Public-key cryptography uses pairs of related keys to encrypt and decrypt messages, with the private key kept secret and the public key openly distributed. It is used for digital signatures, encryption, and key exchange, providing assurance of confidentiality, authenticity, and non-repudiability.
Princeton University
Fall 2020
An introductory course into modern cryptography, grounded in rigorous mathematical definitions. Covers topics such as secret key and public key encryption, pseudorandom generators, and zero-knowledge proofs. Requires a basic understanding of probability theory and complexity theory, and entails some programming for course projects.
No concepts data
+ 29 more conceptsUC Berkeley
Summer 2022
This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.
No concepts data
+ 40 more conceptsBrown University
Spring 2022
CS1660 delivers a balanced mix of theory and practice in computer systems security. Starting with the foundational aspects of cryptography, the course navigates through security aspects of web applications, operating systems, and networks. Students will hone their "security mindset," learning to identify vulnerabilities and understand defenses across different domains.
No concepts data
+ 38 more conceptsBrown University
Spring 2023
Applied Cryptography at Brown University offers a practical take on securing systems. By learning foundational cryptographic algorithms and advanced topics like zero-knowledge proofs and post-quantum cryptography, students gain both theoretical insights and hands-on experience in implementing cryptosystems using C++ and crypto libraries. Label: State-of-art concepts.
No concepts data
+ 63 more concepts