Handbook of Applied CryptographyA.J.Menezes, P.C van Oorschot, S.A.Vanstone ,
CRC, 1996, ISBN 0-8493-8523-7.
(available here)
Additional literature:
there is a growing number of books available, some titles
D.R.Stinson , Cryptography. Theory and Practice,
CRC Press, 1995, ISBN 0-8493-8521-0, the second edition 2002,
the third edition 2005
N.Koblitz , Algebraiczne aspekty kryptografii,
WNT, 2000,
ISBN ISBN 83-204-2418-6.
W. Stallings , Ochrona danych w sieci i intersieci,
Wydawnictwa Naukowo-Techniczne, Warszawa 1997, ISBN 83-204-2184-5;
Oryginał angielski: Network and Internetwork Security,
Prentice Hall, Englewood Cliffs, 1995, ISBN 0-13-180050-7.
Reinhardt Wobst Kryptologia. Budowa i łamanie zabezpieczeń,
Wydawnictwo READ ME, ISBN 83-7243-068-3
Requirements:
This is a "grupa kursów" - only one grade will be given for the lecture and tutorials.
The grade for the course will be based on the sum of:
the sum of points from the first and the
second test (written during the lectures).
the points obtained during tutorials according to the rules determined there.
The maximal number of points in each part is the same.
The written tests will check understanding, skills and ability of problem solving.
It will consist of short problems (almost test questions)
that will demand certain creativity.
It is not necessary to remember details of algorithms and protocols,
but it will be necessary to understand them well.
Usually, the details which are hard to remember, will be recalled on the
question sheet. It will be allowed to bring own notices, books, ...
some auxiliary material (from 2006)
for preparation for written tests is available
here
Goals:
presentation of technologies of contemporary cryptography -
mathematical foundations, algorithms and
protocols, implementation issues, and some legal issues.
Prerequisitives:
some knowledge of modular arithmetics, algorithms,
computational complexity, computer networks