The goal of this course is to understand and apply various techniques in cryptography to problems in many aspects of computing. Some examples are: login, email, sharing/splitting secrets, digital signatures, and micro-cash. Starting from basic mathematical foundation, such as hardness of some number theoretic problems, the course will cover cryptographic protocols, cryptographic techniques and cryptographic algorithms.

  • Credits: 3
  • Frequency: At least once a year


    Requirements and Grading