Zum Hauptinhalt

3b. Applied Cryptography

Abschlussbedingungen

Students shall:

  • know about elliptic curve cryptography and its basic mathematical operations
  • know about key generation
  • know about message encryption and decryption
  • know about hashing and signing messages
  • be able to send a hashed and signed message
Lecture 3b - Applied Cryptography - Part 1 - Operation on Elliptic Curves (CC BY-NC-SA)

 

 

Lecture 3b - Applied Cryptography - Part 2 - Signing Messages von Prof. Dr. Volker Skwarek, Dhiren Patel (CC BY-NC-SA)

 

 

Lecture 3b - Applied Cryptography - Part 3 - Hash Functions von Prof. Dr. Volker Skwarek, Dhiren Patel (CC BY-NC-SA)

 

 

Lecture 3b - Applied Cryptography - Part 4 - Hash Function Security Requirements von Prof. Dr. Volker Skwarek, Dhiren Patel (CC BY-NC-SA)

 

 

Lecture 3b - Applied Cryptography - Part 5 - Various Hash Functions von Prof. Dr. Volker Skwarek, Dhiren Patel (CC BY-NC-SA)

 

 

Lecture 3b - Applied Cryptography - Part 6 - SHA-1 von Prof. Dr. Volker Skwarek, Dhiren Patel (CC BY-NC-SA)

 

 

 

Back to Overview Previous Lecture Next Lecture

Zuletzt geändert: Mittwoch, 9. Oktober 2024, 15:19