Applied Cryptography
Offered By: University of Virginia via Udacity
Course Description
Overview
Cryptography is present in everyday life, from paying with a credit card to using the telephone. Learn all about making and breaking puzzles in computing.
Syllabus
- Perfect Ciphers
- What makes certain ciphers perfect.,How the Lorenz Cipher was broken.
- Symmetric Encryption
- Sending messages when two people share a secret.
- Key Exchange
- Techniques to establish a shared secret.
- Asymmetric Encryption
- Exchanging information using public key cryptosystems.
- Public Key Protocols
- Encrypted key exchange, certificates, secure commerce.
- Using Cryptographic Primitives
- How cryptography can be useful for anonymizing communication, voting, and digital cash.
- Secure Computation
- Computing without exposing data.
Taught by
David Evans
Tags
Related Courses
FHE and Private Set IntersectionSimons Institute via YouTube Homomorphic Encryption in the SPDZ Protocol for MPC
Simons Institute via YouTube Compressing Vector OLE
Association for Computing Machinery (ACM) via YouTube Secure Outsourced Matrix Computation and Application to Neural Networks
Association for Computing Machinery (ACM) via YouTube Cryptographic Protocols and Secure Computation I
TheIACR via YouTube