mhrd logo inflibnet logo ugc logo

Module Details

Course : Cryptography And Network Security

Subject : Computer Science and Engineering

No. of Modules : 43

Level : FACULTY,PG,STUDENTS

Source : SWAYAM;NPTEL

Back

Sr. No. Title Creator/Author E-Text Video URL Metadata
1 Block cipher standards (aes) (contd.) Dr. Debdeep Mukhopadhyay - - Click Here
2 Few other cryptanalytic techniques Dr. Debdeep Mukhopadhyay - - Click Here
3 Modes of operation of block ciphers Dr. Debdeep Mukhopadhyay - - Click Here
4 Overview on s-box design principles Dr. Debdeep Mukhopadhyay - - Click Here
5 Block cipher standards (des) Dr. Debdeep Mukhopadhyay - - Click Here
6 Block cipher standards (aes) Dr. Debdeep Mukhopadhyay - - Click Here
7 Differential cryptanalysis Dr. Debdeep Mukhopadhyay - - Click Here
8 Symmetric key ciphers Dr. Debdeep Mukhopadhyay - - Click Here
9 Linear cryptanalysis Dr. Debdeep Mukhopadhyay - - Click Here
10 The diffie-hellman problem and security of elgamal systems Dr. Debdeep Mukhopadhyay - - Click Here
11 Application of elliptic curves to cryptography Dr. Debdeep Mukhopadhyay - - Click Here
12 An introduction to elliptic curve cryptography Dr. Debdeep Mukhopadhyay - - Click Here
13 Implementation of elliptic curve cryptography Dr. Debdeep Mukhopadhyay - - Click Here
14 Some comments on the security of rsa Dr. Debdeep Mukhopadhyay - - Click Here
15 Discrete logarithm problem (dlp) Dr. Debdeep Mukhopadhyay - - Click Here
16 The rsa cryptosystem Dr. Debdeep Mukhopadhyay - - Click Here
17 Factoring algorithms Dr. Debdeep Mukhopadhyay - - Click Here
18 Primality testing Dr. Debdeep Mukhopadhyay - - Click Here
19 Cryptanalysis of classical ciphers Dr. Debdeep Mukhopadhyay - - Click Here
20 Probability and information theory Dr. Debdeep Mukhopadhyay - - Click Here
21 Overview on modern cryptography Dr. Debdeep Mukhopadhyay - - Click Here
22 Introduction to number theory Dr. Debdeep Mukhopadhyay - - Click Here
23 Shannons theory (contd...1) Dr. Debdeep Mukhopadhyay - - Click Here
24 Shannons theory (contd...2) Dr. Debdeep Mukhopadhyay - - Click Here
25 Classical cryptosystems Dr. Debdeep Mukhopadhyay - - Click Here
26 Shannons theory Dr. Debdeep Mukhopadhyay - - Click Here
27 Introduction Dr. Debdeep Mukhopadhyay - - Click Here
28 Cryptographic hash functions (contd...1) Dr. Debdeep Mukhopadhyay - - Click Here
29 Cryptographic hash functions (contd...2) Dr. Debdeep Mukhopadhyay - - Click Here
30 More number theoretic results Dr. Debdeep Mukhopadhyay - - Click Here
31 Message authentication codes Dr. Debdeep Mukhopadhyay - - Click Here
32 Cryptographic hash functions Dr. Debdeep Mukhopadhyay - - Click Here
33 Stream ciphers (contd...1) Dr. Debdeep Mukhopadhyay - - Click Here
34 Stream ciphers (contd...2) Dr. Debdeep Mukhopadhyay - - Click Here
35 Pseudorandomness Dr. Debdeep Mukhopadhyay - - Click Here
36 Stream ciphers Dr. Debdeep Mukhopadhyay - - Click Here
37 Side channel analysis of cryptographic implementations Dr. Debdeep Mukhopadhyay - - Click Here
38 Firewalls and intrusion detection systems Dr. Debdeep Mukhopadhyay - - Click Here
39 A tutorial on network protocols Dr. Debdeep Mukhopadhyay - - Click Here
40 Secret sharing schemes Dr. Debdeep Mukhopadhyay - - Click Here
41 System security Dr. Debdeep Mukhopadhyay - - Click Here
42 Classical cryptography Dr. Kulothungan - - Click Here
43 Introduction Dr. Kulothungan - - Click Here