Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
cy201_schedule [2020/10/30 08:53] – lenshand | cy201_schedule [2022/10/03 10:34] (current) – martin | ||
---|---|---|---|
Line 2: | Line 2: | ||
^Week^Date^Day^Topic^ | ^Week^Date^Day^Topic^ | ||
- | |1| |Monday|Module introduction| | + | |1| |Monday|Module introduction. {{ : |
- | | | | |Sets, relations and functions| | + | | | | |Sets, relations and functions. {{ : |
- | | | |Tuesday| | | + | | | |Tuesday|Graphs and trees | |
+ | | | | |automata | | ||
+ | | | |Wednesday|Computability and complexity | | ||
+ | | | | |Main cryptographic techniques | | ||
+ | | | |Thursday|Concepts of authentication, | ||
+ | | | | |Symmetric | | ||
+ | | | |Friday|Public key. Issue Assignment 1 | | ||
| | | | | | | | | | | | ||
- | | | |Wednesday| | | + | |2| |Monday|Secure hash {{ : |
- | | | | | | | + | | | | |Digital signing, certificate authorities |
- | | | | | | | + | | | |Tuesday|Block ciphers |
- | | | |Thursday| | | + | | | |Wednesday|How cryptographic techniques are applied and to what end and their limitations |
- | | | | | | | + | | | |Thursday|Examples of badly applied or implemented cryptographic techniques |
- | | | |Friday| | | + | |
- | | | | | | | + | |
- | | |||| | + | |
- | |2| |Monday| | + | |
- | | | |Tuesday| | | + | |
- | | | |Wednesday| | | + | |
- | | | |Thursday| | | + | |
| | | | | | | | | | | | ||
| | |Friday| | | | | |Friday| | | ||
- | | | | |Issue assignment 1| | + | | | | || |
| |||| | | |||| | ||
|3| |Monday| | | |3| |Monday| | |