To know and be able to use stream ciphers |
|
|
C1 C4 C10
|
|
Knowledge about the construction, use and properties of hash functions, universal hashing and collision resistant hashing. Knowledge about message authentication codes. Case studies |
|
|
C1 C4 C10
|
|
To know the basics of advanced cryptography: cryptography on elliptic curves. Lattice-based cryptography |
A2 A5
|
|
C1 C4 C10
|
|
To understand and have the ability to apply the basic techniques for steganography, watermarking and digital forensics |
A5
|
|
C1 C4 C10
|
|
To know and understand the basic principles of distributed secure computation |
A2 A5
|
|
C1 C4 C10
|
|