COURSE DETAIL
The course explores gaming and virtual and augmented reality. The course discusses topics including what are extended, augmented, virtual, and mixed reality; what tools are used to develop MR applications and how can they be set up; practical deployment of an app on students' devices; introduction to programming for extended reality with Unity (scene setup, interactions); what is User Experience (UX), what is UX design; UX Design and important influencing factors (human/context/system); what is user testing, why is it needed, and what method can be used for testing; and how to perform a usability test and use the gathered result during the development. Students engage in creating use case design, scenarios, prototyping, and developing an app. Students perform a user test and analyze/incorporate the results into a next app version. The course recommends students have programming knowledge and the ability to write and run small programs in the language of their choice (e.g., C#), and basic understanding of mobile builds (Xcode / ADB), as a prerequisite.
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
This cryptography courses consists of the lectures "Public Key Cryptography" and "Cryptography for Security" as well as a practice session. Public Key Cryptography examines common methods in asymmetric encryption, as well as possible attacks in faulty implementation of these methods. Topics include RSA (including signatures), attacks on small public exponent, Wiener attack, primality tests and factorization, El-Gamal, Diffie-Hellman-Key-Exchange, elliptic curves, attacks on the discrete logarithm, and selected methods of Post-Quantum-Cryptography. Cryptography for Security discusses fundamental concepts of encryption as well as their construction and their connections, classical cryptographic problems and how to solve them, formal notions of security, One-Way-Functions, (Pseudo-)Random-Number-Generators, and Pseudo-Random-Functions. Practice sessions alternate between two formats that are both primarily focused on attacks learned in class. In the first, students read encryption code and write a corresponding decryption algorithm. In the second, students prove theorems/attacks' effectiveness and make calculations by hand, often involving topics in ring theory, field theory, and group theory.
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
Pagination
- Previous page
- Page 78
- Next page