Course questionnaire: Information Security: Theory vs. Reality 2015-2016
This is a questionnaire for Tel Aviv University course "Information Security - Theory vs. Reality", 0368-44741, 2015-2016 winter semester.

Please fill in this form if you are considering attending the course. The information will be sent only to the course staff and will be kept private.

Name (English) *
Your answer
Name (Hebrew) *
Your answer
ID number *
Your answer
E-mail address *
This address will not be automatically added to the course mailing list, so please register manually.
Your answer
Track of study at Tel Aviv University *
Degree program *
Background
Previously attended courses in cryptography or information security
Attended an Operating Systems course? *
Attended a Networks course? *
Already registered to this course? *
If you are interested in taking the course but cannot do so due to bidding or procedural constraints, please contact the course staff..
Reason for interest in this course
Your answer
Rate your prior knowledge on the following.
This helps the course staff plan the discussions and provide suitable background.
Concepts in applied cryptography
Examples: hash functions, symmetric and asymmetric encryption, certificates
Unfamiliar
Expert
Concepts in theoretical cryptography
Security reductions, formal cryptographic assumptions, zero-knowledge proofs
Unfamiliar
Expert
Computer structure and electronics
Examples: transistors, power supplies, cache architecture
Unfamiliar
Expert
Basic finite algebra
Examples: finite groups, finite fields
Unfamiliar
Expert
Fancy algebra used in crypto
Elliptic curves, pairings, lattices
Unfamiliar
Expert
Python
Unfamiliar
Expert
Lockpicking
Unfamiliar
Expert
Submit
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service