Cryptographic protocols  

Description: Formalisation of different cryptographic primitives, and the use of them in protocol design. Zero-knowledge and its applications, secret sharing. Two-party and multi-party computation. "Cryptographic protocols" is a direct continuation of "Cryptology I" and should be taken before "Cryptology II". Learning outcomes: The students know different formalisation and analysis methods for protocols and know how to apply them in practice.
Presential
English
Cryptographic protocols
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).