Lecture 1 - Introduction to Cryptography
Lecture 2 - Classical Cryptosystem
Lecture 3 - Cryptanalysis on Substitution Cipher (Frequency Analysis)
Lecture 4 - Play Fair Cipher
Lecture 5 - Block Cipher
Lecture 6 - Data Encryption Standard (DES)
Lecture 7 - DES (Continued...)
Lecture 8 - Triple DES and Modes of Operation
Lecture 9 - Stream Cipher
Lecture 10 - Pseudorandom Sequence
Lecture 11 - LFSR Based StreamCipher
Lecture 12 - Mathematical Background
Lecture 13 - Abstract Algebra (Continued...)
Lecture 14 - Number Theory
Lecture 15 - Number Theory (Continued...)
Lecture 16 - Modular Inverse
Lecture 17 - Extended Euclidean Algorithm
Lecture 18 - Fermat's Little Theorem, Euler Phi-Function
Lecture 19 - Euler's theorem, Quadratic Residue
Lecture 20 - Polynomial Arithmetic
Lecture 21 - Advanced Encryption Standard (AES)
Lecture 22 - Advanced Encryption Standard (AES) (Continued...)
Lecture 23 - Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange
Lecture 24 - Knapsack Cryptosystem
Lecture 25 - RSA Cryptosystem
Lecture 26 - More on RSA
Lecture 27 - Primarily Testing
Lecture 28 - ElGamal Cryptosystem
Lecture 29 - Elliptic Curve over the Reals
Lecture 30 - Elliptic curve Modulo a Prime
Lecture 31 - Generalised ElGamal Public Key Cryptosystem
Lecture 32 - Chinese Remainder Theorem
Lecture 33 - Rabin Cryptosystem
Lecture 34 - Legendre and Jacobi Symbol
Lecture 35 - Jacobi Symbol (Continued...)
Lecture 36 - Message Authentication
Lecture 37 - Digital Signature
Lecture 38 - Key Management
Lecture 39 - Key Exchange
Lecture 40 - Hash Function
Lecture 41 - Universal Hashing
Lecture 42 - Cryptographic Hash Function
Lecture 43 - Secure Hash Algorithm (SHA)
Lecture 44 - Digital Signature Standard (DSS)
Lecture 45 - More on Key Exchange Protocol
Lecture 46 - Cryptoanalisis
Lecture 47 - Memory Trade off Attack
Lecture 48 - Differential Cryptoanalysis
Lecture 49 - More on Differential Cryptoanalysis
Lecture 50 - Linear Cryptoanalysis
Lecture 51 - Cryptoanalysis and Stream Cipher
Lecture 52 - Modern Stream Cipher
Lecture 53 - Shamir Secret Sharing
Lecture 54 - Identity Based Eneryption (IBE)
Lecture 55 - Attribute Based Encryption
Lecture 56 - Functional Encryption (Introduction)
Lecture 57 - Discrete Logarithm Problem (DLP)
Lecture 58 - Implementation Attacks
Lecture 59 - The Secure Sockets layer (SSL)
Lecture 60 - Pretty Good Privacy (PGP)