Applied Cryptography

Course Name: 

Applied Cryptography (IS820)


M.Tech (CSE-IS)


Elective Courses (Ele)

Credits (L-T-P): 

03 (3-0-0)


Privacy-Enhancing Technologies, Privacy-Preserving Data Collection and Data Publishing, Privacy-Preserving Data Mining, K-Anonymity, Anonymous communications, Anonymous credentials, Group signatures, Privacy and anonymity in peer-to-peer architectures, Privacy-enhanced access control or authentication/certification, Advanced Crypto Algorithms and Protocols, Zero-knowledge proof, Oblivious Transfer, Secure Multiparty Computation Digital Cash, Secret Sharing, Threshold Cryptography, Identity-Based Encryption, Attribute-Based Encryption


1.B.Schneier, "Applied Cryptography", John Wiley and Sons.
2.Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, "Handbook of Applied Cryptography", CRC Press
3.Jonathan Katz and Yehuda Lindell, "Introduction to Modern Cryptography", Chapman and Hall/CRC Press


Computer Science and Engineering

Contact us

Dr. Manu Basavaraju
Head of the Department
Department of CSE, NITK, Surathkal
P. O. Srinivasnagar, Mangalore - 575 025
Karnataka, India.
Hot line: +91-0824-2474053
Email: hodcse[AT]nitk[DOT]ac[DOT]in


Connect with us

We're on Social Networks. Follow us & get in touch.