11201 工程學群 資訊工程學系

應用密碼學 〡Offered in English

艾米爾 教授

資訊工程學系

國立清華大學資訊安全研究所    教授

國立陽明交通大學電機資訊學院           工學博士

【研究】
CryptographyNetwork Security
【教學】 Applied Cryptography
【網站】 https://scholar.google.com/citations?user=YJbPkzkAAAAJ&hl=en
  https://www.youtube.com/@amirrezapour4782
【信箱】 amir@cs.nthu.edu.tw

News

最新公告

2025-06-20 4/26(六) - 4/29(二) 開放式課程系統升級維護通知!
2025-06-20 【2025 NTHU OCW 授權合作*共創雙贏】讓我們齊心並肩,如龍舵手般穩操勝券,帶領學生勇闖知識航道,助教師勇奪教學的榮耀錦標!
2025-06-20 【2025 NTHU OCW 授權合作*共創雙贏】讓我們齊心並肩,如龍舵手般穩操勝券,帶領學生勇闖知識航道,助教師勇奪教學的榮耀錦標!
2025-06-18 2025 OE Awards for Excellence 開始提名!2025 Open Education Awards for Excellence Nomination
2025-06-12 2025 開放式課程誠徵研究生資訊工讀生1名!
2025-03-25 OEGlobal 2026 conference
2025-03-12 【校友力量大】李丞恩校友|程守慶教授複變數函數論筆記!
2025-03-07 李丞恩校友| 電子學A筆記 !
2025-03-07 李丞恩校友|高等微積分2B筆記 !
2025-03-07 李丞恩校友|高等微積分1筆記 !
2025-03-07 李丞恩校友|高等微積分2A筆記 !
2025-03-07 李丞恩校友| 電子學B筆記 !
2025-03-03 分享是最偉大的學習|李丞恩校友捐贈 高等微積分大要筆記 !
2025-02-25 分享是最偉大的學習|李丞恩校友捐贈10702吳尚鴻教授深度學習筆記!!
2025-02-19 分享是最偉大的學習|固態物理與電子薄膜筆記分享!

Syllabus

課程大綱

his course is intended for graduate students. This course will cover the basics of symmetriccryptography, public-key cryptography, hash functions, message authentication codes, digital signatures,key management and distribution, and other fundamental cryptographic primitives.  
 
課程目標
        Course Objective
This course is intended for graduate students. This course will cover the basics of symmetric cryptography, public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives. Then, we use the primitives to build provable secure protocols such as identification schemes, zero-knowledge proofs, commitment schemes, secret sharing, and electronic election system. By learning some existing secure protocols, you’ll learn how to build provable secure systems.
 
 
授課內容
       Course Description
Symmetric-key encryption (Chapter 2)
Algebra & number theory basics (Chapter 3)
Public-key cryptography (Chapter 4)
Cryptographic protocols (Chapter 5)
  
  
參考書籍
        Textbook/References
♠ Hans Delfs, Helmut Knebl, Introduction to Cryptography: Principles and Applications (2nd Ed.),

Springer, 2007.
♠ Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography.

CRC press, 2018.
♠ William Stallings, Network Security Essentials: Application and Standards [4th Ed.],
 Pearson & Prentice Hall, 2010.
 
 
先備知識
       Requirements 
 講授
Computer Networks
Introduction to Algorithms
Probability
 
   
評分方式
        methods of grading 
Four Homework Assignments
Exams 

i.Mid-Term
ii.Final
Evaluation

i.Homework: 50% + 
  1.Assignments 50% 
  2.Practical experiments 2×10% [bonus points]

ii.Mid-Term 25% 

iii.Final 25% 
  

*此為英文課程 

Keyword

關鍵字

  • 英文課程
  • Offered in English
  • 應用密碼學
  • Applied Cryptography
  • Symmetric-key encryption
  • Algebra & number theory basics
  • Public-key cryptography
  • Cryptographic protocols