L. Moysis, D. Butusov, A. Tutueva, V. Ostrovskii, Ioannis S. Kafetzis, C. Volos
{"title":"Introducing Chaos and Chaos Based Encryption Applications to University Students - Case Report of a Seminar","authors":"L. Moysis, D. Butusov, A. Tutueva, V. Ostrovskii, Ioannis S. Kafetzis, C. Volos","doi":"10.1109/mocast54814.2022.9837538","DOIUrl":null,"url":null,"abstract":"During the fall semester of 2021-2022 academic year, a seminar series on ’Chaotic Cryptography’ was delivered at the Department of Computer Aided Design (CAD), St. Petersburg Electrotechnical University ’LETI’, Russia. The seminar aimed at introducing students to state of the art research topics that connect chaos theory to various applications relating to encryption and security. This work constitutes a case report on this seminar. First, the seminar syllabus is presented. Then, future goals are discussed for annual reruns of the seminar.","PeriodicalId":122414,"journal":{"name":"2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 11th International Conference on Modern Circuits and Systems Technologies (MOCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/mocast54814.2022.9837538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
During the fall semester of 2021-2022 academic year, a seminar series on ’Chaotic Cryptography’ was delivered at the Department of Computer Aided Design (CAD), St. Petersburg Electrotechnical University ’LETI’, Russia. The seminar aimed at introducing students to state of the art research topics that connect chaos theory to various applications relating to encryption and security. This work constitutes a case report on this seminar. First, the seminar syllabus is presented. Then, future goals are discussed for annual reruns of the seminar.