Modules / Lectures
Module NameDownload
noc20_cs02_assessment_id_Week_1noc20_cs02_assessment_id_Week_1
noc20_cs02_assessment_id_Week_10noc20_cs02_assessment_id_Week_10
noc20_cs02_assessment_id_Week_11noc20_cs02_assessment_id_Week_11
noc20_cs02_assessment_id_Week_12noc20_cs02_assessment_id_Week_12
noc20_cs02_assessment_id_Week_2noc20_cs02_assessment_id_Week_2
noc20_cs02_assessment_id_Week_3noc20_cs02_assessment_id_Week_3
noc20_cs02_assessment_id_Week_4noc20_cs02_assessment_id_Week_4
noc20_cs02_assessment_id_Week_5noc20_cs02_assessment_id_Week_5
noc20_cs02_assessment_id_Week_6noc20_cs02_assessment_id_Week_6
noc20_cs02_assessment_id_Week_7noc20_cs02_assessment_id_Week_7
noc20_cs02_assessment_id_Week_8noc20_cs02_assessment_id_Week_8
noc20_cs02_assessment_id_Week_9noc20_cs02_assessment_id_Week_9


Sl.No Chapter Name MP4 Download
1IntroductionDownload
2Symmetric-key EncryptionDownload
3Historical Ciphers and their CryptanalysisDownload
4Perfect SecurityDownload
5Limitations of Perfect SecurityDownload
6Introduction to Computational SecurityDownload
7Semantic SecurityDownload
8Pseudo-random Generators (PRGs)Download
9Operations on Pseudorandom GeneratorsDownload
10Stream CiphersDownload
11Provably-secure Instantiation of PRGDownload
12Practical Instantiations of PRGDownload
13CPA-securityDownload
14Pseudo-random Functions (PRFs)Download
15CPA-secure Encryption from PRFDownload
16Modes of Operations of Block Ciphers Part IDownload
17Modes of Operations of Block Ciphers Part IIDownload
18Theoretical Constructions of Block CiphersDownload
19Practical Constructions of Block Ciphers: Part IDownload
20Practical Constructions of Block Ciphers: Part IIDownload
21From Passive to Active AdversaryDownload
22Message Integrity and AuthenticationDownload
23Message Authentication for Long Messages : Part IDownload
24Message Authentication for Long Messages : Part IIDownload
25Information-theoretic MACs : Part IDownload
26Information-theoretic MACs : Part IIDownload
27Cryptographic Hash Functions: Part IDownload
28Cryptographic Hash Functions: Part IIDownload
29Message Authentication Using Hash FunctionsDownload
30Generic Attacks on Hash Functions and Additional Applications of Hash FunctionsDownload
31Random Oracle Model: Part IDownload
32Random Oracle Model: Part IIDownload
33Authenticated EncryptionDownload
34Composing CPA-secure Cipher with a Secure MAC: Part IDownload
35Composing CPA-secure Cipher with a Secure MAC: Part IIDownload
36Key-Exchange Protocols: Part IDownload
37Key-Exchange Protocols: Part IIDownload
38Cyclic groupsDownload
39Cryptographic Hardness Assumptions in the Cyclic GroupsDownload
40Candidate Cyclic Groups for Cryptographic Purposes: Part IDownload
41Candidate Cyclic Groups for Cryptographic Purposes: Part IIDownload
42Cryptographic Applications of the Discrete Log AssumptionDownload
43Public-key EncryptionDownload
44El Gamal Public-key Encryption SchemeDownload
45RSA AssumptionDownload
46RSA Public-key CryptosystemDownload
47Hybrid Public-key CryptosystemDownload
48CCA-Secure Public-key CiphersDownload
49CCA-Secure Public-key Ciphers Based on Diffie-Hellman ProblemsDownload
50CCA-Secure Public-key Ciphers Based on RSA AssumptionDownload
51Digital SignaturesDownload
52RSA SignaturesDownload
53Identification SchemesDownload
54Schnorr Signature Scheme and TLS/SSLDownload
55Number TheoryDownload
56Secret SharingDownload
57Zero-Knowledge Protocols: Part IDownload
58Zero-Knowledge Protocols: Part IIDownload
59Good Bye for NowDownload

