After a lot of crypto stuff went here, I was wondering whether an
introducary lecture about [EMAIL PROTECTED] would interest you.

The idea is to talk about:
a) private key encryption - why, who and how (and what do we mean when we
say something was broken)
b) public key encryption - why who and how.
c) a bit on PKI
d) about signatures - what it is, how it is done.
e) cryptographic hash funtions - what is a collision.

if time permits I'll try to cover
f) Secure multi party computation and Private information retrival
g) election schemes
h) electronic cash

Nee's and Ya's?

-- 
Orr Dunkelman,
[EMAIL PROTECTED]

"Any human thing supposed to be complete, must for that reason infallibly
be faulty" -- Herman Melville, Moby Dick.

Spammers: http://vipe.technion.ac.il/~orrd/spam.html
GPG fingerprint: C2D5 C6D6 9A24 9A95 C5B3  2023 6CAB 4A7C B73F D0AA
(This key will never sign Emails, only other PGP keys.)

--------------------------------------------------------------------------
Haifa Linux Club Mailing List (http://www.haifux.org)
To unsub send an empty message to [EMAIL PROTECTED]


Reply via email to