Updating search results...

Search Resources

45 Results

View
Selected filters:
  • cryptography
Perfect secrecy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Claude Shannon's idea of perfect secrecy: no amount of computational power can help improve your ability to break the one-time pad. Created by Brit Cruise.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Brit Cruise
Date Added:
07/14/2021
Principles of Discrete Applied Mathematics
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course is an introduction to discrete applied mathematics. Topics include probability, counting, linear programming, number-theoretic algorithms, sorting, data compression, and error-correcting codes. This is a Communication Intensive in the Major (CI-M) course, and thus includes a writing component.

Subject:
Business and Communication
Communication
Mathematics
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Goemans, Michel
Orecchia, Lorenzo
Peng, Richard
Ruff, Susan
Date Added:
09/01/2013
Quantum Computation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course provides an introduction to the theory and practice of quantum computation. Topics covered include: physics of information processing, quantum logic, quantum algorithms including Shor’s factoring algorithm and Grover’s search algorithm, quantum error correction, quantum communication, and cryptography.

Subject:
Applied Science
Computer Science
Engineering
Mathematics
Physical Science
Physics
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Shor, Peter
Date Added:
09/01/2003
Selected Topics in Cryptography
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course covers a number of advanced “selected topics” in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of “universally composable security” is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Canetti, Ran
Date Added:
02/01/2004