You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We can use HAC for much of the material, but it must be complimented with texts on newer algorithms and some topics (zero knowledge and secure multiparty computation).
Date: Mon, 18 Mar 2024 19:33:37 +0100
From: Arber Limani [email protected]
To: Daniel Bosk [email protected]
Subject: [DD2520] Läsinstruktioner till nästa år
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset=utf-8
Hej Daniel,
Jag har boken Cryptography Engineering och har skrivit ner lite
sidanvisningar till nästa gång kursen ges.
Det täcker dock inte alla föreläsningar men har försökt vara ganska tydlig
med vilka det är:
Reading instructions
lecture 2 ch 2.6 - 2.7.2, 3.1-3.5 3.5.2, 4.1 – 4.6
lecture 3 ch 5-5.6
Lecture 4 ch 9
Lecture 5. ch 2.3, ch 10, ch 12.1-12.7
Lecture 6. ch 2.4 ch 12.7-12.8 ch 18, ch 19 (PKI) (nothing about SMC)
Lecture 9: ch 22.1
Detta kanske kan vara användbart i framtiden!
Vänliga hälsningar,
Arber Limani
The text was updated successfully, but these errors were encountered: