Tema Subtema
Introduction to cryptology
Mathematical Background
Information-theoretic security and Computational security
Secret-key cryptography. AES, MAC, Pseudorandom functions
Hash functions. SHA2, HMAC.
Key Management. DH key exchange
Public-key encryption. RSA, ElGamal and OAEP
Digital signatures. RSA-PSS, DSA and ECDSA
Secure Multiparty Computation
Cryptocurrencies. Bitcoin.
Quantum-resistant cryptography