課程信息
8,823 次近期查看

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為12 小時

建議:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

英語(English)

字幕:英語(English)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為12 小時

建議:This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week....

英語(English)

字幕:英語(English)

學習Course的學生是

  • Security Engineers
  • Machine Learning Engineers
  • Software Engineers
  • Data Scientists
  • Researchers

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 3 小時

Integer Foundations

5 個視頻 (總計 60 分鐘), 10 個閱讀材料, 2 個測驗
5 個視頻
Divisibility, Primes, GCD14分鐘
Modular Arithmetic15分鐘
Multiplicative Inverses12分鐘
Extended Euclidean Algorithm13分鐘
10 個閱讀材料
Course Introduction10分鐘
Lecture Slides - Divisibility, Primes, GCD10分鐘
Video - Adam Spencer: Why I fell in love with monster prime numbers15分鐘
L16: Additional Reference Material10分鐘
Lecture Slides - Modular Arithmetic10分鐘
L17: Additional Reference Material10分鐘
Lecture Slides - Multiplicative Inverses10分鐘
L18: Additional Reference Material10分鐘
Lecture Slides - Extended Euclidean Algorithm10分鐘
L19: Additional Reference Material10分鐘
2 個練習
Practice Assessment - Integer Foundation18分鐘
Graded Assessment - Integer Foundation16分鐘
2
完成時間為 3 小時

Modular Exponentiation

4 個視頻 (總計 51 分鐘), 9 個閱讀材料, 2 個測驗
4 個視頻
Euler's Totient Theorem16分鐘
Eulers Totient Function12分鐘
Discrete Logarithms15分鐘
9 個閱讀材料
Lecture Slides - Square-and-Multiply10分鐘
Video - Modular exponentiation made easy10分鐘
L20: Additional Reference Material10分鐘
Lecture Slide - Euler's Totient Theorem10分鐘
L21: Additional Reference Material10分鐘
Lecture Slide - Eulers Totient Function10分鐘
L22: Additional Reference Material10分鐘
Lecture Slide - Discrete Logarithms10分鐘
L23: Additional Reference Material10分鐘
2 個練習
Practice Assessment - Modular Exponentiation12分鐘
Graded Assessment - Modular Exponentiation20分鐘
3
完成時間為 3 小時

Chinese Remainder Theorem

3 個視頻 (總計 25 分鐘), 5 個閱讀材料, 2 個測驗
3 個視頻
Moduli Restrictions, CRT-to-Integer Conversions10分鐘
CRT Capabilities and Limitations8分鐘
5 個閱讀材料
Lecture Slide - CRT Concepts, Integer-to-CRT Conversions30分鐘
L24: Additional Reference Material10分鐘
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分鐘
Lecture Slide - Moduli Restrictions, CRT-to-Integer Conversions30分鐘
Video - How they found the World's Biggest Prime Number - Numberphile12分鐘
2 個練習
Practice Assessment - Chinese Remainder Theorem12分鐘
Graded Assessment - Chinese Remainder Theorem20分鐘
4
完成時間為 3 小時

Primality Testing

3 個視頻 (總計 36 分鐘), 8 個閱讀材料, 3 個測驗
3 個視頻
Fermat's Primality9分鐘
Miller-Rabin13分鐘
8 個閱讀材料
Lecture Slide - Trial Division10分鐘
L27: Additional Reference Material10分鐘
Lecture Slide - Fermat's Primality10分鐘
L28: Additional Reference Material10分鐘
Lecture Slide - Miller-Rabin10分鐘
Video - James Lyne: Cryptography and the power of randomness10分鐘
L29: Additional Reference Material10分鐘
The Science of Encryption10分鐘
3 個練習
Practice Assessment - Primality Testing12分鐘
Graded Assessment - Primality Testing20分鐘
Course Project8分鐘

講師

Avatar

William Bahn

Lecturer
Computer Science
Avatar

Richard White

Assistant Research Professor
Computer Science
Avatar

Sang-Yoon Chang

Assistant Professor
Computer Science

關於 科罗拉多大学系统

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

關於 Introduction to Applied Cryptography 專項課程

Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1.5 million, according to Symantec, the world’s largest security software vendor. According to Forbes, the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020. In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience....
Introduction to Applied Cryptography

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心