wpisy 2.02: 14-15, 3.02: 10:30-11:30,
also you can leave your index at 10 or make an arrangement by email
the general topics include:
provable privacy enhancing techniques,
reduction proofs, random oracle and standard model,
zero-knowledge, but also certification methods, risk analysis as well as
examples of systems that are secure-evident even if their components
try to be malicious (voting systems will be presented)
Handbook of Applied CryptographyA.J.Menezes, P.C van Oorschot, S.A.Vanstone ,
CRC, 1996, ISBN 0-8493-8523-7.
lecture notes as indicated during the classes
The grade for the course will be based on the points from the written tests.
The written tests will check understanding, skills and ability of problem solving.
It will consist of short problems (almost test questions)
that will demand certain creativity.
It is not necessary to remember details of algorithms and protocols,
but it will be necessary to understand them well.
Usually, the details which are hard to remember, will be recalled on the
question sheet. It will be allowed to bring own notices, books, ...
Each test will last 45 minutes, the maximum number of points to
get will be 6.
presentation of some hot topics and trends as well as
stuff which is hard to learn by themselves. This concerns in particular
rigid approach for the case when guarantees must be given.
fair understanding of cryptography and computer security lecture -fundamental level