We describe public key cryptosystems and analyse the RSA cryptosystem, pointing out a weakness (already known) of the RSA system. We define Lucas functions and derive some of thei...
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.