Toggle navigation
Institute
IISc Bangalore
IIT Bombay
IIT Delhi
IIT Guwahati
IIT Kanpur
IIT Kharagpur
IIT Madras
IIT Roorkee
Discipline
Aerospace Engineering
Atmospheric Science
Basic courses
Biotechnology
Chemical Engineering
Chemistry and Biochemistry
Civil Engineering
Computer Science and Engineering
Electrical Engineering
Electronics & Communication Engineering
Engineering Design
General
Humanities and Social Sciences
Management
Mathematics
Mechanical Engineering
Home
Computer Sc. & Eng.
Cryptography and Network Secur..
Lecture# 22
'Pseudorandomness' Video Lecture
Pseudorandomness
Course
:
Cryptography and Network Security
Discipline
:
Computer Science and Engineering
Faculty
: Dr. Debdeep Mukhopadhyay
Institute
:
IIT Kharagpur
Pseudorandomness
- Browse through
Cryptography and Network Security (Computer Science and Engineering)
Video Lectures by
Dr. Debdeep Mukhopadhyay
from
IIT Kharagpur
through NPTEL.
Course
:
Cryptography and Network Security
Discipline
:
Computer Science and Engineering
Faculty
: Dr. Debdeep Mukhopadhyay
Institute
:
IIT Kharagpur
NEXT LECTURE >>
Cryptographic Hash Functions
Download this video in MP4, FLV & 3GP formats
Format
Size
Download
MP4
404 MB
MP4 Video Download Link 1
MP4
404 MB
MP4 Video Download Link 2
FLV
108 MB
FLV Video Download Link 1
FLV
108 MB
FLV Video Download Link 2
3gp
51 MB
3gp Video Download Link 1
3gp
51 MB
3gp Video Download Link 2
Search Courses by Discipline & Institute
Search Courses
Discipline
All Disciplines
Aerospace Engineering
Atmospheric Science
Basic courses
Biotechnology
Chemical Engineering
Chemistry and Biochemistry
Civil Engineering
Computer Science and Engineering
Electrical Engineering
Electronics and Communication Engineering
Engineering Design
General
Humanities and Social Sciences
Management
Mathematics
Mechanical Engineering
Institute
All Institutes
IISc Bangalore
IIT Bombay
IIT Delhi
IIT Guwahati
IIT Kanpur
IIT Kharagpur
IIT Madras
IIT Roorkee
SASTRA University
Search
Course Video Lectures
Introduction
Overview on Modern Cryptography
Introduction to Number Theory
Probability and Information Theory
Classical Cryptosystems
Cryptanalysis of Classical Ciphers
Shannons Theory
Shannons Theory (Contd...1)
Shannons Theory (Contd...2)
Symmetric Key Ciphers
Block Cipher Standards (DES)
Block Cipher Standards (AES)
Block Cipher Standards (AES) (Contd.)
Linear Cryptanalysis
Differential Cryptanalysis
Few other Cryptanalytic Techniques
Overview on S-Box Design Principles
Modes of Operation of Block Ciphers
Stream Ciphers
Stream Ciphers (Contd...1)
Stream Ciphers (Contd...2)
Pseudorandomness
Cryptographic Hash Functions
Cryptographic Hash Functions (Contd...1)
Cryptographic Hash Functions (Contd...2)
Message Authentication Codes
More Number Theoretic Results
The RSA Cryptosystem
Primality Testing
Factoring Algorithms
Some Comments on the Security of RSA
Discrete Logarithm Problem (DLP)
The Diffie-Hellman Problem and Security of El..
An Introduction to Elliptic Curve Cryptograph..
Application of Elliptic Curves to Cryptograph..
Implementation of Elliptic Curve Cryptography
Secret Sharing Schemes
A Tutorial on Network Protocols
System Security
Firewalls and Intrusion Detection Systems
Side Channel Analysis of Cryptographic Implem..
2015. EngineeringVideoLectures.com