symmetric ciphers (block and stream ciphers), asymmetric ciphers, underlying problems for asymmetric constructions, hash functions, message authentication codes, digital signatures, passwords, secret sharing schemes, cryptographic protocols and related attacks, zero-knowledge proofs.
Type of methodology: Combination of lecture and hands-on
Participants receive the certificate of attendance: Yes
Paid training activity for participants: Yes, for all
Participants prerequisite knowledge: Numerical methods (linear algebra, statistics) Domain-specific background knowledge