Information and materials to the lecture (sylabus v IS).
Contacts: gruska@fi.muni.cz
Teaching hours: streda 10:00-11:40 D3
Office hours: streda 12-14 J. Gruska B401, utery 10-12 I. Fialik B002
Assignments: Exercises will be posted the day before the lecture at 18.00. Podmienky pre odovzdavanie a hodnotenie cviceni, pre skusku a zapocet
Exams: 4.1.2012 o 12.00 v B410, 11.1.2012 o 12.00 v
B410, 18.1.2012 o 12.00 v B410, 25.1.2012 o 12.00 v B410 a 8.2.2012 o
12.00 v A107, i15.2 o 11.00 v B410
Podakovanie: Sucasnu formu tejto webovskej stranky
vytvoril, pre uzitok vsetkych, Peter Boros, sucasny student IV054
Slides for future lectures accessible bellow and denoted as old are from 2010. Modified and actualized version of the slides will be usualy posted the day before the lecture or after the lecture. It is highly recomended to read/study the Appendix first.
Contents | Contents of the lecture | |||
---|---|---|---|---|
Literature | List of literature | |||
Lecture 1 | Basics of coding | Slides | 2×2 handouts | Exercises |
Lecture 2 | Linear codes | Slides | 2×2 handouts | Exercises |
Lecture 3 | Cyclic codes and channel codes | Slides | 2×2 handouts | Exercises |
Lecture 4 | Secret key cryptography | Slides | 2×2 handouts | Exercises |
Lecture 5 | Public key cryptography – key exchange, knapsack, RSA | Slides | 2×2 handouts | Exercises |
Lecture 6 | Other public-key cryptosystems – pseudorandom generators, hash functions | Slides | 2×2 handouts | Exercises |
Lecture 7 | Digital signatures | Slides | 2×2 handouts | Exercises |
Lecture 8 | Cryptography of eliptic curves, factorization | Slides | 2×2 handouts | Exercises |
Lecture 9 | Authentication, identification, secret sharing and e-business | Slides | 2×2 handouts | Exercises |
Lecture 10 | Coin tossing, Bit commitment, Oblivious transfer, Zero-knowledge proofs and other crypto-protocols | Slides | 2×2 handouts | Exercises (last for 2011) |
Lecture 11 | Steganography and watermarking | Slides | 2×2 handouts | — |
Lecture 12 | From crypto-theory to crypto-practice | Slides | -2×2 handouts | — |
Lecture 13 | Quantum cryptography | Slides | 2×2 handouts | — |
Appendix | Algebra and number theory introduction | Appendix |