diff --git a/.obsidian/workspace.json b/.obsidian/workspace.json index bafabb8..1517095 100644 --- a/.obsidian/workspace.json +++ b/.obsidian/workspace.json @@ -7,26 +7,6 @@ "id": "e403734ae4b6cb9c", "type": "tabs", "children": [ - { - "id": "a2154279c26415c2", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf" - } - } - }, - { - "id": "a9dbb63c18f5e620", - "type": "leaf", - "state": { - "type": "pdf", - "state": { - "file": "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf" - } - } - }, { "id": "c3af0db6aa583dc9", "type": "leaf", @@ -38,9 +18,51 @@ "source": false } } + }, + { + "id": "eedb7272cfe7b86f", + "type": "leaf", + "state": { + "type": "pdf", + "state": { + "file": "Informationssicherheit/Ilias/Vorlesungen/05-sym-krypto-aes-handout.pdf" + } + } + }, + { + "id": "8bc1dcc239021b16", + "type": "leaf", + "state": { + "type": "pdf", + "state": { + "file": "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf" + } + } + }, + { + "id": "1607381032360c91", + "type": "leaf", + "state": { + "type": "markdown", + "state": { + "file": "Informationssicherheit/Ueb5/Ueb5.md", + "mode": "source", + "source": false + } + } + }, + { + "id": "0e35466336c21de8", + "type": "leaf", + "state": { + "type": "pdf", + "state": { + "file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf" + } + } } ], - "currentTab": 2 + "currentTab": 4 } ], "direction": "vertical" @@ -114,7 +136,7 @@ "state": { "type": "backlink", "state": { - "file": "Informationssicherheit/Ueb6/Ueb 6.md", + "file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", @@ -131,7 +153,7 @@ "state": { "type": "outgoing-link", "state": { - "file": "Informationssicherheit/Ueb6/Ueb 6.md", + "file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf", "linksCollapsed": false, "unlinkedCollapsed": true } @@ -154,7 +176,7 @@ "state": { "type": "outline", "state": { - "file": "Informationssicherheit/Ueb6/Ueb 6.md" + "file": "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf" } } }, @@ -215,10 +237,15 @@ "obsidian-wordnet-plugin:WordNet Dictionary": false } }, - "active": "c3af0db6aa583dc9", + "active": "0e35466336c21de8", "lastOpenFiles": [ + "Informationssicherheit/Ilias/Vorlesungen/06-hash-mac-handout.pdf", + "Informationssicherheit/Ueb5/05-ueb_uebungsblatt.pdf", + "Informationssicherheit/Ilias/Vorlesungen/07-asym-krypto-dh-rsa-ecc-digsig-handout.pdf", "Informationssicherheit/Ueb5/Ueb5.md", "Informationssicherheit/Ueb5/new UEB5.md", + "Informationssicherheit/Ilias/Vorlesungen/05-sym-krypto-aes-handout.pdf", + "Informationssicherheit/Ueb6/Ueb 6.md", "Informationssicherheit/Ueb4/Ueb4.md", "Informationssicherheit/Ueb2/Ueb2.md", "Informationssicherheit/Ilias/ueb/04-ueb_uebungsblatt.pdf", @@ -228,14 +255,10 @@ "CCN/Ilias/Excercises/ccn1-exercise5_solution.pdf", "CCN/Ilias/Excercises/ccn1-exercise4_solution.pdf", "CCN/Ilias/Excercises/ccn1-exercise3_solution.pdf", - "CCN/Ilias/Excercises/ccn1-exercise2_solution.pdf", - "CCN/Ilias/Excercises/ccn1-exercise1_solution.pdf", - "CCN/Ilias/Lecture/CCN-8 - ExamPrep.pdf", "Informationssicherheit/Ueb9/UEB_09.md", "English/KW26.md", "Informationssicherheit/Ueb7/Ueb07.md", "Informationssicherheit/UEB8/UEB08.md", - "Informationssicherheit/Ueb6/Ueb 6.md", "English/KW21.md", "Mathe/KW20/KW20.md", "Informationssicherheit/Ueb4/Ueb4 - Kopie.md",