Cryptography D
Aalto University
<p>We introduce cryptographic security models and concepts and understand the relations between them. We then apply the learnt concepts and techniques to real-world problems. In particular, we cover:</p><ul><li>Pseudorandom functions/ciphers</li><li>symmetric encryption</li><li>asymmetric encryption</li><li>message authentication codes</li><li>signature schemes</li><li>selected advanced cryptographic primitives (might depend on the course instance), e.g., fully homomorphic encryption, cryptographic obfuscation, indistinguishability obfuscation</li><li>selected applications (might depend on the course instance), e.g., secure communication, attacks on TLS, secure distributed computation</li></ul>
Back
|
|