CNS/lecture_notes
↰
📁 images
📄
Lecture Summary
34 KB
📄
Lecture 01 - Introduction
10 KB
📄
Lecture 02 - Semantic Security
24 KB
📄
Lecture 03 - Stream Ciphers (802.11 WEP)
17 KB
📄
Lecture 04 - User Authentication (802.11 WEP)
22 KB
📄
Lecture 05 - Password Security
22 KB
📄
Lecture 06 - User Authentication I
22 KB
📄
Lecture 07 - User Authentication II
19 KB
📄
Lecture 08 - User Authentication III
20 KB
📄
Lecture 09 - Wireless Cellular Authentication I
18 KB
📄
Lecture 10 - Wireless Cellular Authentication II
15 KB
📄
Lecture 11 - Message Authentication I
25 KB
📄
Lecture 12 - Message Authentication II
13 KB
📄
Lecture 13 - RADIUS I
22 KB
📄
Lecture 14 - RADIUS II
19 KB
📄
Lecture 15 - DIAMETER
16 KB
📄
Lecture 16 - TLS I
15 KB
📄
Lecture 17 - TLS II
16 KB
📄
Lecture 18 - TLS III
19 KB
📄
Lecture 19 - Block Ciphers
25 KB
📄
Lecture 20 - TLS IV
16 KB
📄
Lecture 21 - TLS Handshake I
24 KB
📄
Lecture 22 - Asymmetric Cryptography I
19 KB
📄
Lecture 23 - Asymmetric Cryptography II
14 KB
📄
Lecture 24 - Asymmetric Cryptography III
18 KB
📄
Lecture 25 - Asymmetric Cryptography IV
30 KB
📄
Lecture 26 - Asymmetric Cryptography V
22 KB
📄
Lecture 27 - TLS Handshake II
21 KB
📄
Lecture 28 - TLS V
15 KB
📄
Lecture 29 - Bleichenbacher's Oracle
21 KB
📄
Lecture 30 - The Failure of PKI
20 KB
📄
Lecture 31 - TLS v1.3
13 KB
📄
Lecture 32 - IPsec I
33 KB
📄
Lecture 33 - IPsec II
30 KB
📄
Lecture 34 - Secret Sharing I
23 KB
📄
Lecture 35 - Secret Sharing II
21 KB
📄
Lecture 36 - Verifiable Secret Sharing
14 KB
📄
Lecture 37 - Group Theory
15 KB
📄
Lecture 38 - Applications of Secret Sharing I
23 KB
📄
Lecture 39 - Applications of Secret Sharing II
15 KB
📄
Lecture 40 - Applications of Secret Sharing III
18 KB
📄
Lecture 41 - Linear Secret Sharing
25 KB
📄
Lecture 42 - Elliptic Curve Crypto I
17 KB
📄
Lecture 43 - Elliptic Curve Crypto II
14 KB
📄
Lecture 44 - Bilinear Maps
13 KB
📄
Lecture 45 - CP-ABE
14 KB