{"id":19921039,"url":"https://github.com/hacker-code-j/2023-spring","last_synced_at":"2026-03-19T12:27:52.377Z","repository":{"id":153410036,"uuid":"612473513","full_name":"Hacker-Code-J/2023-spring","owner":"Hacker-Code-J","description":null,"archived":false,"fork":false,"pushed_at":"2024-01-08T11:52:51.000Z","size":23396,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-01T09:47:07.347Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"TeX","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hacker-Code-J.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2023-03-11T03:35:30.000Z","updated_at":"2024-02-29T05:20:45.000Z","dependencies_parsed_at":"2024-02-29T07:39:13.256Z","dependency_job_id":null,"html_url":"https://github.com/Hacker-Code-J/2023-spring","commit_stats":null,"previous_names":["hacker-code-j/2023-spring"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/Hacker-Code-J/2023-spring","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2F2023-spring","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2F2023-spring/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2F2023-spring/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2F2023-spring/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hacker-Code-J","download_url":"https://codeload.github.com/Hacker-Code-J/2023-spring/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2F2023-spring/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30207393,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-07T03:24:23.086Z","status":"ssl_error","status_checked_at":"2026-03-07T03:23:11.444Z","response_time":53,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-11-12T22:06:34.693Z","updated_at":"2026-03-07T04:02:50.551Z","avatar_url":"https://github.com/Hacker-Code-J.png","language":"TeX","readme":"# 2023-spring\n\u003cdiv align=\"center\"\u003e\n  \u003cimg src=\"https://i.imgur.com/xxxxxxxxxx.png\" alt=\"Repository Cover Image\" width=\"100%\"\u003e\n\u003c/div\u003e\n\n# Subjects Learned During the Semester\n\nThis repository contains notes and exercises for the following subjects learned during the semester:\n\n1. Complex Analysis\n2. Public Key Cryptography\n3. Modern Cryptography\n\n## :bar_chart: Complex Analysis\n\nComplex analysis is the study of complex functions, which are functions that have complex numbers as inputs and outputs. This subject is important in many areas of mathematics, physics, and engineering. Topics covered in this course include complex numbers, complex functions, contour integrals, power series, and more.\n\n## :key: Public Key Cryptography\n\nPublic key cryptography is a method of cryptography that uses a pair of keys to encrypt and decrypt data. One key is public and can be shared with anyone, while the other key is private and must be kept secret. This subject is important in information security and computer science. Topics covered in this course include RSA encryption, Diffie-Hellman key exchange, digital signatures, and more.\n\n## :lock: Modern Cryptography\n\nModern cryptography is a broad field that encompasses many different techniques for securing information. This subject is important in information security and computer science. Topics covered in this course include symmetric encryption, hash functions, block ciphers, and more.\n\n## :computer: Usage\n\nThis repository contains LaTeX files for each subject, as well as compiled PDF files. The LaTeX files can be edited and compiled using a LaTeX editor, such as TeXstudio or Overleaf. The PDF files can be viewed and printed using a PDF viewer, such as Adobe Acrobat or SumatraPDF.\n\n## :handshake: Contributing\n\nContributions to this repository are welcome! If you find an error or have a suggestion for improvement, please create an issue or a pull request.\n\n## :page_with_curl: License\n\nThis repository is licensed under the MIT License. See the LICENSE file for more information.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2F2023-spring","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhacker-code-j%2F2023-spring","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2F2023-spring/lists"}