
| 1 |
2 |
3 |
4 |
5 |
6 |
7 |
| Lecture 1 Introduction |
Lecture 4 Complexity theory |
Lecture 7 Prime numbers |
Lecture 10 The group U_{n} |
Lecture 13 The theorems of Fermat, Wilson and Euler's |
Lecture 16 Pollard rho heuristic OMITTED IN 2010 |
|
| Lecture 2 Codes |
Lecture 5 Euclid's algorithm |
Lecture 8 Factorizing numbers |
Lecture 11 The Euler phi function |
Lecture 14 Primitive element theorem |
Lecture 17 Crypto Caesar and Vigenere ciphers |
Lecture 20 DES and AES |
| Lecture 3 Algorithms |
Lecture 6 Lame's theorem |
Lecture 9 Group theory |
Lecture 12 Chinese remainder theorem |
Lecture 15 Testing for primes OMITTED IN 2010 |
Lecture 18 Hill ciphers affine block ciphers |
Lecture 21 Diffie-Hellman RSA |
| 8
and 9 |
| Lecture 1: motivation Lecture 2: key definitions Lecture 3: encoding and decoding with linear codes Lecture 4: Hamming codes and beyond |
| Codes The Kraft-McMillan number Sources and entropy Huffman codes Notes
|
| Exercises 1 | Exercises
2 |
Exercises
3 |
Exercises
4 |
Exercises
5 OMITTED IN 2010 |
Exercises
6 Homework |
Exercises 7 |
| Solutions
1 Lectures 1,2 |
Solutions
2 Lectures 3,4 |
Solutions
3 part 1 Solutions 3 part 2 Lectures 5--8 |
Solutions
4 Lectures 9--14 |
Solutions
5 Lectures 15,16 |
Solutions
6 Lectures 18--21 |
Solutions
7 Lectures 22--30 |