INTRODUCTION TO CRYPTOGRAPHY COURSE
Welcome to the Introduction to Cryptography course.
This Course is designed to explore Cryptography as a potential specialization in IT career.
These course materials will assist you in developing the skills necessary to do the following:
- Classical and modern cryptographic algorithms.
- Cryptographic algorithms with symmetric and asymmetric key.
- Cyber attacks and how are they made on this algorithms based on cryptoanalysis.
To attend this training please fill this Google Form – https://forms.gle/TBfq8ftGus4B1DCn6
The lecturer on this course will be Prof. Dr. Artan Luma.
Artan Luma was born on 23.02.1979, in Tetovo, Macedonia. He finished his primary and secondary school in Tetovo, Macedonia. Graduated in 2002 his bachelor studies in Computer Sciences at State University of Tetovo in Tetovo, Macedonia. Graduated his master studies in 2007 at State University of Prishtina in Prishtina, Kosovo, with the master thesis entitled “Possibilities for Creation of a Hypermedial Software for Interactive Learning”. He enrolled doctoral studies in September 2007 at South East European University in Tetovo, Macedonia. He gained his doctoral degree in Computer Science with the thesis entitled “Algorithms of Several Mathematical Models and their Implementation in Cryptosystems” in May 2010.
Participation in scientific and professional meetings and conferences, has published 17 journal articles and 45 papers in international conferences. His work is cited in over 71 papers published in international journals and conferences during the last five years, including several citations in highly ranked impact factor journals.
Publications in journals are published in International Peer-Reviewed Journals, most of them indexed in Clarivate Analytics – Emerging Sources Index, EBSCOHost and/or Scopus.
Publications in conferences are published in conference proceedings, a significant number of them published by IEEE or ACM as well as specific topicx-related International conferences. The publications are in fields of Computer System Security, Computer Security, Information Security, Information Systems Security, Cloud Security, Security, Cryptography, Algorithm and Education.