Information and materials to the lecture (sylabus v IS).
ASSIGNMENTS: Exercises will be posted the day before the lecture at 18.00. Podmienky pre odovzdavanie a hodnotenie cviceni, pre skusku a zapocetThe goal of the tutorial/seminar will be to make more clear topics of the lecture as well as some of its (especially mathematical) requirements.
One of the tutorials will be in Czech/Slovak with mgr. Matej Pivoluska. Tutorial is on Thursday at 16.00 in C525
Second tutorial will be in English with Dr. Shenggen Zheng. Tutorial is on Wendesday at 18.00 in A218
Appendix: It is recomended for all to read first the
Appendix for a review of some basic facts from algebra and discrete
mathematics, especially for those who do not feel very good in these
areas
Contacts: gruska@fi.muni.cz
Teaching hours: streda 10:00-11:40, 2014, D2
Office hours: Wendesday13-14 J. Gruska B402, Tuesday 16-18
M. Pivoluska C516, pondelok 14.00-16.00 alebo dohodou emailom,
Shenggen Zheng: Monday, Tuesday, Thursday, Friday, 9.00-17.00, C 518
Exams: 18.12.2014 - 8.00 C511; 7.1.2015 - 13.00 B410;
14.1.2015 - 13.00 B410; 21.1.2015 - 8.00 B410; 28.1.2015 - 13.00 B410
Podakovanie: Sucasnu formu tejto webovskej stranky vytvoril, pre uzitok vsetkych, Peter Boros, byvaly student IV054
Slides for future lectures accessible bellow and denoted as old are from 2010. Modified and actualized version of the slides will be usualy posted the day before the lecture or after the lecture. It is highly recomended to read/study the Appendix first.
Contents | Contents of the lecture | ||||
---|---|---|---|---|---|
Literature | List of literature | ||||
Lecture 1 | Basics of coding - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 2 | Linear codes- new | Slides | 2×2 handouts | Exercises - new | |
Lecture 3 | Cyclic codes and channel codes - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 4 | Secret key cryptography- new | Slides | 2×2 handouts | Exercises - new | |
Lecture 5 | Public key cryptography – key exchange, knapsack, RSA - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 6 | Other public-key cryptosystems and basic cryptographic primitives - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 7 | Digital signatures - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 8 | Cryptography of eliptic curves and actorization-new | Slides | 2×2 handouts | Exercises - new | |
Lecture 9 | Authentication, identification, secret sharing and e-busines - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 10 | Protocols doing seemingly impossible - new | Slides | 2×2 handouts | Exercises - new | |
Lecture 11 | Steganography and watermarking - new | Slides | 2×2 handouts | Exercises - new, LAST ONE | — |
Lecture 12 | From crypto-theory to crypto-practice - new | Slides | -2×2 handouts | — | |
Lecture 13 | Quantum cryptography - new | Slides | 2×2 handouts | — | |
Lecture 14 | Cryptographic machines and history - new | Slides | 2×2 handouts | — | |
Appendix | Algebra and number theory introduction | Appendix |