课程信息
4,884 次近期查看

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为12 小时

建议:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

英语(English)

字幕:英语(English)
User
学习Course的学生是
  • Security Engineers
  • Machine Learning Engineers
  • Software Engineers
  • Data Scientists
  • Teachers
User
学习Course的学生是
  • Security Engineers
  • Machine Learning Engineers
  • Software Engineers
  • Data Scientists
  • Teachers

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为12 小时

建议:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间为 3 小时

Integer Foundations

5 个视频 (总计 60 分钟), 10 个阅读材料, 2 个测验
5 个视频
Divisibility, Primes, GCD14分钟
Modular Arithmetic15分钟
Multiplicative Inverses12分钟
Extended Euclidean Algorithm13分钟
10 个阅读材料
Course Introduction10分钟
Lecture Slides - Divisibility, Primes, GCD10分钟
Video - Adam Spencer: Why I fell in love with monster prime numbers15分钟
L16: Additional Reference Material10分钟
Lecture Slides - Modular Arithmetic10分钟
L17: Additional Reference Material10分钟
Lecture Slides - Multiplicative Inverses10分钟
L18: Additional Reference Material10分钟
Lecture Slides - Extended Euclidean Algorithm10分钟
L19: Additional Reference Material10分钟
2 个练习
Practice Assessment - Integer Foundation18分钟
Graded Assessment - Integer Foundation16分钟
2
完成时间为 3 小时

Modular Exponentiation

4 个视频 (总计 51 分钟), 9 个阅读材料, 2 个测验
4 个视频
Euler's Totient Theorem16分钟
Eulers Totient Function12分钟
Discrete Logarithms15分钟
9 个阅读材料
Lecture Slides - Square-and-Multiply10分钟
Video - Modular exponentiation made easy10分钟
L20: Additional Reference Material10分钟
Lecture Slide - Euler's Totient Theorem10分钟
L21: Additional Reference Material10分钟
Lecture Slide - Eulers Totient Function10分钟
L22: Additional Reference Material10分钟
Lecture Slide - Discrete Logarithms10分钟
L23: Additional Reference Material10分钟
2 个练习
Practice Assessment - Modular Exponentiation12分钟
Graded Assessment - Modular Exponentiation20分钟
3
完成时间为 3 小时

Chinese Remainder Theorem

3 个视频 (总计 25 分钟), 5 个阅读材料, 2 个测验
3 个视频
Moduli Restrictions, CRT-to-Integer Conversions10分钟
CRT Capabilities and Limitations8分钟
5 个阅读材料
Lecture Slide - CRT Concepts, Integer-to-CRT Conversions30分钟
L24: Additional Reference Material10分钟
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分钟
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分钟
Video - How they found the World's Biggest Prime Number - Numberphile12分钟
2 个练习
Practice Assessment - Chinese Remainder Theorem12分钟
Graded Assessment - Chinese Remainder Theorem20分钟
4
完成时间为 3 小时

Primality Testing

3 个视频 (总计 36 分钟), 8 个阅读材料, 3 个测验
3 个视频
Fermat's Primality9分钟
Miller-Rabin13分钟
8 个阅读材料
Lecture Slide - Trial Division10分钟
L27: Additional Reference Material10分钟
Lecture Slide - Fermat's Primality10分钟
L28: Additional Reference Material10分钟
Lecture Slide - Miller-Rabin10分钟
Video - James Lyne: Cryptography and the power of randomness10分钟
L29: Additional Reference Material10分钟
The Science of Encryption10分钟
3 个练习
Practice Assessment - Primality Testing12分钟
Graded Assessment - Primality Testing20分钟
Course Project8分钟

讲师

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

关于 科罗拉多大学系统

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

关于 Introduction to Applied Cryptography 专项课程

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....
Introduction to Applied Cryptography

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心