CryptoCode - Training

 Home 
 Technology 
 Training 
 Publications 
 Founder 


CryptoCode provides on-site and off-site training programs, short courses, lectures, and seminars in theoretical and applied cryptography, hardware security, and cryptographic engineering. You select the schedules and titles of these courses at your convenience, and we will deliver them in your choice of method or the place.

The purpose of these courses is to introduce and cover in detail the fundamental issues pertaining to applied cryptography. These seminars cover in detail fundamentals aspects of cryptographic algorithms and protocols, theoretical security of cryptographic algorithms, cryptanalysis, hardware and embedded software realizations of cryptography, side-channel attacks and countermeasures.

As businesses migrate from classical public-key cryptography to post-quantum cryptography, CryptoCode will fill the knowledge gap by training the technicians, engineers and managers on all aspects of PQC deployment.

Some of our lectures and seminars are

  1. Number Theory in Cryptography
  2. Groups, Rings and Fields in Cryptography
  3. Fundamentals of Cryptanalysis
  4. Factorization and Primality Testing
  5. Discrete Logarithm Problem
  6. Discrete Square Root Algorithms

  7. Public Key Cryptography
  8. RSA and Rabin Algorithms
  9. RSA Signatures
  10. ElGamal and DSA Algorithms
  11. Elliptic Curve Cryptography
  12. Public Key Cryptography Standards
  13. Post-Quantum Cryptography
  14. Algorithms and Standards of PQC
  15. Partially Homomorphic Encryption
  16. Fully Homomorphic Encryption

  17. Computer Arithmetic for Cryptography
  18. Implementing Finite Field Arithmetic
  19. SW/HW Realization of PKC
  20. Basics of Side-Channel Attacks
  21. Micro Architectural Attacks
  22. Side-Channel Countermeasures

  23. Random Number Generators
  24. Pseudo and True RNGs
  25. Evaluating and Designing RNGs
  26. Stream Cipher Fundamentals
  27. LCG, LFSR and CA based Stream Ciphers

  28. AES Algorithm and its SW/HW Implementations
  29. Hash Functions and their SW/HW Implementations

CryptoCode © Names, symbols, and images are copyrighted.