|
|
|
||
Last update: G_M (16.05.2012)
|
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (10.06.2019)
Předmět je zakončen ústní zkouškou. |
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (24.08.2012)
Shafi Goldwasser, Mihir Bellare: Lecture Notes on Cryptography, 2008, http://cseweb.ucsd.edu/~mihir/papers/gb.pdf A. Menezes, P. van Oorschot, and S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996 (http://www.cacr.math.uwaterloo.ca/hac) W. Mao: Modern Cryptography: Theory and Practice, Prentice Hall PTR 2003 Douglas R. Stinson: Cryptography - Theory and Practice, CRC Press, 1995 |
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (10.06.2019)
Zkouška má ústní formu. Její požadavky odpovídají obsahu přednesené látky. |
|
||
Last update: doc. Mgr. et Mgr. Jan Žemlička, Ph.D. (26.09.2012)
Asymmetric cryptographic algorithms - principles, applications. Public key encryption algorithms. Signature algorithms and schemes, schemes with special properties. Protocols for key management - principles, the main protocols. Identification schemes and protocols - basic schemes, properties and uses. Secret sharing algorithms. Special schemes and protocols: electronic payments, electronic elections, Traitor tracing. Non-traditional use of cryptography: coin flipping, electronic poker, secure computing.
|