India
This Course is Expired

Cryptography II

Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.

Course at a Glance

Mode of learning : Online - Instructor Lead(LVC)

Domain / Subject : Engineering & Technology

Function : Engineering

Trainer name : Dan Boneh

Starts on : 15th Sep 2014

Duration : 6 Weeks

Difficulty : Advanced

Cryptography II
Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.
Cryptography is an indispensable tool for protecting information in computer systems.  This course is a continuation of Crypto I and explains the inner workings of public-key systems and cryptographic protocols.   Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications. The course begins with constructions for digital signatures and their applications.   We will then discuss protocols for user authentication and zero-knowledge protocols.    Next we will turn to privacy applications of cryptography supporting anonymous credentials and private database lookup.  We will conclude with more advanced topics including multi-party computation and elliptic curve cryptography.  Throughout the course students will be exposed to many exciting open problems in the field.   The course will include written homeworks and optional programming labs.  The material is self-contained, but the course assumes knowledge of the topics covered in Crypto I as well as a basic understanding of discrete probability theory.

Course Format
The class will consist of lecture videos, which are between 8 and 20 minutes in length. These contain 1-2 integrated quiz questions per video. There will also be standalone homeworks that are not part of video lectures, optional programming assignments, and a (not optional) final exam.

Statement of accomplishment will be given to students who obtain more than 70% of the maximum score on the problem sets and final exam. Students who also complete the programming assignments will receive a statement of accomplishment saying that they also completed the programming part of the course

Course eligibility

Recommended Background

Crypto I

I would like to be contacted regarding this course

Photos

Write Your Own Review


Write your review here (required)


Consider:
Is the price of course overrated?
would you recommend this course to others?
Is duration of the course sufficient enough?
Did you like the faculties?
What would you prefer in future classroom or online learning?


Disclaimer: The contents of the course & Institute are obtained from the institute’s website by automated scraping or manual updates. For the latest information, please refer the institute website directly. For any discrepancies in the content, contact us at