{"id":880,"date":"2016-08-02T12:05:32","date_gmt":"2016-08-02T11:05:32","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?p=880"},"modified":"2016-12-11T20:59:50","modified_gmt":"2016-12-11T19:59:50","slug":"analyse-kryptografischer-systeme","status":"publish","type":"post","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=880","title":{"rendered":"Analyse kryptografischer Systeme"},"content":{"rendered":"<p><!--more--><\/p>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Allgemeine Informationen<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<ul>\n<li><span style=\"line-height: 13px;\">Vorlesungsnummer: 57533<\/span><\/li>\n<li>Umfang: 2 SWS<\/li>\n<li>Aufwand: 3 CP<\/li>\n<\/ul>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Termine<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<p>Die Vorlesung findet im Rahmen einer Summer School als Blockveranstaltung statt:<\/p>\n<ul>\n<li><span style=\"line-height: 13px;\">Montag, 1.8.2016 bis Donnerstag, 4.8.2016, 9:30 Uhr bis 16:30 Uhr<\/span><\/li>\n<li>Freitag, 5.8.2016, 9:30 Uhr bis 12:30 Uhr<\/li>\n<\/ul>\n<p>Die Summer School findet im Labor G2 1.31 statt.<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:19;--minFontSize:19;line-height:1.5;\">Unterlagen<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:16px;--awb-icon-alignment:left;--awb-hover-color:#f9f9f9;--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#333333;--awb-toggle-hover-accent-color:#67b7e1;--awb-title-font-family:&quot;PT Sans Caption&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:14px;--awb-title-letter-spacing:0px;--awb-title-line-height:1.54;--awb-content-font-family:&quot;PT Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-880-1\">\n<div class=\"fusion-panel panel-default panel-bcf8c7311d1f1902d fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bcf8c7311d1f1902d\"><a aria-expanded=\"false\" aria-controls=\"bcf8c7311d1f1902d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-880-1\" data-target=\"#bcf8c7311d1f1902d\" href=\"#bcf8c7311d1f1902d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Beschreibung der Lehrveranstaltung<\/span><\/a><\/h4><\/div><div id=\"bcf8c7311d1f1902d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bcf8c7311d1f1902d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/MH\/lv-57533-kryptoanalyse.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download<\/span><\/a><\/div>\n<p>Stand: 3.5.2014<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-037827fce490068bc fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_037827fce490068bc\"><a aria-expanded=\"false\" aria-controls=\"037827fce490068bc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-880-1\" data-target=\"#037827fce490068bc\" href=\"#037827fce490068bc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 1: Substitution-Permutation-Netzwerke<\/span><\/a><\/h4><\/div><div id=\"037827fce490068bc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_037827fce490068bc\"><div class=\"panel-body toggle-content fusion-clearfix\">\nDie Aufgabenstellung zu diesem Projekt finden Sie in der Starter-Box. Diese kann im B\u00fcro von Prof. Dr. Karg abgeholt werden.<\/p>\n<div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-small button-blue fusion-button-blue button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"..\/docs\/AKS\/Code\/code-p1.zip\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Code<\/span><\/a><\/div>\n<hr \/>\n<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-73e751f3135064712 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_73e751f3135064712\"><a aria-expanded=\"false\" aria-controls=\"73e751f3135064712\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-880-1\" data-target=\"#73e751f3135064712\" href=\"#73e751f3135064712\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 2: Das IZO SPN<\/span><\/a><\/h4><\/div><div id=\"73e751f3135064712\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_73e751f3135064712\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-2c7a3352d51030c0e fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_2c7a3352d51030c0e\"><a aria-expanded=\"false\" aria-controls=\"2c7a3352d51030c0e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-880-1\" data-target=\"#2c7a3352d51030c0e\" href=\"#2c7a3352d51030c0e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 3: S-Box Analyse<\/span><\/a><\/h4><\/div><div id=\"2c7a3352d51030c0e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_2c7a3352d51030c0e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<\/div><\/div><\/div>\n<div class=\"fusion-panel panel-default panel-98808b52c045fa2ec fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_98808b52c045fa2ec\"><a aria-expanded=\"false\" aria-controls=\"98808b52c045fa2ec\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-880-1\" data-target=\"#98808b52c045fa2ec\" href=\"#98808b52c045fa2ec\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Projekt 