Подборка: Cryptography

Автор: Grigory Sapunov
Курс
Описание
Сессии
1
Large-icon
Large-icon
Dan Boneh
Stanford University
Компьютерные науки
Gb Free
Курс добавлен: давно
Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret...
Свободный график
В избранном у 1 человека
2
Large-icon
Large-icon
Dan Boneh
Stanford University
Компьютерные науки
Gb Free
Курс добавлен: давно
Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.
Свободный график
3
5vky7vupl3ogc1mtj01krvuzfexbr_ogt07c_wqaq84m-q8aamcfwgmmyeotmr0ifcordz07ffca1t6yxgbp=s0#w=436&h=268
5vky7vupl3ogc1mtj01krvuzfexbr_ogt07c_wqaq84m-q8aamcfwgmmyeotmr0ifcordz07ffca1t6yxgbp=s0#w=436&h=268
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Свободный график
4
Logo
Logo
Matasano
Компьютерные науки
Gb Free
Курс добавлен: давно
We've built a collection of 48 exercises that demonstrate attacks on real-world crypto. This is a different way to learn about crypto than taking a class or reading a book. We give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions....
Свободный график
В избранном у 1 человека
5
6-897s04
6-897s04
Prof. Ran Canetti
MIT OpenCourseWare
Компьютерные науки
Gb Free
Курс добавлен: давно
This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy...
Свободный график
6
6-876js03
6-876js03
MIT OpenCourseWare
Математика и статистика
Gb Free
Курс добавлен: давно
The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.
Свободный график
7
Cscenter
Cscenter
Ицыксон Дмитрий Михайлович, Опарин Всеволод Владиславович
Computer Science Center
Компьютерные науки Математика и статистика
Ru Free
Курс добавлен: давно
Курс знакомит со сложностью вероятностных вычислений и теоретическими основами криптографии. Мы изучим вероятностные классы сложности и основные приемы, которые используются для анализа и построения вероятностных алгоритмов, узнаем, что такое интерактивные протоколы, игры Артура и Мерлина, докажем з...
Свободный график
В избранном у 8 человек

© 2013-2017