CS 3130 Cryptography: From Theory to Practice
The goal of this course is to understand and apply various techniques in cryptography to problems in many aspects of computing. Some examples are: login, email, sharing/splitting secrets, digital signatures, and micro-cash. Starting from basic mathematical foundation, such as hardness of some number theoretic problems, the course will cover cryptographic protocols, cryptographic techniques and cryptographic algorithms.
Credits vary between 3 and 0 based on agreement with instructor.
Requirements and Grading