{"id":11605,"date":"2023-06-06T10:12:22","date_gmt":"2023-06-06T09:12:22","guid":{"rendered":"https:\/\/cyberschool.univ-rennes.fr\/?page_id=11605"},"modified":"2026-03-12T14:35:40","modified_gmt":"2026-03-12T13:35:40","slug":"study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography","status":"publish","type":"page","link":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/","title":{"rendered":"Study programme of the Master&#8217;s Mathematics and Applications \u2013 IT Mathematics and Cryptography"},"content":{"rendered":"<section class=\"text-intro\">\n    <div class=\"container\">\n        <section class=\"text-intro\">\n<div class=\"container\">\n<section class=\"text-intro\">\n<div class=\"container\">\n<p style=\"text-align: center;\"><strong>You will find below the first and second year courses (compulsory and elective) of the <a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/\" target=\"_blank\" rel=\"noopener\">Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography<\/a>.<br \/>\n<\/strong><\/p>\n<p style=\"text-align: center;\"><em>Click on each course to read their description, teaching goal, teaching team and so on.<\/em><\/p>\n<\/div>\n<\/section>\n<\/div>\n<\/section>\n\n    <\/div>\n<\/section>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>YEAR 1<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 1<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/algebre-generale-de-base\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Alg\u00e8bre de base \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/algorithmique-de-base\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Algorithmique de base \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">English \u2013 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/low-level-programming\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Low level programming \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-cybersecurity-science-of-software-and-hardware-security\/study-programme-of-the-masters-cybersecurity-science-of-software-and-hardware-security\/software-formal-analysis-and-design\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Software formal analysis and design \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/outils-en-probabilites-et-statistique-pour-lingenierie-mathematique-et-lintelligence-artificielle\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Outils en probabilit\u00e9s et statistique pour l\u2019ing\u00e9nierie math\u00e9matique et l\u2019intelligence artificielle \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/probabilites-pour-la-theorie-de-linformation\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Th\u00e9orie de l\u2019information \u2013 2 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 2<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-derreur\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Codes correcteurs \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Compl\u00e9ments en cryptographie \u2013 2 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complexite\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Complexit\u00e9 \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Cryptographie \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/cybersecurity-training-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/network-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Network security -5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/projet-rd\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Projet R&amp;D \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>1 course to be chosen among 3<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#a326ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/algebre-commutative-et-geometrie-algebrique\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Alg\u00e8bre commutative et g\u00e9om\u00e9trie alg\u00e9brique \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/apprentissage-statistique\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Apprentissage statistique \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/theorie-des-nombres\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Th\u00e9orie des nombres- 5 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>YEAR 2<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 3<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/courbes-elliptiques-pour-la-cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Courbes elliptiques pour la cryptographie \u2013 5 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/cryptanalysis\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Cryptanalysis \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/java\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Java \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/secured-implementations-for-cryptography\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Secured Implementations for Cryptography \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/advanced-network-security\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Advanced Network Security &#8211; 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/reseaux-euclidiens-en-cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">R\u00e9seaux euclidiens en cryptographie \u2013 4 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Preuves de s\u00e9curit\u00e9 \u2013 3 ECTS<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-black-color has-white-background-color has-text-color has-background has-link-color\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>2 courses to be chosen among 6<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#a326ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/blockchain-principles-and-applications\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Blockchain \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/c-complements\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">C++, compl\u00e9ments \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/c-programmation-objet-et-c-base\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">C++, les bases \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Droit de la