COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
This cryptography courses consists of the lectures "Public Key Cryptography" and "Cryptography for Security" as well as a practice session. Public Key Cryptography examines common methods in asymmetric encryption, as well as possible attacks in faulty implementation of these methods. Topics include RSA (including signatures), attacks on small public exponent, Wiener attack, primality tests and factorization, El-Gamal, Diffie-Hellman-Key-Exchange, elliptic curves, attacks on the discrete logarithm, and selected methods of Post-Quantum-Cryptography. Cryptography for Security discusses fundamental concepts of encryption as well as their construction and their connections, classical cryptographic problems and how to solve them, formal notions of security, One-Way-Functions, (Pseudo-)Random-Number-Generators, and Pseudo-Random-Functions. Practice sessions alternate between two formats that are both primarily focused on attacks learned in class. In the first, students read encryption code and write a corresponding decryption algorithm. In the second, students prove theorems/attacks' effectiveness and make calculations by hand, often involving topics in ring theory, field theory, and group theory.
COURSE DETAIL
The course begins with the basics of derived categories including semi-orthogonal decompositions and Fourier-Mukai transforms. The course then discusses some recent developments related to derived categories of coherent sheaves, such as homological projective duality, stability conditions, noncommutative crepant resolutions, or derived categories and GIT.
COURSE DETAIL
COURSE DETAIL
COURSE DETAIL
The course introduces the characteristics and properties of signals and systems and provide fundamental tools for their analysis and representation.
COURSE DETAIL
COURSE DETAIL
Pagination
- Previous page
- Page 36
- Next page