Applied Cryptography II - NMIB007
|
|
|
||
Last update: T_KA (23.05.2004)
|
|
||
Last update: T_KA (20.05.2004)
Schneier: Applied cryptography, John Wiley 1996; Menezes, Oorschot, Vanstone: Handbook of applied cryptography, CRC Press 1997. http://www.rsasecurity.com/rsalabs/pkcs/ http://www.rfc-editor.org/ http://csrc.nist.gov/publications/
|
|
||
Last update: T_KA (20.05.2004)
Identification, authentication, authorization, single sign-on, SAML. Cryptographic protocols - blind signature, mental poker, coin flipping. Secure elections, digital cash. Cryptographic modules, cryptographic modules validation. Cryptographic algorithms overview.
|