Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.
R1: Standard Selection process: http://en.wikipedia.org/wiki/Advanced_Encryption_Standard_process
R2: FIPS: http://csrc.nist.gov/publications/fips/
R3: Hardware implementation of AES: http://cegt201.bradley.edu/projects/proj2005/aes128/2
R5: Weak Keys: http://en.wikipedia.org/wiki/Weak_key
"This course aims at introducing students to modern cryptography as a major tool in Computer and Information security.
Topics will include:
The necessary number theory such as primes, random numbers, factoring, discrete logarithms, finite fields and elliptic curve mathematics will be also covered in class.
When appropriate, cryptanalysis of the various techniques, such as known/chosen plaintext, linear and differential cryptanalysis and some side channel analyses will also be covered."
Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.
*Q -- Science
QA -- Mathematics
QA75.5~76.95 -- Electronic computers. Computer science