Kenneth Paterson: Katalogdaten im Frühjahrssemester 2020
|Name||Herr Prof. Dr. Kenneth Paterson|
Institut f. Informationssicherheit
ETH Zürich, CNB E 104.2
|Telefon||+41 44 632 32 52|
|263-4651-00L||Current Topics in Cryptography |
Number of participants limited to 24.
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
|2 KP||2S||D. Hofheinz, U. Maurer, K. Paterson|
|Kurzbeschreibung||In this seminar course, students present and discuss a variety of recent research papers in Cryptography.|
|Lernziel||Independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.|
|Inhalt||The course lecturers will provide a list of papers from which students will select.|
|Literatur||The reading list will be published on the course website.|
|Voraussetzungen / Besonderes||Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”.|
|263-4660-00L||Applied Cryptography |
Number of participants limited to 150.
|8 KP||3V + 2U + 2P||K. Paterson|
|Kurzbeschreibung||This course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems.|
|Lernziel||The goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so.|
|Inhalt||Basic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications.|
|Literatur||Textbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”, https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf.|
|Voraussetzungen / Besonderes||Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level.|