{"version":"1.0","provider_name":"EE IIT Bombay","provider_url":"https:\/\/www.ee.iitb.ac.in\/web","author_name":"master_admin","author_url":"https:\/\/www.ee.iitb.ac.in\/web\/author\/master_admin\/","title":"EE 793 - Topics in Cryptology &ndash; EE IIT Bombay","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Ml4Fvj6jos\"><a href=\"https:\/\/www.ee.iitb.ac.in\/web\/course_lists\/ee-793-topics-in-cryptology\/\">EE 793 &#8211; Topics in Cryptology<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ee.iitb.ac.in\/web\/course_lists\/ee-793-topics-in-cryptology\/embed\/#?secret=Ml4Fvj6jos\" width=\"600\" height=\"338\" title=\"&#8220;EE 793 &#8211; Topics in Cryptology&#8221; &#8212; EE IIT Bombay\" data-secret=\"Ml4Fvj6jos\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Classical ciphers and their modern versions. Cryptanalysis of classical ciphers. Shannon\u2019s theorem and perfect secrecy. Trapdoor one way functions for encryption, message authentication, public key encryption schemes, key exchange and signatures. Various applications to problems in practical world. Ideal secrecy and its application. Security of one-way-ness of functions. Pseudorandom sequences. Generation, testing and applications. Structures &hellip;  Read More &raquo;"}