E-ID: BAC, PACE, Terminal Authentication, Chip Authentication
restricted identification (according to BSI), alternative
anonymous ID protocol
Key exchange and authentication:
concept of quantum key exchange,
Hardware protection: physically unclonable functions, TPM,
smart cards: protection mechanism dependant on
application area - optical cards, memory cards, prepaid cards,
electronic wallet, signature cards,
algorithmic mechanisms for cloning prevention: counters,
undeniable clone detection via
key compromise
high performance computing for cryptanalysis:
parallel computing basics, BSP style parallel processing,
example algorithms for: list ranking, parallel prefix,
connected components, multiplication of long numbers,
evaluation of arithmetic expressions