|
|
|
||
Required course for bachelor's program in Information security. Continuation of NMMB301.
Last update: G_M (16.05.2012)
|
|
||
Předmět je zakončen ústní zkouškou. Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (10.06.2019)
|
|
||
Shafi Goldwasser, Mihir Bellare: Lecture Notes on Cryptography, 2008, http://cseweb.ucsd.edu/~mihir/papers/gb.pdf A. Menezes, P. van Oorschot, and S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (http://www.cacr.math.uwaterloo.ca/hac) W. Mao: Modern Cryptography: Theory and Practice, Prentice Hall PTR 2003 Douglas R. Stinson: Cryptography - Theory and Practice, CRC Press, 1995 Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (24.08.2012)
|
|
||
Zkouška má ústní formu. Její požadavky odpovídají obsahu přednesené látky. Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (10.06.2019)
|
|
||
Asymmetric cryptographic algorithms - principles, applications. Public key encryption algorithms. Signature algorithms and schemes, schemes with special properties. Protocols for key management - principles, the main protocols. Identification schemes and protocols - basic schemes, properties and uses. Secret sharing algorithms. Special schemes and protocols: electronic payments, electronic elections, Traitor tracing. Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.
Last update: Žemlička Jan, doc. Mgr. et Mgr., Ph.D. (26.09.2012)
|