Asymmetric cryptographic algorithms - principles, applications.
Public key encryption algorithms.
Signature algorithms and schemes, schemes with special properties.
Protocols for key management - principles, the main protocols.
Identification schemes and protocols - basic schemes, properties and uses.
Secret sharing algorithms.
Special schemes and protocols: electronic payments, electronic elections, Traitor tracing.
Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.
Required course for bachelor's program in Information security. Continuation of NMMB301.