Studying at the University of Verona

Here you can find information on the organisational aspects of the Programme, lecture timetables, learning activities and useful contact details for your time at the University, from enrolment to graduation.

Study Plan

Queste informazioni sono destinate esclusivamente agli studenti e alle studentesse già iscritti a questo corso.
Se sei un nuovo studente interessato all'immatricolazione, trovi le informazioni sul percorso di studi alla pagina del corso:

Laurea magistrale in Ingegneria e scienze informatiche - Immatricolazione dal 2025/2026.

The Study Plan includes all modules, teaching and learning activities that each student will need to undertake during their time at the University.
Please select your Study Plan based on your enrollment year.

CURRICULUM TIPO:

1° Year 

2° Year   activated in the A.Y. 2021/2022

ModulesCreditsTAFSSD
Final exam
24
E
-
activated in the A.Y. 2021/2022
ModulesCreditsTAFSSD
Final exam
24
E
-
Modules Credits TAF SSD
Between the years: 1°- 2°
Between the years: 1°- 2°
Between the years: 1°- 2°
English language B2 level
3
F
-
Between the years: 1°- 2°
Between the years: 1°- 2°
Other activities
3
F
-

Legend | Type of training activity (TTA)

TAF (Type of Educational Activity) All courses and activities are classified into different types of educational activities, indicated by a letter.




S Placements in companies, public or private institutions and professional associations

Teaching code

4S02797

Coordinator

Roberto Segala

Credits

6

Language

Italian

Scientific Disciplinary Sector (SSD)

INF/01 - INFORMATICS

Period

I semestre dal Oct 1, 2020 al Jan 29, 2021.

Learning outcomes

The course aims to provide the basic skills related to computational tools for data encryption, the use of such tools for the management of secure communications, and the problems associated with the implementation of cryptographic primitives. At the end of the course the student will have to demonstrate to know and understand the structure of the main algorithms and cryptographic protocols and the definitional aspects of the problems together with the formal tools for their analysis. This will allow the student to choose autonomously the most appropriate algorithms for the various situations and to understand the existing literature, and consequently to learn independently new proposals in cryptographic field.

Program

Symmetric key cryptography (DES, AES), CBC, public key cryptography (Diffie-Hellman, RSA, BBS, El Gamal), provable security and provably secure cryptosystems, one-way trapdoor functions, pseudo-random bit and function generators, digital signatures (RSA), collision-free hash functions (MD5, SHA1), bit commitment, verifiable secret sharing, Zero-Knowledge, message authentication, agent authentication.

Reference texts
Author Title Publishing house Year ISBN Notes
J. Katz, Y. Lindell Introduction to Modern Cryptography (Edizione 2) CRC Press 2015 978-1-4665-7026-9

Examination Methods

The exam is an oral colloquium on the topics of the program.

The evaluation scale is the following. 18-28 (pure notionistic knowledge), 22-24 (acceptable understanding of the arguments), 25-27 (ability to apply the concepts learned in the course), 28-30 (ability to elaborate autonomous ideas based on the concepts learned in the course).

Students with disabilities or specific learning disorders (SLD), who intend to request the adaptation of the exam, must follow the instructions given HERE