CS 6373 Applied Cryptogaphy (Fall 2008)

This course consists of two parts: the first part is about the basics of cryptography (about 3-4 weeks), and the second part is about topics (the rest of the semester). The focus of topics is: Understanding and Combating Threats of Software Vulnerabilities Against Cryptographic Keys and Services in Real-World Computing Systems. This is exciting because it has the potential to help bridge the gap between Theoretic Cryptography and Practical Cryptography. The students are encouraged to conduct research on interesting, useful, challenging projects.

There is no required textbook for this course. The instructor will provide the needed materials.

Detailed information will become available at http://webct.utsa.edu.