PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2024
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
In-person direct teaching
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 24. 9. to Tue 17. 12. Tue 16:00–17:50 A318
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 29 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2025
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
In-person direct teaching
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Marek Sýs, Ph.D. (seminar tutor)
Lukasz Michal Chmielewski, PhD (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 29 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
The course is taught each semester.
The course is taught: every week.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2024
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Marek Sýs, Ph.D. (seminar tutor)
Lukasz Michal Chmielewski, PhD (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 C511, L. Chmielewski, V. Matyáš, P. Švenda
PA168/02: Mon 12:00–13:50 B411, L. Chmielewski, V. Matyáš, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 48 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2023
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
Lukasz Michal Chmielewski, PhD (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B411
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 53 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2023
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Marek Sýs, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 14. 2. to Tue 16. 5. Tue 16:00–17:50 A218, V. Matyáš, M. Sýs, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 48 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2022
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B411
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study - exceptions are approved only in case of Erasmus exchanges or research stay abroad during the last semester of studies.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 53 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions may also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2022
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Mgr. Marek Sýs, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 15. 2. to Tue 17. 5. Tue 16:00–17:50 C511
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 48 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2021
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 14. 9. to Tue 7. 12. Tue 16:00–17:50 B410
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 52 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2021
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 B411, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 48 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2020
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 C525
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 52 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2020
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Mon 17. 2. to Fri 15. 5. Tue 16:00–17:50 C525, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 48 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2019
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 A218
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 52 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2019
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 19. 2. to Tue 14. 5. Tue 16:00–17:50 C416, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2018
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 A218
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2018
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 B411, V. Matyáš, J. Staudek, P. Švenda
PA168/02: Mon 8:00–9:50 C525, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2017
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B411
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
To teach the students to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Learning outcomes
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2017
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 A218, V. Matyáš, J. Staudek, P. Švenda
PA168/02: Tue 8:00–9:50 C525, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2016
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 B410, V. Matyáš, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2016
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 C416, V. Matyáš, Z. Říha, J. Staudek, P. Švenda
PA168/02: Tue 10:00–11:50 B411, V. Matyáš, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2015
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 A218, V. Matyáš, Z. Říha, J. Staudek, P. Švenda
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last semester of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, on a recent top-level conference paper and on recent developments in the field. Participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2015
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 C416
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last year (better even semester) of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 18 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2014
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 A218, V. Matyáš, J. Staudek, P. Švenda
PA168/02: Mon 10:00–11:50 B411, V. Matyáš, Z. Říha, J. Staudek
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course. It is strongly suggested that Master students register this course in the last year (better even semester) of their study.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 22 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Follow-Up Courses
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2014
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 G126
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 18 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2013
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (seminar tutor)
doc. RNDr. Petr Švenda, Ph.D. (seminar tutor)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable of Seminar Groups
PA168/01: Tue 16:00–17:50 G330, V. Matyáš
PA168/02: Wed 12:00–13:50 B411, V. Matyáš
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 22 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2013
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. RNDr. Vlastislav Dohnal, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B411
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2012
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 G126
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 26 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2012
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B410
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 23 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2011
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 16:00–17:50 B204
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 26 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2011
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B410
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 22 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
  • http://www.schneier.com/crypto-gram.html
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2010
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B411
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 25 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2010
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 22 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www2.computer.org/portal/web/csdl
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2009
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B011
Prerequisites
SOUHLAS
Intermediate knowledge of IT security principles, cryptography principles. Explicit approval of the seminar supervisor must be requested in order to register this course.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 25 fields of study the course is directly associated with, display
Course objectives
Graduates of this course shall be able to:
analyze security problems and solutions with a critical mind;
review and interpret a security solution or analysis presented in an advanced technical paper from a world-class conference;
evaluate IT system security and relevant functional and ethical requirements and demands;
reflect the above in their proposal for security of IT systems;
create slides and present their own research project;
prepare and present their view of most important developments in the area of security and cryptography during the past 1-2 weeks.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www.schneier.com/crypto-gram.html
  • http://www2.computer.org/portal/web/csdl
  • http://portal.acm.org/dl.cfm
Teaching methods
presentation of own research and of a reviewed paper, followed by a discussion with the seminar leader and other students and lecturers
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2009
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://www.schneier.com/crypto-gram.html
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2008
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 18 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Literature
  • http://portal.acm.org/dl.cfm
  • http://www2.computer.org/portal/web/csdl
  • http://www.schneier.com/crypto-gram.html
Assessment methods
3 presentations and discussions of those.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2008
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 19 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2007
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 18 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2007
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 7 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Autumn 2006, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2006
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 7 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Spring 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2006
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 7 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Autumn 2005, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Autumn 2005
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
Guaranteed by
prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 7 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Spring 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.

PA168 Postgraduate seminar on IT security and cryptography

Faculty of Informatics
Spring 2005
Extent and Intensity
0/2. 2 credit(s) (plus extra credits for completion). Type of Completion: zk (examination).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Ing. Mgr. et Mgr. Zdeněk Říha, Ph.D. (lecturer)
doc. Ing. Jan Staudek, CSc. (lecturer)
Guaranteed by
doc. Ing. Jan Staudek, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Mon 16:00–17:50 B003
Prerequisites
SOUHLAS
IT security principles, cryptography principles
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 7 fields of study the course is directly associated with, display
Course objectives
The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar. Registration for this seminar must always be approved by the seminar leader.
Syllabus
  • The seminar participants will discuss a broad range of topics in IT security and cryptography in a greater depth. PhD and Master's students undertaking research in these and closely related areas are expected to report on their work, and frequent participants from other institutions will also take part in this seminar.
Language of instruction
English
Further Comments
Study Materials
The course is taught each semester.
The course is also listed under the following terms Autumn 2005, Spring 2006, Autumn 2006, Spring 2007, Autumn 2007, Spring 2008, Autumn 2008, Spring 2009, Autumn 2009, Spring 2010, Autumn 2010, Spring 2011, Autumn 2011, Spring 2012, Autumn 2012, Spring 2013, Autumn 2013, Spring 2014, Autumn 2014, Spring 2015, Autumn 2015, Spring 2016, Autumn 2016, Spring 2017, Autumn 2017, Spring 2018, Autumn 2018, Spring 2019, Autumn 2019, Spring 2020, Autumn 2020, Spring 2021, Autumn 2021, Spring 2022, Autumn 2022, Spring 2023, Autumn 2023, Spring 2024, Autumn 2024, Spring 2025.