Cryptography [PDF]

Croatian. Cryptography. Undergraduate course (for third and fourth year students). Lectures: Andrej Dujella Exercises: M

11 downloads 59 Views 43KB Size

Recommend Stories


PDF-Download- Applied Cryptography
Where there is ruin, there is hope for a treasure. Rumi

PDF Applied Cryptography
Don’t grieve. Anything you lose comes round in another form. Rumi

[PDF] Understanding Cryptography
Where there is ruin, there is hope for a treasure. Rumi

Cryptography
The happiest people don't have the best of everything, they just make the best of everything. Anony

White-Box Cryptography Cryptography
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

cryptography
Everything in the universe is within you. Ask all from yourself. Rumi

Cryptography
You often feel tired, not because you've done too much, but because you've done too little of what sparks

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Idea Transcript


Croatian

Cryptography Undergraduate course (for third and fourth year students)

Lectures: Andrej Dujella Exercises: Marcel Maretic Contents Classical cryptography. Basic notions. Caesar, Vigenère, Playfair and Hill ciphers. Rotor machines. Statistical methods in cryptoanalysis. Modern block ciphers. Data Encryption Standard (DES). Cryptanalysis of DES. Advanced Encryption Standard (AES). Public key cryptography. Idea of public key cryptography. Key exchange, digital signature. RSA cryptosystem. Other public-key cryptosystems. Primality tests and factoring. Pseudoprimes. Soloway-Strassen and Miller-Rabin primality tests. Factor bases. Continued fraction factoring method. Quadratic sieve method.

Lecture notes (in Croatian)

Basic references 1. A. Dujella, M. Maretic: Kriptografija, Element, Zagreb, 2007. 2. D. R. Stinson: Cryptography. Theory and Practice, CRC Press, Boca Raton, 1996 (first edition), 2002 (second edition), 2005 (third edition). 3. N. Koblitz: A Course in Number Theory and Cryptography, Springer-Verlag, New York, 1994.

Additional references 1. F. L. Bauer: Decrypted Secrets. Methods and Maxims of Cryptology, Springer-Verlag, Berlin, 2000. 2. E. Biham, A. Shamir: Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993. 3. J. Buchmann: Introduction to Cryptography, Springer-Verlag, New York, 2000. 4. J. Daemen, V. Rijmen: The Design of Rijndael. AES - The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002. 5. D. Kahn: The Codebreakers. The Story of Secret Writing, Scribner, New York, 1996. 6. E. Kranakis: Primality and Cryptography, Teubner, Stuttgart; John Wiley, Chichester, 1987. 7. A. J. Menezes, P. C. Oorschot, S. A. Vanstone: Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996. 8. R. A. Mollin: An Introduction to Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2001. 9. R. A. Mollin: RSA and Public-Key Cryptography, Chapman & Hall/CRC Press, Boca Raton, 2002. 10. A. Petho: Algebraische Algorithmen, Vieweg, Braunschweig, 1999. 11. K. H. Rosen: Elementary Number Theory and Its Applications, Addison-Wesley, Reading, 1993. 12. A. Salomaa: Public-Key Cryptography, Springer-Verlag, Berlin, 1996. 13. B. Schneier: Applied Cryptography, John Wiley, New York, 1995. 14. G. J. Simmons (Ed.): Contemporary Cryptology, The Science of Information Integrity, IEEE Press, Piscataway, 1992. 15. S. Singh: The Code Book, Fourth Estate, London, 1999. 16. N. Smart: Cryptography. An Introduction, McGraw-Hill, New York, 2002. 17. W. Stallings: Cryptography and Network Security. Principles and Practice, Prentice Hall, Upper Sadle River, 2005. 18. W. Trappe, L. C. Washington: Introduction to Cryptography with Coding Theory, Prentice Hall, Upper Sadle River, 2002. 19. M. Welschenbach: Cryptography in C and C++, Apress, Berkeley, 2001. Student seminar - Elliptic curves and their applications in cryptography (2002/2003) Introduction to Number Theory - Undergraduate course Number Theory in Cryptography - Graduate course (2003/2004)

Examples of homework exercises: 1999/2000: zad1 zad2 zad3 zad4 zad5 zad6 2000/2001: zad1 zad2 zad3 zad4 zad5 2001/2002: zad1 zad2 zad3 zad4 zad5 zad6 2002/2003: zad1 zad2 zad3 zad4 zad5 2003/2004: zad1 zad2 zad3 zad4 zad5 2004/2005: zad1 zad2 zad3 zad4 zad5 2005/2006: zad1 zad2 zad3 zad4 2006/2007: zad1 zad2 zad3 zad4 zad5 Andrej Dujella home page

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.