Name | Prof. Dr. Kenneth Paterson |
Field | Computer Science |
Address | Institut f. Informationssicherheit ETH Zürich, CAB E 79 Universitätstrasse 6 8092 Zürich SWITZERLAND |
Telephone | +41 44 632 32 52 |
kenny.paterson@inf.ethz.ch | |
Department | Computer Science |
Relationship | Full Professor |
Number | Title | ECTS | Hours | Lecturers | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
263-4651-00L | Current Topics in Cryptography The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar. | 2 credits | 2S | D. Hofheinz, U. Maurer, K. Paterson | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | In this seminar course, students present and discuss a variety of recent research papers in Cryptography. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | The course lecturers will provide a list of papers from which students will select. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | The reading list will be published on the course website. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
263-4660-00L | Applied Cryptography | 8 credits | 3V + 2U + 2P | K. Paterson, F. Günther | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | This course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | The goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | Basic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Textbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”, http://toc.cryptobook.us/book.pdf. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | Students should have taken the D-INFK Bachelor's course “Information Security" (252-0211-00) or an alternative first course covering cryptography at a similar level. / In this course, we will use Moodle for content delivery: https://moodle-app2.let.ethz.ch/course/view.php?id=19644. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
364-1058-00L | Risk Center Seminar Series | 0 credits | 2S | H. Schernberg, D. Basin, A. Bommier, D. N. Bresch, S. Brusoni, L.‑E. Cederman, P. Cheridito, F. Corman, H. Gersbach, C. Hölscher, K. Paterson, G. Sansavini, B. Stojadinovic, B. Sudret, J. Teichmann, R. Wattenhofer, U. A. Weidmann, S. Wiemer, R. Zenklusen | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Abstract | In this series of seminars, invited speakers discuss various topics in the area of risk modelling, governance of complex socio-economic systems, managing risks and crises, and building resilience. Students, PhD students, post-docs, faculty and individuals outside ETH are welcome. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Learning objective | Participants gain insights in a broad range of risk- and resilience-related topics. They expand their knowledge of the field and deepen their understanding of the complexity of our social, economic and engineered systems. For young researchers in particular, the seminars offer an opportunity to learn academic presentation skills and to network with an interdisciplinary scientific audience. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | Academic presentations from ETH faculty as well as external researchers. Each seminar is followed by a Q&A session and (when permitted) a networking Apéro. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lecture notes | The sessions are recorded whenever possible and posted on the ETH Risk Center webpage. If available, presentation slides are shared as well. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literature | Each speaker will provide a literature review. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Prerequisites / Notice | In most cases, a quantitative background is required. Depending on the topic, field-specific knowledge may be required. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Competencies |
|