{"id":16429,"date":"2025-03-11T14:29:00","date_gmt":"2025-03-11T13:29:00","guid":{"rendered":"https:\/\/cyberschool.univ-rennes.fr\/?page_id=16429"},"modified":"2026-03-12T14:31:06","modified_gmt":"2026-03-12T13:31:06","slug":"complements-en-cryptographie","status":"publish","type":"page","link":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/","title":{"rendered":"Compl\u00e9ments en cryptographie"},"content":{"rendered":"\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Course description<\/h2>\n                        <ul>\n<li>Modes de chiffrement par bloc<\/li>\n<li>Chiffrements par flot<\/li>\n<li>Fonctions de hachage<\/li>\n<li>Preuves \u00e0 divulgation nulle de connaissance<\/li>\n<\/ul>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Skills to acquire<\/h2>\n                        <p>Cryptographie sym\u00e9trique appliqu\u00e9e.<\/p>\n\n        <\/div>\n    <\/div>\n<\/section>\n\n\n\n<section class=\"txt\">\n    <div class=\"container\">\n        <div class=\"bloc-txt\">\n                            <h2><span class=\"elipse\"><\/span><span class=\"trait\"><\/span>Biographies<\/h2>\n                        <p><strong>Sylvain Duquesne <\/strong>est professeur \u00e0 l\u2019Universit\u00e9 de Rennes , responsable du master\u00a0 et ancien directeur de l\u2019IRMAR. Son domaine de recherche concerne la th\u00e9orie des nombres et plus particuli\u00e8rement l\u2019arithm\u00e9tique et l\u2019algorithmique sur les courbes alg\u00e9briques, et les corps finis ainsi que les applications en cryptographie.<\/p>\n<p><strong>Baptiste Germon<\/strong> est un ancien \u00e9tudiant du master cryptographie. Il pr\u00e9pare actuellement une th\u00e8se \u00e0 l\u2019IRISA en cryptographie sous la direction de Patrick Derbez.<\/p>\n\n        <\/div>\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":11605,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Compl\u00e9ments en cryptographie - CyberSchool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compl\u00e9ments en cryptographie - CyberSchool\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSchool\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CSchoolRennes\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T13:31:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/02\/cover-social-network.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CSchoolRennes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\",\"name\":\"Compl\u00e9ments en cryptographie - CyberSchool\",\"isPartOf\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\"},\"datePublished\":\"2025-03-11T13:29:00+00:00\",\"dateModified\":\"2026-03-12T13:31:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Education\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Master\u2019s and postgraduate programmes\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography\",\"item\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Compl\u00e9ments en cryptographie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/#website\",\"url\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/\",\"name\":\"CyberSchool\",\"description\":\"Just another WordPress site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compl\u00e9ments en cryptographie - CyberSchool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/","og_locale":"en_US","og_type":"article","og_title":"Compl\u00e9ments en cryptographie - CyberSchool","og_url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/","og_site_name":"CyberSchool","article_publisher":"https:\/\/www.facebook.com\/CSchoolRennes\/","article_modified_time":"2026-03-12T13:31:06+00:00","og_image":[{"width":1500,"height":500,"url":"https:\/\/cyberschool.univ-rennes.fr\/app\/uploads\/2021\/02\/cover-social-network.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CSchoolRennes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/","name":"Compl\u00e9ments en cryptographie - CyberSchool","isPartOf":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website"},"datePublished":"2025-03-11T13:29:00+00:00","dateModified":"2026-03-12T13:31:06+00:00","breadcrumb":{"@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/complements-en-cryptographie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Education","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/"},{"@type":"ListItem","position":3,"name":"Master\u2019s and postgraduate programmes","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/"},{"@type":"ListItem","position":4,"name":"Master\u2019s in Mathematics and Applications \u2013 IT Mathematics and Cryptography","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/"},{"@type":"ListItem","position":5,"name":"Study programme of the Master&rsquo;s Mathematics and Applications \u2013 IT Mathematics and Cryptography","item":"https:\/\/cyberschool.univ-rennes.fr\/en\/education\/masters-and-postgraduate-programmes\/masters-in-mathematics-and-applications-it-mathematics-and-cryptography\/study-programme-of-the-masters-mathematics-and-applications-it-mathematics-and-cryptography\/"},{"@type":"ListItem","position":6,"name":"Compl\u00e9ments en cryptographie"}]},{"@type":"WebSite","@id":"https:\/\/cyberschool.univ-rennes.fr\/en\/#website","url":"https:\/\/cyberschool.univ-rennes.fr\/en\/","name":"CyberSchool","description":"Just another WordPress site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberschool.univ-rennes.fr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/16429"}],"collection":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/comments?post=16429"}],"version-history":[{"count":3,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/16429\/revisions"}],"predecessor-version":[{"id":18473,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/16429\/revisions\/18473"}],"up":[{"embeddable":true,"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/pages\/11605"}],"wp:attachment":[{"href":"https:\/\/cyberschool.univ-rennes.fr\/en\/wp-json\/wp\/v2\/media?parent=16429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}