Save for later

Mathematical Foundations for Cryptography

Introduction to Applied Cryptography,

Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4. These topics should prove especially useful to you if you are new to cybersecurity. It is recommended that you have a basic knowledge of computer science and basic math skills such as algebra and probability.
Get Details and Enroll Now

OpenCourser is an affiliate partner of Coursera and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating 4.2 based on 11 ratings
Length 5 weeks
Effort This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week.
Starts Jun 26 (43 weeks ago)
Cost $79
From University of Colorado System via Coursera
Instructors William Bahn, Richard White, Sang-Yoon Chang
Download Videos On all desktop and mobile devices
Language English
Subjects Programming IT & Networking
Tags Computer Science Algorithms Computer Security And Networks

Get a Reminder

Send to:

Similar Courses

What people are saying

excelente curso fundamentos matemáticos

This course told me what to learn and related it to crypto but I had to go to youtube to actually learn the math Excelente curso Fundamentos Matemáticos para Criptología, ayuda a comprender y trabajar los algoritmos.

introduction assez complète aux

Introduction assez complète aux mathématiques nécessaires à la cryptologie, avec des exemples précis en fin de cours autour de l'algorithme RSA.

avec des exemples précis

comprender y trabajar los

mathématiques nécessaires à la

people who might take

These are minor issues, probably specific to the session I was in, but in combination are why I'm rating this four stars instead of five.It is hard for me to assess how accessible this course is for most of the people who might take it.

cours autour de l'algorithme

chinese remainder theorem

For example, I've tried to teach myself about the the Chinese Remainder Theorem and its use through my own self-study, but never really grokked it until this course.

matemáticos para criptología

assess how accessible

distributed at powerpoint

There were some errors in the early problem sets, the course slides are distributed at powerpoint only (and not PDF), and during my session there was virtually no interaction with staff or fellow students on the forums.

for example

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Applied Behavior Analyst $40k

Applied Behavior Analysis Teacher $41k

Research Administrator, Applied & Engineering Physics, Biomedical Engineering Lead $49k

Assistant Research Associate for Mercyhurst Center for Applied Politics $61k

Applied Dispatcher $64k

Sales Support Specialist, Applied Science Consultant $73k

Applied Mathematician - Electromagnetics $80k

Data Scientist/Statistics - Applied Technology $83k

Applied Mechanics Group Leader $86k

Xbox Data and Applied Scientis $107k

Applied Scientist, Social Advertising $137k

Applied Scientist - Amazon Global Selling $141k

Write a review

Your opinion matters. Tell us what you think.

Rating 4.2 based on 11 ratings
Length 5 weeks
Effort This is Course 2 in a 4-course specialization. Estimated workload: 15-hours per week.
Starts Jun 26 (43 weeks ago)
Cost $79
From University of Colorado System via Coursera
Instructors William Bahn, Richard White, Sang-Yoon Chang
Download Videos On all desktop and mobile devices
Language English
Subjects Programming IT & Networking
Tags Computer Science Algorithms Computer Security And Networks

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now