Generation integer factorization discrete logarithms

This preview shows page 112 - 114 out of 175 pages.

generation, integer factorization, discrete logarithms; public-key encryption; digital signatures;key establishment; secret sharing; and security definitions and proofs.CO 687 Applied Cryptography (0.50) LECA broad introduction to cryptography, highlighting the major developments of the past twentyyears, including symmetric ciphers, hash functions and data integrity, public-key encryption anddigital signatures, key establishment, and key management. Applications to internet security,computer security, communications security, and electronic commerce will be studied.ECE 628 Computer Network Security (0.50) LECEvolution of computer security. Types of security threats, hardware threats, software threats,physical threats, cryptanalysis. The theory of secure message passing. Methods of encryption,private networks, Data Encryption Standard, Public Key Cryptosystems. Secrecy and Privacy in anetwork environment, long haul networks, local area networks. Protocols for computernetwork security.PHYS 467 LEC, TST 0.50 Introduction to Quantum Information ProcessingBasics of computational complexity; basics of quantum information; quantum phenomena;quantum circuits and universality; relationship between quantum and classical complexityclasses; simple quantum algorithms; quantum Fourier transform; Shor factoring algorithm;Grover search algorithm; physical realization of quantum computation; error-correction andfault-tolerance; quantum key distribution. [Offered: W]BE 600 Management and Leadership (0.50)This course provides students with the opportunity to develop a range of soft skills and thebusiness acumen necessary to maximize the likelihood of business success. Topics includecommunication and interpersonal skills, leadership, and negotiation skills. A range of applied112
17approaches are used, including integrated cases, simulations, and interaction with the localbusiness community. MEng and GDip students only.BE 606 Entrepreneurship and innovation (0.50)This course introduces students to the theory underlying entrepreneurship, venture creationand innovation management, as well as its practical implications. Topics coveredinclude introduction to entrepreneurship and innovation, the dynamics of innovation,corporate entrepreneurship and commercialization, venture creation andthe management of high-performance innovative teams.VII. Mode of DeliveryAll instruction in the Quantum-Safe Cryptography program will be given face-to-face. Thecourses will be delivered in either the traditional weekly format or as intensive block courses.Block courses will be offered in the Spring terms, lasting between 1 and 2 weeks. The courseswill have a credit weight of 0.5 and therefore require a total of 36 hours of lectures. It isreasonable to expect the lectures to be delivered over the course of 4-5 full days. This blockcourse format may prove challenging for some students as it could affect their otherregistration during the spring term, however Table 3 indicates that there are significantly less

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 175 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Sajid
Tags
Academic degree, Bachelor s degree, Postgraduate education

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture