aut aut      aut aut
   
Babak Sadeghiyan
  Courses 

 Applied Cryptography(FALL_2017)

Aims:

This course is to present the concepts of Modern Cryptography from a Provable Security point of view .

Syllabus:

  • Introduction: Overview of course, crypto history
  • Security Models: Perfect secrecy and its limitations, Computational model, computational security, Computational indistinguishability,
  • Primitives: pseudorandom generators, CPA security, Pseudorandom functions, Pseudorandom permutations, block-ciphers, AES, The authentication problem, CCA security, Message authentication codes, One way permutations and pseudorandom generators, Goldreich-Levin Theorem, One way permutations, pseudorandom generators, commitment schemes
  • Data Secrecy and Integrity Functions: Some basic number theory, Public key cryptography and Rabin encryption, Signature schemes, CCA security for public key encryption
  • New Topics: Zero-knowledge proofs, Forward security, identity-based encryption, Secret sharing, visual cryptography, threshold signatures, Oblivious transfer, Private information retrieval, Secure 2-party and multiparty computation, Electronic voting, Cramer-Shoup Cryptosystem, Quantum computing and cryptography

Text Book:

  • Introduction to Modern Cryptography, by Jonathan Katz (University of Maryland, USA) and Yehuda Lindell (Bar-llan University, Israel) , CRC Press
  • Foundation of Cryptography (Volume II) : Basic Application, by Oded Goldreich (Weizmann Institute of Science, Israel), Cambridge University Press,


 Data Communications(FALL_2017)

Aims:

The pupose of this course is to study the concepts and technologies of Physical layer and Data Link layer of computer networks.

Syllabus:

  • 1- Introduction to Layered model
  • 2- Digital Transmissions Fundamentals
  • 3- Error Detection and Correction Methods
  • 4- Data Link Layer
  • 5- Medium Access Control Protocols
  • 6- LAN protocols

Text Book:

  • 1- Communication Networks, Fundamental Concepts and Key Architecture, by Leon-Garcia and Widjaja, MacGraw Hill publishig Company
  • Data and Computer Communication, by William Stallings


 Seminar(FALL_2017)

Aims:

to introduce students with scientific methodology and MS seminar and how to do the definition of their MS final projects

Syllabus:

  • Research Methodolgy
  • progress report
  • Final Presentations

Text Book:




 Computer Networks (I)(SPRING_2017)

Aims:

The aim of this course is to study the principles of Computer Networks.

Syllabus:

  • A review of network services
  • 2- Internet and its components
  • 3- Layered Architecture of Computer Networks
  • 4- Application Layer
  • 5- Transport Layer
  • 6- Network Layer
  • 7- Data link Layer

Text Book:

  • 1. James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach, 5/e, Addison-Wesley, 2009.


 Security Protocols(SPRING_2017)

Aims:

Syllabus:

  • Elementary Security Protocols
  • Advanced Security Protocols

Text Book:




 Applied Cryptography(FALL_2016)

Aims:

The aim of this course is the study of the functions used for the protection of information and providing services such as confidentiality and authentication

Syllabus:

    Text Book:




     Seminar(FALL_2016)

    Aims:

    to introduce students with scientific methodology and MS seminar and how to do the definition of their MS final projects

    Syllabus:

      Text Book:




       
       
      © AUT All rights reserved.
      AUT is not responsible for the content of external sites.
       
      424 Hafez Ave, Tehran, Iran, 15875-4413. +98 (21) 64540