Hacking Cryptography, Video Edition
- Category Other
- Type Tutorials
- Language English
- Total size 1.8 GB
- Uploaded By freecoursewb
- Downloads 399
- Last checked 1 day ago
- Date uploaded 5 months ago
- Seeders 12
- Leechers 5
Infohash : E11B990468A2A28CBF09D40500503A2D09858E4C
Hacking Cryptography, Video Edition
https://WebToolTip.com
Published: 5/2025
Duration: 8h 21m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 44.1kHz, 2ch | Size: 1.82 GB
Genre: eLearning | Language: English
In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.
Learn how the good guys implement cryptography and how the bad guys exploit it.
Everything we do in the digital world is protected by cryptography. But when pure math and algorithms are implemented in code, vulnerabilities emerge and can be exploited by hackers and bad actors. Hacking Cryptography details dozens of practical cryptographic implementations and then breaks down the flaws that adversaries use to exploit them.
Files:
[ WebToolTip.com ] Hacking Cryptography, Video Edition- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here !
- 001. Chapter 1. Introduction.mp4 (22.6 MB)
- 002. Chapter 1. How does cryptography work.mp4 (17.5 MB)
- 003. Chapter 1. Attacks on cryptographic theory vs. attacks on implementations.mp4 (13.4 MB)
- 004. Chapter 1. What will you learn in this book.mp4 (16.7 MB)
- 005. Chapter 1. Summary.mp4 (4.3 MB)
- 006. Chapter 2. Random number generators.mp4 (46.0 MB)
- 007. Chapter 2. Understanding different types of RNGs.mp4 (139.0 MB)
- 008. Chapter 2. Summary.mp4 (8.4 MB)
- 009. Chapter 3. Implementing and exploiting RNGs.mp4 (51.9 MB)
- 010. Chapter 3. Implementing and exploiting the Dual Elliptic Curve Deterministic Random Bit Generator.mp4 (69.7 MB)
- 011. Chapter 3. Summary.mp4 (4.2 MB)
- 012. Chapter 4. Stream ciphers.mp4 (39.5 MB)
- 013. Chapter 4. Linear feedback shift registers (LFSRs).mp4 (64.0 MB)
- 014. Chapter 4. RC4 encryption and Wi-Fi security.mp4 (91.3 MB)
- 015. Chapter 4. Summary.mp4 (6.3 MB)
- 016. Chapter 5. Block ciphers.mp4 (14.1 MB)
- 017. Chapter 5. Padding - Making data fit blocks neatly.mp4 (10.3 MB)
- 018. Chapter 5. Modes of operation for block ciphers.mp4 (19.6 MB)
- 019. Chapter 5. Padding oracles and how to attack them.mp4 (97.4 MB)
- 020. Chapter 5. Browser Exploit Against SSLTLS - The BEAST attack.mp4 (60.1 MB)
- 021. Chapter 5. Summary.mp4 (5.7 MB)
- 022. Chapter 6. Hash functions.mp4 (13.2 MB)
- 023. Chapter 6. Security properties of hash functions.mp4 (13.4 MB)
- 024. Chapter 6. Important hash functions.mp4 (13.1 MB)
- 025. Chapter 6. Attacks on hash functions.mp4 (124.2 MB)
- 026. Chapter 6. Summary.mp4 (8.3 MB)
- 027. Chapter 7. Message authentication codes.mp4 (14.8 MB)
- 028. Chapter 7. Different types of MACs.mp4 (3.8 MB)
- 029. Chapter 7. Secret-prefix MACs and length-extension attacks.mp4 (121.3 MB)
- 030. Chapter 7. Secret-suffix MACs and collision attacks.mp4 (8.4 MB)
- 031. Chapter 7. HMACs - Hash-based MACs.mp4 (6.1 MB)
- 032. Chapter 7. Summary.mp4 (2.8 MB)
- 033. Chapter 8. Public-key cryptography.mp4 (33.3 MB)
- 034. Chapter 8. Mathematical theory behind public-key cryptography.mp4 (43.0 MB)
- 035. Chapter 8. Types of public-key cryptography systems.mp4 (102.5 MB)
- 036. Chapter 8. Exploiting RSA.mp4 (142.4 MB)
- 037. Chapter 8. Summary.mp4 (7.5 MB)
- 038. Chapter 9. Digital signatures.mp4 (9.1 MB)
- 039. Chapter 9. Practical applications of digital signatures.mp4 (24.3 MB)
- 040. Chapter 9. Forgery attacks on digital signatures.mp4 (4.9 MB)
- 041. Chapter 9. Schoolbook RSA signatures.mp4 (6.2 MB)
- 042. Chapter 9. The elliptic curve digital signature algorithm (ECDSA).mp4 (51.5 MB)
- 043. Chapter 9. RSA signature forgery with Bleichenbacher s e = 3 attack.mp4 (109.4 MB)
- 044. Chapter 9. Summary.mp4 (11.9 MB)
- 045. Chapter 10. Guidelines and common pitfalls for cryptographic implementations.mp4 (20.0 MB)
- 046. Chapter 10. One vulnerability to rule them all - Poor-quality randomness.mp4 (14.3 MB)
- 047. Chapter 10. Padding - Challenges with fitting things neatly.mp4 (11.2 MB)
- 048. Chapter 10. Constant-time implementations and timing attacks.mp4 (46.3 MB)
- 049. Chapter 10. Control flow and secrets - A dangerous mix.mp4 (26.3 MB)
- 050. Chapter 10. Memory safety and buffer management.mp4 (17.2 MB)
- 051. Chapter 10. Type safety - Challenges with interpreting raw bytes.mp4 (24.9 MB)
- 052. Chapter 10. Miscellaneous considerations.mp4 (21.9 MB)
- 053. Chapter 10. Summary.mp4 (5.4 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce