Course Notes on Complexity and Cryptography
نویسنده
چکیده
The main purpose of this course is an introductory study of computational complexity and cryptography. The rst part introduces the concept of computational complexity by looking at the basic arithmetic operations, i.e., addition, subtraction, multiplication and division. Then matrix multiplication is touched. In order to prepare everything we need later for public-key cryptography, we continue with number theoretic problems and study several algorithms including modular exponentiation, primality testing and taking discrete roots. In the following, we introduce well-known complexity classes, look at complete problems and nish with probabilistic complexity classes. There is also an appendix comprising additional material that had to be omitted due to the introductory character of this course, but may be worth to be known. The second part is devoted to cryptography. After a short historical sketch we deal with public-key cryptography in some more detail, look at authentication and cryptographic protocols, and nish with a more detailed study of digital signatures. Again, there is an appendix containing material for further reading. There will be a midterm problem set and a nal report problem set each worth 100 points. So your grade will be based on these 200 points. Note that the course is demanding. But this is just in line with William S. Clark's encouragement Boys, be ambitious ! Of course, nowadays, we would reformulate this encouragement as Girls and Boys, be ambitious ! c ©Thomas Zeugmann, Hokkaido University, 2008 Course Notes on Complexity and Cryptography iii Recommended Literature The references given below are mandatory. (1) 8¡à : ÖhaüÈÞÈó Ö Information & Computing 106, μ¤ ̈ó1>, 2005 ISBN 978-4-7819-1104-5 (2) Ò¤ ̈ >bKj ûPÅ1 áì ̄Áãü·êüoD-8 þã÷n ú p ûPÅ1 áf è (3) J ÛÃ× ̄íÕÈ J ¦ëÞó : aüÈÞÈó Ö Ö I, Information & Computing 3, μ¤ ̈ó1>, 1984 ISBN 4-7819-0374-6 (4) J ÛÃ× ̄íÕÈ J ¦ëÞó : aüÈÞÈó Ö Ö II, Information & Computing 3, μ¤ ̈ó1>, 1984 ISBN 4-7819-0432-7 There are some additional references to the literature given in some lectures. So please look there, too. c ©Thomas Zeugmann, Hokkaido University, 2008
منابع مشابه
The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملCs 355: Topics in Cryptography
Preliminary notes based on course material from Professor Boneh’s Topics in Cryptography course (CS 355) in Spring, 2014. There are probably typos. Last updated: June 19, 2014
متن کاملHow to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols
This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...
متن کاملCoding Theory Lecture Notes
These are the notes for the 2011 Summer Tutorial on Coding Theory. I have not gone through and given citations or references for all of the results given here, but the presentation relies heavily on two sources, van Lint’s Introduction to Coding Theory and the book of Huffman and Pless Fundamentals of Error-Correcting Codes. I also used course notes written by Sebastian Pancratz from a Part II ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008