Secure Telecommunication Systems

Up

  ADVANCED CRYPTOGRAPHIC ALGORITHMS
IMPLEMENTATIONS & SIDE CHANNEL ATTACKS
  KEY MANAGEMENT & SECRET SHARING
  SELECTED SECURITY PROTOCOLS
ZERO KNOWLEDGE & BIOMETRICS

 


ADVANCED CRYPTOGRAPHIC ALGORITHMS

 

  1. Advanced Encryption Standard Contest, NESSIE, eSTREAM, and other contests

  2. Rijndael - AES

  3. Mathematical Background: Groups, Rings, and Fields

  4. Rijndael - Implementations in Software and Hardware

  5. Stream Ciphers

  6. Survey of Public Key Cryptosystems

  7. Elliptic Curve Cryptosystems

Up



IMPLEMENTATIONS & SIDE CHANNEL ATTACKS


  1. Smart Cards
  2. Hardware Implementations of Cryptography & Security Requirements for Cryptographic Modules, FIPS 140
  3. Side Channel Attacks

Up

 


KEY MANAGEMENT & SECRET SHARING
  1. Random Bit Generators

  2. Secret Sharing

Up



SELECTED SECURITY PROTOCOLS
  1. Survey of Internet Security Protocols:  SSL, IPSec, IEEE 802.11, etc.

     

Up


ZERO KNOWLEDGE & BIOMETRICS
  1. Zero Knowledge Identification Schemes
     
  2. Biometrics


Up