[{"title":"( 49 个子文件 8.23MB ) Jonathan Katz 密码学ppt","children":[{"title":"Cryptography -Jonathan Katz","children":[{"title":"PPT","children":[{"title":"DiscreteLogBasedPKE.pptx <span style='color:#111;'> 95.50KB </span>","children":null,"spread":false},{"title":"Coursera4.2.pptx <span style='color:#111;'> 94.63KB </span>","children":null,"spread":false},{"title":"DigitalSignaturesPartII.pptx <span style='color:#111;'> 58.89KB </span>","children":null,"spread":false},{"title":"Coursera1.7.pptx <span style='color:#111;'> 59.01KB </span>","children":null,"spread":false},{"title":"Coursera4.1.pptx <span style='color:#111;'> 129.28KB </span>","children":null,"spread":false},{"title":"Coursera1.2.pptx <span style='color:#111;'> 121.41KB </span>","children":null,"spread":false},{"title":"PublicKeyInfrastructurePKI.pptx <span style='color:#111;'> 140.79KB </span>","children":null,"spread":false},{"title":"Numbertheory4.pptx <span style='color:#111;'> 69.21KB </span>","children":null,"spread":false},{"title":"Coursera4.6.pptx <span style='color:#111;'> 87.48KB </span>","children":null,"spread":false},{"title":"IdentificationSchemes.pptx <span style='color:#111;'> 145.51KB </span>","children":null,"spread":false},{"title":"Coursera3.1upload.pptx <span style='color:#111;'> 182.75KB </span>","children":null,"spread":false},{"title":"Coursera4.4.pptx <span style='color:#111;'> 59.56KB </span>","children":null,"spread":false},{"title":"PuttingItAllTogetherSSLTLS.pptx <span style='color:#111;'> 93.79KB </span>","children":null,"spread":false},{"title":"Coursera1.5.pptx <span style='color:#111;'> 96.26KB </span>","children":null,"spread":false},{"title":"Coursera3.2.pptx <span style='color:#111;'> 110.30KB </span>","children":null,"spread":false},{"title":"Coursera1.13.pptx <span style='color:#111;'> 55.61KB </span>","children":null,"spread":false},{"title":"PublicKeyEncryption.pptx <span style='color:#111;'> 98.38KB </span>","children":null,"spread":false},{"title":"Coursera4.3.pptx <span style='color:#111;'> 59.48KB </span>","children":null,"spread":false},{"title":"Coursera4.5.pptx <span style='color:#111;'> 84.07KB </span>","children":null,"spread":false},{"title":"Coursera1.6.pptx <span style='color:#111;'> 71.89KB </span>","children":null,"spread":false},{"title":"Coursera4.7.pptx <span style='color:#111;'> 91.90KB </span>","children":null,"spread":false},{"title":"DiffieHellmanKeyExchange.pptx <span style='color:#111;'> 90.54KB </span>","children":null,"spread":false},{"title":"DigitalSignatures.pptx <span style='color:#111;'> 95.51KB </span>","children":null,"spread":false},{"title":"Coursera3.5.pptx <span style='color:#111;'> 121.36KB </span>","children":null,"spread":false},{"title":"Coursera1.4.pptx <span style='color:#111;'> 61.32KB </span>","children":null,"spread":false},{"title":"Coursera1.15.pptx <span style='color:#111;'> 54.97KB </span>","children":null,"spread":false},{"title":"Coursera3.3.pptx <span style='color:#111;'> 113.03KB </span>","children":null,"spread":false},{"title":"Coursera3.4.pptx <span style='color:#111;'> 216.98KB </span>","children":null,"spread":false},{"title":"ThePublicKeyRevolution.pptx <span style='color:#111;'> 199.60KB </span>","children":null,"spread":false},{"title":"ThePublicKeyRevolutionPII.pptx <span style='color:#111;'> 191.71KB </span>","children":null,"spread":false},{"title":"Coursera1.8.pptx <span style='color:#111;'> 581.55KB </span>","children":null,"spread":false},{"title":"Coursera1.11.pptx <span style='color:#111;'> 66.13KB </span>","children":null,"spread":false},{"title":"Coursera3.6.pptx <span style='color:#111;'> 121.85KB </span>","children":null,"spread":false},{"title":"Coursera5.1.pptx <span style='color:#111;'> 58.63KB </span>","children":null,"spread":false},{"title":"Coursera1.14.pptx <span style='color:#111;'> 55.84KB </span>","children":null,"spread":false},{"title":"PartingThoughts.pptx <span style='color:#111;'> 88.64KB </span>","children":null,"spread":false},{"title":"Cryptography_Course_Overview.pptx <span style='color:#111;'> 207.79KB </span>","children":null,"spread":false},{"title":"Coursera5.5.pptx <span style='color:#111;'> 54.89KB </span>","children":null,"spread":false},{"title":"Coursera5.2.pptx <span style='color:#111;'> 71.53KB </span>","children":null,"spread":false},{"title":"Coursera1.12.pptx <span style='color:#111;'> 70.00KB </span>","children":null,"spread":false},{"title":"Coursera1.10.pptx <span style='color:#111;'> 595.91KB </span>","children":null,"spread":false},{"title":"Coursera1.3.pptx <span style='color:#111;'> 1.85MB </span>","children":null,"spread":false},{"title":"ImplementingtheOneTimePad.pptx <span style='color:#111;'> 59.68KB </span>","children":null,"spread":false},{"title":"Coursera1.16.pptx <span style='color:#111;'> 124.83KB </span>","children":null,"spread":false},{"title":"RSABasedPKE.pptx <span style='color:#111;'> 89.71KB </span>","children":null,"spread":false},{"title":"RSABasedSignatures.pptx <span style='color:#111;'> 90.64KB </span>","children":null,"spread":false},{"title":"Numbertheory3.pptx <span style='color:#111;'> 71.91KB </span>","children":null,"spread":false},{"title":"Coursera1.35.pptx <span style='color:#111;'> 1.86MB </span>","children":null,"spread":false},{"title":"CYBER_jkatz2.jpg <span style='color:#111;'> 17.48KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}],"spread":true}]