diff options
author | Reto <reto.fritsche@ost.ch> | 2021-04-24 14:11:30 +0200 |
---|---|---|
committer | Reto <reto.fritsche@ost.ch> | 2021-04-24 14:11:30 +0200 |
commit | d1a34332748bad563209adafbf3a32f3b6ed8f87 (patch) | |
tree | f4a6e7c4b71500aa588cf626d19439729a38824a /vorlesungen/07_msecrypto/slides.tex | |
parent | added simple code example of mceliece cryptosystem (diff) | |
parent | add title slides for presentations (diff) | |
download | SeminarMatrizen-d1a34332748bad563209adafbf3a32f3b6ed8f87.tar.gz SeminarMatrizen-d1a34332748bad563209adafbf3a32f3b6ed8f87.zip |
Merge remote-tracking branch 'upstream/master' into mceliece
Diffstat (limited to 'vorlesungen/07_msecrypto/slides.tex')
-rw-r--r-- | vorlesungen/07_msecrypto/slides.tex | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/vorlesungen/07_msecrypto/slides.tex b/vorlesungen/07_msecrypto/slides.tex new file mode 100644 index 0000000..cb0c548 --- /dev/null +++ b/vorlesungen/07_msecrypto/slides.tex @@ -0,0 +1,43 @@ +% +% slides.tex -- Präsentation zur Kryptographie +% +% (c) 2017 Prof Dr Andreas Müller, Hochschule Rapperswil +% +\section{Diffie-Hellmann} +\folie{4/dh.tex} + +\section{Divide and Conquer} +% Potenzieren +\folie{a/dc/prinzip.tex} +% effiziente Durchführung +\folie{a/dc/effizient.tex} +% Beispieldurchführung +\folie{a/dc/beispiel.tex} + +\section{Elliptische Kurven} +% Idee +\folie{a/ecc/gruppendh.tex} +% Was ist eine elliptische Kurve (char 0 Bild) +\folie{a/ecc/kurve.tex} +% Involution/Inverse +\folie{a/ecc/inverse.tex} +% Verknüpfung +\folie{a/ecc/operation.tex} +% Quadrieren +\folie{a/ecc/quadrieren.tex} +% Oakley Gruppe +\ifthenelse{\boolean{presentation}}{ +\folie{a/ecc/oakley.tex} +}{} + +\section{AES} +% Byte-Operationen +\folie{a/aes/bytes.tex} +\folie{a/aes/sinverse.tex} +% Block-Operationen +\folie{a/aes/blocks.tex} +% Key-Schedule +\folie{a/aes/keys.tex} +% Zusammensetzung +\folie{a/aes/runden.tex} + |