CNS/lecture_notes

  • 📁 images
  • 📄 Lecture Summary34 KB
  • 📄 Lecture 01 - Introduction10 KB
  • 📄 Lecture 02 - Semantic Security24 KB
  • 📄 Lecture 03 - Stream Ciphers (802.11 WEP)17 KB
  • 📄 Lecture 04 - User Authentication (802.11 WEP)22 KB
  • 📄 Lecture 05 - Password Security22 KB
  • 📄 Lecture 06 - User Authentication I22 KB
  • 📄 Lecture 07 - User Authentication II19 KB
  • 📄 Lecture 08 - User Authentication III20 KB
  • 📄 Lecture 09 - Wireless Cellular Authentication I18 KB
  • 📄 Lecture 10 - Wireless Cellular Authentication II15 KB
  • 📄 Lecture 11 - Message Authentication I25 KB
  • 📄 Lecture 12 - Message Authentication II13 KB
  • 📄 Lecture 13 - RADIUS I22 KB
  • 📄 Lecture 14 - RADIUS II19 KB
  • 📄 Lecture 15 - DIAMETER16 KB
  • 📄 Lecture 16 - TLS I15 KB
  • 📄 Lecture 17 - TLS II16 KB
  • 📄 Lecture 18 - TLS III19 KB
  • 📄 Lecture 19 - Block Ciphers25 KB
  • 📄 Lecture 20 - TLS IV 16 KB
  • 📄 Lecture 21 - TLS Handshake I24 KB
  • 📄 Lecture 22 - Asymmetric Cryptography I19 KB
  • 📄 Lecture 23 - Asymmetric Cryptography II14 KB
  • 📄 Lecture 24 - Asymmetric Cryptography III18 KB
  • 📄 Lecture 25 - Asymmetric Cryptography IV30 KB
  • 📄 Lecture 26 - Asymmetric Cryptography V22 KB
  • 📄 Lecture 27 - TLS Handshake II21 KB
  • 📄 Lecture 28 - TLS V15 KB
  • 📄 Lecture 29 - Bleichenbacher's Oracle21 KB
  • 📄 Lecture 30 - The Failure of PKI20 KB
  • 📄 Lecture 31 - TLS v1.313 KB
  • 📄 Lecture 32 - IPsec I33 KB
  • 📄 Lecture 33 - IPsec II30 KB
  • 📄 Lecture 34 - Secret Sharing I23 KB
  • 📄 Lecture 35 - Secret Sharing II21 KB
  • 📄 Lecture 36 - Verifiable Secret Sharing14 KB
  • 📄 Lecture 37 - Group Theory15 KB
  • 📄 Lecture 38 - Applications of Secret Sharing I23 KB
  • 📄 Lecture 39 - Applications of Secret Sharing II15 KB
  • 📄 Lecture 40 - Applications of Secret Sharing III18 KB
  • 📄 Lecture 41 - Linear Secret Sharing25 KB
  • 📄 Lecture 42 - Elliptic Curve Crypto I17 KB
  • 📄 Lecture 43 - Elliptic Curve Crypto II14 KB
  • 📄 Lecture 44 - Bilinear Maps13 KB
  • 📄 Lecture 45 - CP-ABE14 KB