Skip to main content
Skip to content
Case File
efta-02393320DOJ Data Set 11Other

EFTA02393320

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02393320
Pages
1
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Introduction to Cryptography Course Team <[email protected]> Sent: Monday, February 11, 2013 8:26 AM To: [email protected] Subject: Online Cryptography class: week 5 Dear Jeffrey epstein, The week 5 lectures and problem set are now posted on the course web site at https://crypto.stanford.edu/OnlineCrypto The problem set is due in three weeks. As usual, there is also an extra credit programming project. This week's topic is basic key exchange: how to setup a secret key between two parties. For now we only consider protocols secure against eavesdropping. This question motivates the main concepts of public key cryptography, but before we build public key systems we need to take a brief detour and cover a few basic concepts from computational number theory. We will start with algorithms dating back to antiquity (Euclid) and work our way up to Fermat, Euler, and Legendre. We will also mention in passing a few useful concepts from 20th century math. For those seeing this material for the first time I recommend also taking a look at the first four chapters of this book: http://shoup.net/ntb/ntb-v2.pdf Next week we will put our hard work from this week to good use and construct several public key encryption systems. As always, please keep discussing the material on the course forums. The discussions so far have been very good and your posts help improve the course. Enjoy, Dan Introduction to Cryptography Course Team You are receiving this email because [email protected] is enrolled in Introduction to Cryptography <https://class.coursera.org/crypto-005/class/index> . To stop receiving similar future emails from this class, please click here <https://class.coursera.org/crypto- 005/auth/stop_emails?data=vqd5mIF9O4hqDpOsgFqlT%26vMtGh6GsrfZjfuVF97b8qRpilzgrUpOOVfgPLvLs6M%2Fhrls1 UZqtCTaTI0y%2FumKw%3D%3D%7CMialw8maG89RPFObNVK2RCU%2BYx%28Q9lit6yfzFNZHqlh2Ety2%2FexQZeIr0xQilz qvAsEWi%2BaEOA2YOYDWAOxoCHWAV7wUsHNXInbcP0ReS2RUo2dHalMx9Ybxnlqf4Fy%2FVbPA9pvcElyA8g509hUblz pa6XjurKKdzR%2BFYZy8KQ02E1iWWa7l%2B%2BZ4wpgcdpeC> . Please do not reply directly to this email. If you have any questions or feedback, please post on the class discussion forums <https://class.coursera.org/crypto- 005/forum/index> . For general questions, please visit our support site <http://help.coursera.orgh . date-last-viewed 0.0 date-received 1360571144 flags 8623750145 original-mailbox imap://[email protected]/%5BGmail%5D/All%20Mail remote-id 275394 EFTA_R1_01421683 EFTA02393320

Technical Artifacts (11)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Mail Serverimap.gmail.com
Phone2393320
Phone8623750145
URLhttp://help.coursera.orgh
URLhttp://shoup.net/ntb/ntb-v2.pdf
URLhttps://class.coursera.org/crypto
URLhttps://class.coursera.org/crypto-005/class/index
URLhttps://crypto.stanford.edu/OnlineCrypto

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.