryptography Subtitles/Problem Set 3/9 - Challenge Question.srt", "length": 803}, {"path": "Applied Cryptography Subtitles/Lesson 3/27 - Density Of Primes Solution.srt", "length": 794}, {"path": "Applied Cryptography Subtitles/Problem Set 3/4 - Primitive Roots Solution.srt", "length": 789}, {"path": "Applied Cryptography Subtitles/Problem Set 1/15 - Secret Sharing Solution.srt", "length": 787}, {"path": "Applied Cryptography Subtitles/Problem Set 4/01 - Public Key Cryptography.srt", "length": 766}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/2 - Voting.srt", "length": 765}, {"path": "Applied Cryptography Subtitles/Lesson 2/46 - Thwarting Dictionary Attacks Solution.srt", "length": 752}, {"path": "Applied Cryptography Subtitles/Lesson 3/29 - Primality Test Solution.srt", "length": 742}, {"path": "Applied Cryptography Subtitles/Lesson 4/08 - Small M.srt", "length": 726}, {"path": "Applied Cryptography Subtitles/Problem Set 6/1 - Onion Routing.srt", "length": 724}, {"path": "Applied Cryptography Subtitles/Lesson 6/48 - Identity Challenges Solution.srt", "length": 719}, {"path": "Applied Cryptography Subtitles/Problem Set 4/06 - Rsa Encryption Solution.srt", "length": 719}, {"path": "Applied Cryptography Subtitles/Lesson 2/19 - Parallel Processing.srt", "length": 705}, {"path": "Applied Cryptography Subtitles/Lesson 4/10 - Correctness Of RSA.srt", "length": 696}, {"path": "Applied Cryptography Subtitles/Problem Set 5/1 - One Time Pad Reborn.srt", "length": 695}, {"path": "Applied Cryptography Subtitles/Problem Set 6/3 - Tor Extended 1.srt", "length": 691}, {"path": "Applied Cryptography Subtitles/Lesson 5/19 - What Could Go Wrong.srt", "length": 681}, {"path": "Applied Cryptography Subtitles/Lesson 1/27 - Otp Is A Perfect Cipher Pt 2.srt", "length": 678}, {"path": "Applied Cryptography Subtitles/Lesson 5/06 - EKE Authentication.srt", "length": 678}, {"path": "Applied Cryptography Subtitles/Final Assessment/1 - One Time Pad.srt", "length": 675}, {"path": "Applied Cryptography Subtitles/Lesson 6/15 - Apple Blue Crazy Solution.srt", "length": 673}, {"path": "Applied Cryptography Subtitles/Lesson 5/30 - Convincing Solution.srt", "length": 667}, {"path": "Applied Cryptography Subtitles/Lesson 1/18 - Probability Review Pt 1 Solution.srt", "length": 667}, {"path": "Applied Cryptography Subtitles/Problem Set 6/5 - Tor Extended 3.srt", "length": 666}, {"path": "Applied Cryptography Subtitles/Lesson 5/40 - TLS Information Leak.srt", "length": 662}, {"path": "Applied Cryptography Subtitles/Lesson 2/44 - Salted Password Scheme Solution.srt", "length": 654}, {"path": "Applied Cryptography Subtitles/Lesson 6/09 - Eavesdropper.srt", "length": 649}, {"path": "Applied Cryptography Subtitles/Lesson 6/11 - Tor.srt", "length": 647}, {"path": "Applied Cryptography Subtitles/Lesson 5/12 - SSH Authentication.srt", "length": 645}, {"path": "Applied Cryptography Subtitles/Lesson 4/03 - Private Messages Solution.srt", "length": 627}, {"path": "Applied Cryptography Subtitles/Lesson 4/22 - Picking E And D.srt", "length": 624}, {"path": "Applied Cryptography Subtitles/Lesson 6/43 - Deanonymizing Double Spenders.srt", "length": 608}, {"path": "Applied Cryptography Subtitles/Lesson 6/44 - Deanonymizing Double Spenders Solution.srt", "length": 602}, {"path": "Applied Cryptography Subtitles/Final Assessment/2 - Biased Generator.srt", "length": 585}, {"path": "Applied Cryptography Subtitles/Lesson 6/50 - Bitcoin Solution.srt", "length": 585}, {"path": "Applied Cryptography Subtitles/Lesson 6/40 - Worry Solution.srt", "length": 578}, {"path": "Applied Cryptography Subtitles/Problem Set 5/7 - Signing.srt", "length": 575}, {"path": "Applied Cryptography Subtitles/Problem Set 3/3 - Primitive Roots.srt", "length": 560}, {"path": "Applied Cryptography Subtitles/Problem Set 6 Solutions/4 - TOR Extended 1.srt", "length": 540}, {"path": "Applied Cryptography Subtitles/Lesson 3/24 - Infinite Primes.srt", "length": 530}, {"path": "Applied Cryptography Subtitles/Lesson 2/45 - Thwarting Dictionary Attacks.srt", "length": 526}, {"path": "Applied Cryptography Subtitles/Lesson 4/13 - Eulers Theorem Solution.srt", "length": 526}, {"path": "Applied Cryptography Subtitles/Problem Set 2/11 - Challenge Question.srt", "length": 524}, {"path": "Applied Cryptography Subtitles/Problem Set 6/2 - Voting.srt", "length": 504}, {"path": "Applied Cryptography Subtitles/Lesson 3/20 - Modular Exponentiation Quiz.srt", "length": 499}, {"path": "Applied Cryptography Subtitles/Lesson 4/26 - Compute D.srt", "length": 493}, {"path": "Applied Cryptography Subtitles/Problem Set 5/5 - Useful Certificates.srt", "length": 493}, {"path": "Applied Cryptography Subtitles/Problem Set 4/04 - Totient Solution.srt", "length": 464}, {"path": "Applied Cryptography Subtitles/Problem Set 1/13 - Toy Substitution Cipher 2 Solution.srt", "length": 442}, {"path": "Applied Cryptography Subtitles/Problem Set 4/05 - Rsa Encryption.srt", "length": 423}, {"path": "Applied Cryptography Subtitles/Lesson 7/17 - Congratulations.srt", "length": 418}, {"path": "Applied Cryptography Subtitles/Lesson 4/36 - Optional Complexity.srt", "length": 416}, {"path": "Applied Cryptography Subtitles/Lesson 4/25 - Compute E Solution.srt", "length": 408}, {"path": "Applied Cryptography Subtitles/Final Assessment/6 - Rsa.srt", "length": 392}, {"path": "Applied Cryptography Subtitles/Problem Set 1/12 - Toy Substitution Cipher 2.srt", "length": 335}, {"path": "Applied Cryptography Subtitles/Lesson 3/31 - Primality Quiz.srt", "length": 302}, {"path": "Applied Cryptography Subtitles/Lesson 5/29 - Convincing.srt", "length": 282}, {"path": "Applied Cryptography Subtitles/Problem Set 1/03 - Conditional Probability 1 Solution.srt", "length": 252}, {"path": "Applied Cryptography Subtitles/Lesson 6/22 - Prove A Vote.srt", "length": 250}, {"path": "Applied Cryptography Subtitles/Lesson 3/32 - Primality Quiz Solution.srt", "length": 246}, {"path": "Applied Cryptography Subtitles/Lesson 6/07 - The First Hop.srt", "length": 223}, {"path": "Applied Cryptography
Download Info
-
Tips
“Udacity - Applied Cryptography Videos” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.