cybers\u00e9curit\u00e9 \u2013 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/programmation-parallele-et-sur-gpu\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Programmation parall\u00e8le, GPU \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/formal-modeling-and-verification-of-security-protocols\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">S\u00e9curit\u00e9 des protocoles \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-background-color has-text-color has-background has-link-color\" style=\"color:#ff4700\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>SEMESTER 4<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-white-color has-text-color has-background has-link-color\" style=\"background-color:#3026ff\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/codes-correcteurs-en-cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Codes correcteurs en cryptographie \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/cryptographie-quantique\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Cryptographie quantique \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">English \u2013 3 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Stage \u2013 18 ECTS<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/theorie-algorithmique-des-nombres-pour-la-cryptographie\/\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-white-color\">Th\u00e9orie algorithmique des nombres pour la cryptographie \u2013 3 ECTS<\/mark><\/a><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Blue: compulsory \/ Purple: elective<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>YEAR 1 SEMESTER 1 Alg\u00e8bre de base \u2013 5 ECTS Algorithmique de base \u2013 5 ECTS English \u2013 3 ECTS Low level programming \u2013 5 ECTS Software formal analysis and design \u2013 5 ECTS Outils en probabilit\u00e9s et statistique pour l\u2019ing\u00e9nierie math\u00e9matique et l\u2019intelligence artificielle \u2013 5 ECTS Th\u00e9orie de l\u2019information \u2013 2 ECTS SEMESTER [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5192,"parent":5120,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Study programme of the Master&#039;s Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Study programme of the Master&#039;s Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool\" \/>\n<meta property=\"og:description\" content=\"YEAR 1 SEMESTER 1 Alg\u00e8bre de base \u2013 5 ECTS Algorithmique de base \u2013 5 ECTS English \u2013 3 ECTS Low level programming \u2013 5 ECTS Software formal analysis and design \u2013 5 ECTS Outils en probabilit\u00e9s et statistique pour l\u2019ing\u00e9nierie math\u00e9matique et l\u2019intelligence artificielle \u2013 5 ECTS Th\u00e9orie de l\u2019information \u2013 2 ECTS SEMESTER [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSchool\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CSchoolRennes\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:35:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/12\/computer-science.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CSchoolRennes\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\",\"name\":\"Study programme of the Master's Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool\",\"isPartOf\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\"},\"datePublished\":\"2023-06-06T09:12:22+00:00\",\"dateModified\":\"2026-03-12T13:35:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Education\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master\u2019s and postgraduate programmes\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\",\"name\":\"CyberSchool\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Study programme of the Master's Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Study programme of the Master's Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool","og_description":"YEAR 1 SEMESTER 1 Alg\u00e8bre de base \u2013 5 ECTS Algorithmique de base \u2013 5 ECTS English \u2013 3 ECTS Low level programming \u2013 5 ECTS Software formal analysis and design \u2013 5 ECTS Outils en probabilit\u00e9s et statistique pour l\u2019ing\u00e9nierie math\u00e9matique et l\u2019intelligence artificielle \u2013 5 ECTS Th\u00e9orie de l\u2019information \u2013 2 ECTS SEMESTER [&hellip;]","og_url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/","og_site_name":"CyberSchool","article_publisher":"https:\/\/www.facebook.com\/CSchoolRennes\/","article_modified_time":"2026-03-12T13:35:40+00:00","og_image":[{"width":945,"height":630,"url":"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/12\/computer-science.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CSchoolRennes","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/","name":"Study programme of the Master's Mathematics and Applications \u2013 IT Mathematics and Cryptography - CyberSchool","isPartOf":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website"},"datePublished":"2023-06-06T09:12:22+00:00","dateModified":"2026-03-12T13:35:40+00:00","breadcrumb":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Education","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/"},{"@type":"ListItem","position":3,"name":"Master\u2019s and postgraduate programmes","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/"},{"@type":"ListItem","position":4,"name":"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/"},{"@type":"ListItem","position":5,"name":"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography"}]},{"@type":"WebSite","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/","name":"CyberSchool","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11605"}],"collection":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/comments?post=11605"}],"version-history":[{"count":97,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11605\/revisions"}],"predecessor-version":[{"id":18462,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11605\/revisions\/18462"}],"up":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/5120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media\/5192"}],"wp:attachment":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media?parent=11605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}