Information and materials to the lecture (sylabus v IS).
Contacts: gruska@fi.muni.cz
Teaching hours: streda 10:00-11:40 D2
Office hours: streda 12-14 J. Gruska B401, utery
16-18 M. Pivoluska G402
Assignments: Exercises will be posted the day before the lecture at 18.00. Podmienky pre odovzdavanie a hodnotenie cviceni, pre skusku a zapocet
Exams: 19.12.2013 o 8.o0 v C525., 8.1.2013 o 8.00 v
B410, 15.1.2013 o 8.00 v B410, 23.1.2013 o 8.00 v B410 a 29.1.2013 o
12.00 v B410
Podakovanie: Sucasnu formu tejto webovskej stranky
vytvoril, pre uzitok vsetkych, Peter Boros, byvaly student IV054
Slides for future lectures accessible bellow and denoted as old are from 2010. Modified and actualized version of the slides will be usualy posted the day before the lecture or after the lecture. It is highly recomended to read/study the Appendix first.
Contents | Contents of the lecture | ||||
---|---|---|---|---|---|
Literature | List of literature | ||||
Lecture 1 | Basics of coding - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 2 | Linear codes- new | Slides | 2×2 handouts | Exercises - new | |
Lecture 3 | Cyclic codes and channel codes - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 4 | Secret key cryptography- new | Slides | 2×2 handouts | Exercises - new | |
Lecture 5 | Public key cryptography – key exchange, knapsack, RSA - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 6 | Other public-key cryptosystems and basic cryptographic primitives - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 7 | Digital signatures - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 8 | Cryptography of eliptic curves and actorization-new | Slides | 2×2 handouts | Exercises - new | |
Lecture 9 | Authentication, identification, secret sharing and e-busines - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 10 | Protocols doing seemingly impossible - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 11 | Steganography and watermarking - new | Slides | 2×2 handouts | Exercises - new, LAST ONE | — |
Lecture 12 | From crypto-theory to crypto-practice - new | Slides | -2×2 handouts | — | |
Lecture 13 | Quantum cryptography - new | Slides | 2×2 handouts | — | |
Lecture 14 | Cryptographic machines and history | Slides | 2×2 handouts | — | |
Appendix | Algebra and number theory introduction | Appendix |