[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Advanced cryptography course
--- begin forwarded text
Date: Sat, 28 Dec 1996 12:24:41 -0500 (EST)
From: Christof Paar <[email protected]>
To: DCSB <[email protected]>
Subject: Advanced cryptography course
MIME-Version: 1.0
Sender: [email protected]
Precedence: bulk
Reply-To: Christof Paar <[email protected]>
This is an announcment for an advanced cryptography course in the greater
Boston area:
Here comes the syllabus for the course EE 589R, Advanced Topics in
Cryptography and Data Security. The first class will be held on Monday,
January 20, at Worcester Polytechnic Institute.
The course is a continuation of EE 578/CS 578, Cryptography and Data
Security. It will provide a deeper insight into several areas of cryptology
which are of great practical and theoretical importance. The three main
areas treated are: Detailed analysis and implementation of public key
algorithms, advanced protocols, and modern attacks against cryptographic
schemes. We will address many topics which are usually only treated in the
research literature.
Please feel free to get in touch with me any time if you have further
questions about the course.
Regards,
Christof Paar
****************************************************************************
Christof Paar http://ee.wpi.edu/People/faculty/cxp.html
Assistant Professor email: [email protected]
ECE Department phone: (508) 831 5061
Worcester Polytechnic Institute fax: (508) 831 5491
100 Institute Road
Worcester, MA 01609, USA
***************************************************************************
EE 579R, ADVANCED TOPICS IN CRYPTOGRAPHY AND DATA SECURITY
Spring `97
WPI, Monday 5:30-8:30
SYLLABUS
Week 1
Efficient implementation of RSA: The Chinese Remainder Theorem.
Week 2
Efficient implementation of public-key systems over finite fields: Galois
fields theory.
Week 3
Implementation of Galois field arithmetic.
Week 4
Efficient arithmetic with long numbers: Montgomery and Karatsuba-Ofman
algorithm.
Week 5
Efficient exponentiation algorithms.
Week 6
Attacks against the discrete logarithms: Shank's algorithm and Pollard's-rho
method.
Week 7
Midterm Exam
Week 8
Attacks against the discrete logarithms: Index calculus method.
Week 9
Attacks against block ciphers: Differential cryptanalysis.
Week 10
Block ciphers from arithmetic operations: IDEA.
Week 11
Secret sharing and threshold schemes.
Week 12
Zero knowledge identification schemes.
Week 13
Selected topics, depending on class interest.
Week 14
Final Exam.
TEXTBOOK
Menezes, van Oorschot, Vanstone: Handbook of Applied Cryptography. CRC
Press, October 96, ISBN 0-8493-8523-7, $80
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
To unsubscribe from this list, send a letter to: [email protected]
In the body of the message, write: unsubscribe dcsb
Or, to subscribe, write: subscribe dcsb
If you have questions, write to me at [email protected]
--- end forwarded text
-----------------
Robert Hettinga ([email protected]), Philodox,
e$, 44 Farquhar Street, Boston, MA 02131 USA
"The cost of anything is the foregone alternative" -- Walter Johnson
The e$ Home Page: http://www.vmeng.com/rah/