{ "name": "Shannons Theory", "order": 3, "challenges": [ { "id": "59a5801209a6acac5983b667", "title": "Introduction", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b173", "title": "Elementary Probability theory", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b174", "title": "Perfect secrecy", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b175", "title": "Entropy", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b176", "title": "Huffman Encodings", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b177", "title": "Properties of entropy", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b178", "title": "Spurious keys and unicity distance", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] }, { "id": "59a5801209a6acac5983b179", "title": "Product cryptosystems", "description": [ "" ], "challengeSeed": [ "" ], "tests": [ "" ] } ] }