Sl.No Chapter Name English
1IntroductionDownload
Verified
2Symmetric-key EncryptionDownload
Verified
3Historical Ciphers and their CryptanalysisDownload
Verified
4Perfect SecurityDownload
Verified
5Limitations of Perfect SecurityDownload
Verified
6Introduction to Computational SecurityDownload
Verified
7Semantic SecurityDownload
Verified
8Pseudo-random Generators (PRGs)Download
Verified
9Operations on Pseudorandom GeneratorsDownload
Verified
10Stream CiphersDownload
Verified
11Provably-secure Instantiation of PRGDownload
Verified
12Practical Instantiations of PRGDownload
Verified
13CPA-securityDownload
Verified
14Pseudo-random Functions (PRFs)Download
Verified
15CPA-secure Encryption from PRFDownload
Verified
16Modes of Operations of Block Ciphers Part IDownload
Verified
17Modes of Operations of Block Ciphers Part IIDownload
Verified
18Theoretical Constructions of Block CiphersDownload
Verified
19Practical Constructions of Block Ciphers: Part IDownload
Verified
20Practical Constructions of Block Ciphers: Part IIDownload
Verified
21From Passive to Active AdversaryDownload
Verified
22Message Integrity and AuthenticationDownload
Verified
23Message Authentication for Long Messages : Part IDownload
Verified
24Message Authentication for Long Messages : Part IIDownload
Verified
25Information-theoretic MACs : Part IDownload
Verified
26Information-theoretic MACs : Part IIDownload
Verified
27Cryptographic Hash Functions: Part IDownload
Verified
28Cryptographic Hash Functions: Part IIDownload
Verified
29Message Authentication Using Hash FunctionsDownload
Verified
30Generic Attacks on Hash Functions and Additional Applications of Hash FunctionsDownload
Verified
31Random Oracle Model: Part IDownload
Verified
32Random Oracle Model: Part IIDownload
Verified
33Authenticated EncryptionDownload
Verified
34Composing CPA-secure Cipher with a Secure MAC: Part IDownload
Verified
35Composing CPA-secure Cipher with a Secure MAC: Part IIDownload
Verified
36Key-Exchange Protocols: Part IDownload
Verified
37Key-Exchange Protocols: Part IIDownload
Verified
38Cyclic groupsDownload
Verified
39Cryptographic Hardness Assumptions in the Cyclic GroupsDownload
Verified
40Candidate Cyclic Groups for Cryptographic Purposes: Part IDownload
Verified
41Candidate Cyclic Groups for Cryptographic Purposes: Part IIDownload
Verified
42Cryptographic Applications of the Discrete Log AssumptionDownload
Verified
43Public-key EncryptionDownload
Verified
44El Gamal Public-key Encryption SchemeDownload
Verified
45RSA AssumptionDownload
Verified
46RSA Public-key CryptosystemDownload
Verified
47Hybrid Public-key CryptosystemDownload
Verified
48CCA-Secure Public-key CiphersDownload
Verified
49CCA-Secure Public-key Ciphers Based on Diffie-Hellman ProblemsDownload
Verified
50CCA-Secure Public-key Ciphers Based on RSA AssumptionDownload
Verified
51Digital SignaturesDownload
Verified
52RSA SignaturesDownload
Verified
53Identification SchemesDownload
Verified
54Schnorr Signature Scheme and TLS/SSLDownload
Verified
55Number TheoryDownload
Verified
56Secret SharingDownload
Verified
57Zero-Knowledge Protocols: Part IDownload
Verified
58Zero-Knowledge Protocols: Part IIDownload
Verified
59Good Bye for NowDownload
Verified


Sl.No Language Book link
1EnglishNot Available
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available