Introduction to cryptography with a classic and historical approach..
Perfect security of a cipher. The Vernam cipher (one time pad.). Shannon theorems
Symmetric encryption (private key)
Concrete security, computational security and semanticAL
Pseudo-random generators. Flux ciphers.
CPA ciphers, MAC, Hash functions. Constructions of block ciphers (DES, AES). Certified Ciphers
Theory of numbers and groups.
Merkle Puzzles e Diffie-Hellman
Asymmetric ciphers (public key) (RSA and El-Gamal). Digital signatures
Advanced Encryption Systems: cryptographic of elliptical curves, homomorphic cryptography and encryption based on lattices.
Protocols for authentication and zero knowledge protocols. Case studies.
Syntax and notation for describing information security protocols.
Formal verification Tools for security protocols and cryptographic primitives.
Introduction to Modern Cryptography: Principles and Protocols, Jonathan Katz, Yehuda Lindell, Chapman & Hall, 2nd Edition, 2015.
Protocols for Authentication and Key Establishment, Colin Boyd, Anish Mathuria, 2003 ISBN: 978-3-642-07716-6, Springer
Handbook of Applied Cryptography, Menezes, Oorschot and Vanstone, 1997, CRC Press
A Classical Introduction to Cryptography Applications for Communications Security, Serge Vaudenay, Springer, 2005.
A Classical Introduction to Cryptography Exercise Book, Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay, Springer, 2005.
A Course in Number Theory and Cryptography (2nd Ed.), Neal Koblitz, Springer-Verlag’s Graduate Texts in Mathematics, 1994.