1.03k likes | 1.22k Views
Symmetric-Key Encryption. CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections 3.1-3.4) You may skip proofs, but are encouraged to read some of them. This course:. APPLICATIONS (security). Encryption Schemes. Crypto Protocols. Sign/MAC/hash
E N D
Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 2 Chapter 3 (sections 3.1-3.4) You may skip proofs, but are encouraged to read some of them.
This course: APPLICATIONS (security) Encryption Schemes Crypto Protocols Sign/MAC/hash Schemes Pseudorandom Generators And Functions Zero-Knowledge Proof Systems Computational Difficulty (One-Way Functions)
Stream Ciphers Encryption schemes using pseudorandom generators