4: Lineare Kryptoanalyse<\/span><\/a><\/h4><\/div><div id=\"98808b52c045fa2ec\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_98808b52c045fa2ec\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<\/div><\/div><\/div>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:17;--minFontSize:17;line-height:1.5;\">Vorlesungen im aktuellen Semester<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div>\n<div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:\/\/its&#46;&#105;&#110;&#102;&#111;&#114;&#109;&#97;&#x74;&#x69;&#x6b;&#x2e;&#x68;&#x74;&#x77;&#x2d;&#x61;&#x61;&#x6c;&#x65;n&#46;de\/w&#112;&#47;&#119;&#112;&#45;&#99;&#111;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#x61;&#x64;s\/2013&#47;&#48;&#51;&#47;&#107;&#114;&#121;&#x70;&#x74;&#x6f;&#x67;&#x72;&#x61;&#x66;&#x69;&#x65;&#x2d;&#x36;&#x36;0x405&#64;&#50;&#120;&#46;&#106;&#112;&#103; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-05-12T08:48:14+02:00<\/span><span>12. May  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:&#47;&#x2f;i&#x74;&#x73;&#46;&#x69;n&#102;&#x6f;&#114;&#x6d;a&#116;&#x69;k&#x2e;h&#116;&#x77;-&#x61;&#x61;&#108;&#x65;n&#46;&#x64;&#101;&#x2f;w&#112;&#x2f;&#119;&#x70;-&#99;&#x6f;n&#x74;&#x65;&#110;&#x74;\/&#117;&#x70;&#108;&#x6f;a&#100;&#x73;&#47;&#x32;0&#49;&#x38;\/&#x31;0&#47;&#x73;i&#x63;&#x68;&#101;&#x72;e&#45;&#x77;&#101;&#x62;a&#110;&#x77;&#101;&#x6e;d&#117;&#x6e;g&#x65;&#x6e;&#45;&#x33;2&#48;&#x78;&#50;&#x30;2&#64;&#x32;&#120;&#x2e;j&#112;&#x67; 640w, https:&#47;&#47;&#x69;t&#115;&#x2e;&#x69;n&#102;&#x6f;&#x72;m&#97;&#x74;&#x69;k&#46;&#x68;&#x74;w&#45;&#x61;&#x61;l&#101;&#x6e;&#46;&#100;&#101;&#x2f;w&#112;&#x2f;&#x77;p&#45;&#x63;&#x6f;n&#116;&#x65;&#x6e;t&#47;&#x75;&#x70;l&#111;&#x61;&#x64;&#115;&#47;&#x32;0&#49;&#x38;&#x2f;1&#48;&#x2f;&#x73;i&#99;&#x68;&#x65;r&#101;&#x2d;&#x77;e&#98;&#x61;&#x6e;w&#101;&#x6e;d&#117;&#110;&#x67;e&#110;&#x2d;&#x37;0&#48;&#x78;&#x34;4&#49;&#x40;&#x32;x&#46;&#x6a;&#x70;g 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-30T08:26:01+02:00<\/span><span>30. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#47;&#x2f;&#105;&#x74;&#115;&#x2e;&#105;&#x6e;f&#x6f;r&#x6d;a&#x74;i&#107;&#x2e;&#104;&#x74;&#119;&#x2d;&#97;&#x61;&#108;&#x65;n&#x2e;d&#x65;\/&#x77;p&#47;&#x77;&#112;&#x2d;&#99;&#x6f;&#110;&#x74;&#101;&#x6e;t&#x2f;u&#x70;l&#x6f;a&#100;&#x73;&#47;&#x32;&#48;&#x31;&#54;&#x2f;&#48;&#x34;\/&#x77;a&#x68;r&#115;c&#104;&#x65;&#105;&#x6e;&#108;&#x69;&#99;&#x68;&#107;&#x65;i&#x74;-&#x33;2&#48;x&#50;&#x30;&#50;&#x40;&#50;&#x78;&#46;&#x6a;p&#x67; 640w, https:\/&#47;&#105;&#x74;&#x73;&#x2e;in&#102;&#111;&#x72;&#x6d;&#x61;t&#105;&#107;&#46;&#x68;&#x74;&#x77;-&#97;&#97;&#x6c;&#x65;&#x6e;&#46;d&#101;&#47;&#x77;&#x70;&#x2f;w&#112;&#45;&#99;&#x6f;&#x6e;&#x74;e&#110;&#116;&#x2f;&#x75;&#x70;lo&#97;&#100;&#x73;&#x2f;&#x32;0&#49;&#54;&#47;&#x30;&#x34;&#x2f;w&#97;&#104;&#x72;&#x73;&#x63;he&#105;&#110;&#x6c;&#x69;&#x63;h&#107;&#101;&#105;&#x74;&#x2d;&#x37;0&#48;&#120;&#x34;&#x34;&#x31;&#64;2&#120;&#46;&#x6a;&#x70;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-22T20:26:06+02:00<\/span><span>22. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:\/\/its&#46;informatik&#46;htw-aal&#101;&#110;&#46;&#100;&#101;&#47;&#119;&#112;&#47;&#119;&#112;&#45;&#99;&#111;&#110;&#116;&#101;&#110;&#116;&#47;&#117;&#112;&#108;&#111;&#97;&#100;&#115;&#47;&#50;&#48;&#49;&#x36;&#x2f;&#x31;&#x30;&#x2f;&#x73;&#x69;&#x63;&#x68;&#x65;&#x72;&#x65;&#x2d;&#x70;&#x72;&#x6f;&#x67;&#x72;&#x61;&#x6d;&#x6d;&#x69;&#x65;&#x72;&#x75;&#x6e;&#x67;&#x2d;&#x33;&#x32;&#x30;&#x78;&#x32;&#x30;&#x32;&#x40;&#x32;&#x78;&#x2e;&#x6a;&#x70;&#x67; 640w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#105;&#107;&#46;&#104;&#116;&#119;&#45;&#97;&#97;&#108;&#101;n&#46;de\/wp\/&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#97;&#100;&#115;&#47;&#50;&#48;&#49;&#54;&#47;&#49;0\/sicher&#x65;&#x2d;&#x70;&#x72;&#x6f;&#x67;&#x72;&#x61;&#x6d;&#x6d;&#x69;&#x65;&#x72;&#x75;&#x6e;&#103;&#45;&#55;&#48;&#48;&#120;&#52;&#52;&#49;&#64;2x&#46;jpg 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-20T09:39:04+02:00<\/span><span>20. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":1254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,4],"tags":[11,15],"class_list":["post-880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vorlesung_archiv","category-vorlesung","tag-kryptographie","tag-vorlesung"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=880"}],"version-history":[{"count":47,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/880\/revisions"}],"predecessor-version":[{"id":1407,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/posts\/880\/revisions\/1407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/media\/1254"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}