A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Modern cryptology
Computer security basics
The digital signature standard
Communications of the ACM
Fundamentals of computer security technology
Fundamentals of computer security technology
The official PGP user's guide
Basic methods of cryptography
The DES: An Extensive Documentation and Evaluation of the Data Encryption Standard
The DES: An Extensive Documentation and Evaluation of the Data Encryption Standard
Network Security: A Beginner's Guide
Network Security: A Beginner's Guide
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java
The Design of Rijndael
Digital Certificates: Applied Internet Security (with CD-ROM)
Digital Certificates: Applied Internet Security (with CD-ROM)
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Design Principle for Hash Functions
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Response to Comments of the NIST Proposed Digital Signature Standard
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
TIGER: A Fast New Hash Function
Proceedings of the Third International Workshop on Fast Software Encryption
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)
Biometric authentication: a machine learning approach
Biometric authentication: a machine learning approach
Xml hacks
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Missing factors in teaching cryptography algorithms for information security tracks
2009 Information Security Curriculum Development Conference
Hi-index | 0.00 |
The Cryptography Course is a major part of Computer security, Information security, Network security and all Information security related courses [12, chapter 1]. This course could be offered to undergraduate level (S level) or graduate level students. This article focuses on the problem:If the Cryptography course is offered as two consecutive courses, there is no problem because there are about 30-32 weeks of instruction for the 3-credit course (about 100 hours). This quantity of time is quite ample to cover the major Cryptography subjects (including mathematics, classical algorithms, Block algorithms, Stream cipher Public Key, Crypto hash functions, Authentication and Identification, Key management protocols, Cryptography application: web security, PKI, Email, internet, and all other Cryptography algorithms). However, the problem arises when there is only one course with 3 credit hours per week equaling 45 hours. The course has to be designed for the students' level of studies.This short paper proposes a Cryptography curriculum designed as one course to suit both the undergraduate and graduate level. The curriculum is detailed and distributed over 15 weeks.