Selection: Cryptography

Author: Grigory Sapunov
Course
Description
Dates
1
Large-icon
Large-icon
Dan Boneh
Stanford University
Computer Science
Gb Free
Course added: long ago
Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret...
Free schedule
Favored by 1 person
2
Large-icon
Large-icon
Dan Boneh
Stanford University
Computer Science
Gb Free
Course added: long ago
Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.
Free schedule
3
5vky7vupl3ogc1mtj01krvuzfexbr_ogt07c_wqaq84m-q8aamcfwgmmyeotmr0ifcordz07ffca1t6yxgbp=s0#w=436&h=268
5vky7vupl3ogc1mtj01krvuzfexbr_ogt07c_wqaq84m-q8aamcfwgmmyeotmr0ifcordz07ffca1t6yxgbp=s0#w=436&h=268
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Free schedule
4
Logo
Logo
Matasano
Computer Science
Gb Free
Course added: long ago
We've built a collection of 48 exercises that demonstrate attacks on real-world crypto. This is a different way to learn about crypto than taking a class or reading a book. We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions....
Free schedule
Favored by 1 person
5
6-897s04
6-897s04
Prof. Ran Canetti
MIT OpenCourseWare
Computer Science
Gb Free
Course added: long ago
This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy...
Free schedule
6
6-876js03
6-876js03
The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.
Free schedule
7
Cscenter
Cscenter
Ицыксон Дмитрий Михайлович, Опарин Всеволод Владиславович
Computer Science Center
Computer Science Mathematics, Statistics and Data Analysis
Ru Free
Course added: long ago
Курс знакомит со сложностью вероятностных вычислений и теоретическими основами криптографии. Мы изучим вероятностные классы сложности и основные приемы, которые используются для анализа и построения вероятностных алгоритмов, узнаем, что такое интерактивные протоколы, игры Артура и Мерлина, докажем з...
Free schedule
Favored by 8 people

© 2013-2019