course-details-portlet

IIK8100

Selected Topics in Cryptology

Choose study year

New from the academic year 2024/2025

Credits 7.5
Level Doctoral degree level
Language of instruction English
Location Gjøvik and Trondheim

About

About the course

Course content

The course is taught every year and every semester based on demand, both in Trondheim and in Gjøvik. Interested students can contact the course coordinator to coordinate when the course is offered.

The contents of the course may vary. Common topics include advanced elements of information theory and the theory, design, and analysis of symmetric and asymmetric cryptography.

Learning outcome

A. Knowledge: The candidate possesses advanced knowledge on the frontier in the field of cryptology, master academic theory and scientific methods in cryptology, can consider suitability and use of different methods and processes in research in the field of cryptology, can contribute to development of new knowledge, theories, methods, interpretations and forms of documentation in cryptology.

B. Skills: The candidate is capable of formulating problems, planning and completing research projects in cryptology, can perform research and development at a high international level, can handle complex academic tasks, challenge established knowledge and practice in cryptology.

C. General competence: The candidate is capable of identifying relevant - and possibly new - ethical problems and exercising research in cryptology with academic integrity, can manage complex interdisciplinary tasks and projects, can disseminate the results of research and development in cryptology through approved national and international publication channels, is capable of taking part in debates in international forums within the field of cryptology, can consider the need for, take initiative to and engage in innovation in the field of cryptology.

Learning methods and activities

The course is a self-study course. Regular meetings with the candidate(s) are organised where various topics from the field of cryptology are discussed, and guidance for the project is offered. If sufficient students take the course simultaneously, structured lectures can be organised. For example, the form of lecturing may vary as a seminar on key topics.

Further on evaluation

Oral presentation of the project and an oral exam.

Course materials

To be announced at the beginning of the course.

Credit reductions

Course code Reduction From
IMT6041 5 sp Autumn 2024
This course has academic overlap with the course in the table above. If you take overlapping courses, you will receive a credit reduction in the course where you have the lowest grade. If the grades are the same, the reduction will be applied to the course completed most recently.

Subject areas

  • Information Security

Contact information

Department with academic responsibility

Department of Information Security and Communication Technology