This lecture will address Asymmetric Cryptography and its use to both secure and authenticate communications.
Download here
Mandatory Reading
One of:
- Segurança em Redes Informáticas, A. Zúquete, Chap. 2
- Ross Anderson, Security engineering, Third Edition Chapter 5.
- Security in Computing, 6th edition, Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp, Chap. 2.3