TMA4160 Cryptography - autumn 2010
We use Cryptography, Theory and Practice, 3. edition, by Douglas R. Stinson. Certain supplemental material can be found in Handbook of applied cryptography (HAC) by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.
17-18/11: We worked our way through a series of election schemes, starting with a very simple example and working towards a more sophisticated example by formulating attacks and devising countermeasures to the attacks. Along the way, we discussed security requirements for elections in some detail.