Charles Explorer logo
🇬🇧

Applied Cryptography 2

Class at Faculty of Mathematics and Physics |
NMMB302

Syllabus

Asymmetric cryptographic algorithms - principles, applications.

Public key encryption algorithms.

Signature algorithms and schemes, schemes with special properties.

Protocols for key management - principles, the main protocols.

Identification schemes and protocols - basic schemes, properties and uses.

Secret sharing algorithms.

Special schemes and protocols: electronic payments, electronic elections, Traitor tracing.

Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.

Annotation

Required course for bachelor's program in Information security. Continuation of NMMB301.