CS 6373 Applied Cryptogaphy (Fall
This course consists of two parts: the first part is about the basics
of cryptography (about 3-4 weeks), and the second part is about topics
(the rest of the semester). The focus of topics is: Understanding and
Combating Threats of Software Vulnerabilities Against Cryptographic
Keys and Services in Real-World Computing Systems. This is exciting
because it has the potential to help bridge the gap between Theoretic
Cryptography and Practical Cryptography. The students are encouraged to
conduct research on interesting, useful, challenging projects.
There is no required textbook for this course. The instructor will
provide the needed materials.
Detailed information will become available at http://webct.utsa.edu.