![]() |
![]() ![]() | ![]() ![]() | ![]() ![]() | Hours per week, examination | Department | Faculty | Virtual mobility | Capacity | |
![]() |
NMAG337 | Introduction to Group Theory | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG401 | Algebraic Geometry | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG407 | Model Theory | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG430 | Algebraic Number Theory | summer | summer s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG436 | Curves and Function Fields | summer | summer s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG535 | Computational Logic | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG563 | Introduction to complexity of CSP | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMAG573 | Seminar on CSP | summer | summer s.:0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB331 | Boolean functions | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB333 | Introduction to data analysis | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB401 | Automata and Convolutional Codes | winter | winter s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB402 | Numerical Algorithms | summer | summer s.:2/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB403 | Computer Algebra 2 | winter | winter s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB404 | Cryptanalysis | summer | summer s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB405 | Complexity for Cryptography | winter | winter s.:4/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB407 | Probability and Cryptography | summer | summer s.:4/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB409 | Convex optimization | winter | winter s.:4/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB411 | Algorithms on Lattices | winter | winter s.:2/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB413 | Algorithms on Polynomials | winter | winter s.:2/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB415 | Automata and Computational Complexity | winter | winter s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB430 | Algorithms on Eliptic curves | summer | summer s.:2/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB431 | Authentication Schemes | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB432 | Randomness and Calculations | summer | summer s.:2/1 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB433 | Geometry for Computer Graphics | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB436 | Steganography and Digital Media | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB437 | Legal Aspects of Data Protection | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB438 | Fundamentals of Continuous Optimization | summer | summer s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB440 | Geometry of Computer Vision | summer | summer s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB442 | Geometric Problems in Robotics | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB451 | Applications of Mathematics in Computer Science | summer | summer s.:0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB452 | Seminar on Mathematics Inspired by Cryptography | both | 0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB453 | Students' Seminar on Logic | both | 0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB460 | Cryptanalysis Upon the Level of Instructions | summer | summer s.:0/4 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB462 | Application of Security Mechanisms | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB464 | Introduction to Computational Topology | summer | summer s.:2/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB471 | MIT Elective Seminar | both | 0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB473 | Mathematical modeling of security | both | 0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB498 | MIT Elective 1 | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB499 | MIT Elective 2 | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB501 | Network Certification Security | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB531 | Number Field Sieve | winter | winter s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB532 | Standards and Cryptography | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB533 | Mathematical Software | winter | winter s.:1/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB534 | Quantum Information | summer | summer s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB535 | Compressed Sensing | winter | winter s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB536 | Optimization and Approximation CSP | summer | summer s.:2/2 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB538 | Elliptic Curves and Cryptography | winter | winter s.:3/1 C+Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB551 | Seminar on Combinatorial, Algorithmic and Finitary Algebra | summer | summer s.:0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB562 | Machine Learning and Reasoning | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMB564 | Evolving Structures in Mathematics | winter | winter s.:0/2 C [HT] | 32-KA | 11320 | no | |
![]() |
NMMB566 | Formal Mathematics and Proof Assistants | summer | summer s.:2/0 Ex [HT] | 32-KA | 11320 | no | |
![]() |
NMMX402 | Numerical Algorithms | summer | summer s.:2/1 C+Ex [HT] | 32-STUD | 11320 | no | |
![]() |
NMNM334 | Introduction to Mathematical Modelling | summer | summer s.:3/0 Ex [HT] | 32-KNM | 11320 | no | |
![]() |
NMNM931 | Analysis of Matrix Calculations 1 (M) | winter | winter s.:2/2 C+Ex [HT] | 32-KNM | 11320 | no | |
![]() |
NMNV407 | Matrix Iterative Methods 1 | winter | winter s.:4/0 Ex [HT] | 32-KNM | 11320 | no | |
![]() |
NMNV438 | Matrix Iterative Methods 2 | summer | summer s.:2/2 C+Ex [HT] | 32-KNM | 11320 | no | |
![]() |
NMNV534 | Numerical Optimization Methods | summer | summer s.:2/2 C+Ex [HT] | 32-KNM | 11320 | no | |
![]() |
NOFY003 | Theoretical Mechanics | winter | winter s.:3/2 C+Ex [HT] | 32-KVOF | 11320 | no | |
![]() |
NPGR002 | Digital Image Processing | winter | winter s.:3/0 Ex [HT] | 32-KSVI | 11320 | no | |
![]() |
NPGR010 | Advanced 3D graphics for film and games | winter | winter s.:2/2 C+Ex [HT] | 32-KSVI | 11320 | no | |
![]() |
NPGR013 | Special Functions and Transformations in Image Processing | summer | summer s.:2/0 Ex [HT] | 32-KSVI | 11320 | no | |
![]() |
NPGR029 | Variational methods in image processing | summer | summer s.:2/0 Ex [HT] | 32-KSVI | 11320 | no | |
![]() |
NPGX002 | Digital Image Processing | winter | winter s.:3/0 Ex [HT] | 32-STUD | 11320 | no | |
![]() |
NPGX010 | Computer Graphics III | winter | winter s.:2/2 C+Ex [HT] | 32-STUD | 11320 | no | |
![]() |
NSWI090 | Computer Networks | summer | summer s.:2/0 Ex [HT] | 32-KSI | 11320 | no | |
![]() |
NTIN104 | Foundations of theoretical cryptography | winter | winter s.:2/1 C+Ex [HT] | 32-IUUK | 11320 | no | |
![]() |
NTIX104 | Foundations of theoretical cryptography | summer | summer s.:2/1 C+Ex [HT] | 32-STUD | 11320 | no |