Cristina Onete
Symmetric Key Crypto
Lectures (CM)- Lecture: Hash Functions
- Lecture: MAC
- Lecture: Authentication protocols
- Lecture: Key-Exchange protocols
- Exercises: Hash Functions
- Exercises: MAC algorithms
- Exercises: Authentication protocols
- Exercises: Key-Exchange
Option : Basics of Provable Security
CM TDR2.01 Object-oriented Development
Lectures (CM)- Lecture : Basic Java Syntax
- Lecture : Inheritance
- Lecture : Interfaces and Collections
- Lecture : Exceptions and Input/Output Streams
Ressources R2.04 et R2.05
CahiersR2.04 Low-level networks
Lectures (CM) Exercises (TD) Labs (TP)R2.05 Network services
Lectures (CM) Exercises (TD) Labs (TP)Reseaux 2 (niveau L3)
CM TDCopyright © 2012–2018 — Cristina Onete