Applied Cryptography

Course objectives

Aims After the course, the student should understand the ideas and workings of public and secret-key cryptography in the IT security sector. Content The course covers the following topics: Symmetric cryptography: encryption, authentication, hashing, ... Public key cryptography and post-quantum cryptography: encryption, signatures, KEMS, ... Security notions like existential forgery, IND-CCA, zero-knowledge, etc. Security proofs Protocols, like challenge-response protocols, proofs of knowledge, etc. Real-world protocols, like TLS, secure messaging, etc.

Channel 1
Simona Samardjiska Lecturers' profile
Bart Mennink Lecturers' profile
  • Lesson code10610042
  • Academic year2025/2026
  • CourseArtificial Intelligence
  • CurriculumSingle curriculum
  • Year1st year
  • Semester2nd semester
  • SSDING-INF/05
  • CFU6