Ueli Maurer: Catalogue data in Spring Semester 2018
|Name||Prof. Dr. Ueli Maurer|
Inst. f. Theoretische Informatik
ETH Zürich, CAB H 19.2
|Telephone||+41 44 632 74 20|
|Fax||+41 44 632 18 92|
|252-0407-00L||Cryptography Foundations||7 credits||3V + 2U + 1A||U. Maurer|
|Abstract||Fundamentals and applications of cryptography. Cryptography as a mathematical discipline: reductions, constructive cryptography paradigm, security proofs. The discussed primitives include cryptographic functions, pseudo-randomness, symmetric encryption and authentication, public-key encryption, key agreement, and digital signature schemes. Selected cryptanalytic techniques.|
|Objective||The goals are:|
(1) understand the basic theoretical concepts and scientific thinking in cryptography;
(2) understand and apply some core cryptographic techniques and security proof methods;
(3) be prepared and motivated to access the scientific literature and attend specialized courses in cryptography.
|Content||See course description.|
|Prerequisites / Notice||Familiarity with the basic cryptographic concepts as treated for|
example in the course "Information Security" is required but can
in principle also be acquired in parallel to attending the course.
|252-0408-00L||Cryptographic Protocols||5 credits||2V + 2U||M. Hirt, U. Maurer|
|Abstract||The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.|
|Objective||Indroduction to a very active research area with many gems and paradoxical|
results. Spark interest in fundamental problems.
|Content||The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.|
|Lecture notes||the lecture notes are in German, but they are not required as the entire|
course material is documented also in other course material (in english).
|Prerequisites / Notice||A basic understanding of fundamental cryptographic concepts |
(as taught for example in the course Information Security or
in the course Cryptography Foundations) is useful, but not required.