11201 工程學群 資訊工程學系

應用密碼學 〡Offered in English

艾米爾 教授

資訊工程學系

國立清華大學資訊安全研究所    教授

國立陽明交通大學電機資訊學院           工學博士

【研究】
CryptographyNetwork Security
【教學】 Applied Cryptography
【網站】 https://scholar.google.com/citations?user=YJbPkzkAAAAJ&hl=en
  https://www.youtube.com/@amirrezapour4782
【信箱】 amir@cs.nthu.edu.tw

News

最新公告

2025-03-25 OEGlobal 2026 conference
2025-03-12 【校友力量大】李丞恩校友|程守慶教授複變數函數論筆記!
2025-03-07 李丞恩校友| 電子學A筆記 !
2025-03-07 李丞恩校友|高等微積分2B筆記 !
2025-03-07 李丞恩校友|高等微積分1筆記 !
2025-03-07 李丞恩校友|高等微積分2A筆記 !
2025-03-07 李丞恩校友| 電子學B筆記 !
2025-03-03 分享是最偉大的學習|李丞恩校友捐贈 高等微積分大要筆記 !
2025-02-25 分享是最偉大的學習|李丞恩校友捐贈10702吳尚鴻教授深度學習筆記!!
2025-02-19 分享是最偉大的學習|固態物理與電子薄膜筆記分享!
2025-02-18 臺灣開放式課程暨教育聯盟|榮獲內政部113年度全國社會公益團體貢獻獎 - 金質獎 (感謝會員學校齊心努力!)
2025-02-14 訊號與系統必修之選【電機資訊必考科目,清大低調巨匠洪樂文教授全英親授】
2025-02-13 A Must-Take Course on Signals and Systems - 【A Core Subject in Electrical Engineering and Computer Science, Taught by NTHU’s Esteemed Scholar, Professor Yao-Win Peter Hong】
2025-02-06 2023 引領教學潮流 : 大學教授的魅力品牌之路 !
2025-02-06 教師備課一定要知道3件事分享報導 ! (20221101)

Syllabus

課程大綱

his course is intended for graduate students. This course will cover the basics of symmetriccryptography, public-key cryptography, hash functions, message authentication codes, digital signatures,key management and distribution, and other fundamental cryptographic primitives.  
 
課程目標
        Course Objective
This course is intended for graduate students. This course will cover the basics of symmetric cryptography, public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives. Then, we use the primitives to build provable secure protocols such as identification schemes, zero-knowledge proofs, commitment schemes, secret sharing, and electronic election system. By learning some existing secure protocols, you’ll learn how to build provable secure systems.
 
 
授課內容
       Course Description
♠ Symmetric-key encryption (Chapter 2)
Algebra & number theory basics (Chapter 3)
Public-key cryptography (Chapter 4)
Cryptographic protocols (Chapter 5)
   
  
參考書籍
        Textbook/References
♠  Hans Delfs, Helmut Knebl, Introduction to Cryptography: Principles and Applications (2nd Ed.),

Springer, 2007.
♠  Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography.

CRC press, 2018.
♠  William Stallings, Network Security Essentials: Application and Standards [4th Ed.],
  Pearson & Prentice Hall, 2010.
 
 
先備知識
       Requirements 
  講授
♠ Computer Networks
 Introduction to Algorithms
 Probability
 
   
評分方式
        methods of grading 
Four Homework Assignments
Exams 

i.Mid-Term
ii.Final
Evaluation

i.Homework: 50% + 
  1.Assignments 50% 
  2.Practical experiments 2×10% [bonus points]

ii.Mid-Term 25% 

iii.Final 25% 
   

*此為英文課程 

Keyword

關鍵字

  • 英文課程
  • Offered in English
  • 應用密碼學
  • Applied Cryptography
  • Symmetric-key encryption
  • Algebra & number theory basics
  • Public-key cryptography
  • Cryptographic protocols