Cryptography Foundations 2016

Loading...
ETH Zürich » Computer Science » Theory » Cryptography

Cryptography Foundations 2016 Home Publications Teaching People Open Positions

Lecturer: Ueli Maurer Assistants: Christian Matt and Gregor Seiler Å Å

Lecture The lecture takes place on Wednesdays 13–16 in CAB G 51. The first lecture is on February 24th.

Material The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.

Exercises A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during the exercise sessions in the following week. You are not required to hand in your solutions to the exercises. However, if you wish to receive feedback, feel free to hand in your solutions to your assistant. Each task is assigned a difficulty level, where the four different levels have the following semantics: (H) a quite simple task (HH) moderately difficult; all students should be able to solve it (HHH) requires some nontrivial idea (HHHH) a major challenge for the best students

Exercise Sessions The weekly exercise class discusses solutions of the problem set from the previous week. The sessions on Monday and Tuesday cover the same material. There are no exercise classes in the first week of the semester, i.e., the first exercise classes are on February 29th and March 1st. Assistant

Time

Room

Christian Matt Monday 10–12 CAB G 52 Gregor Seiler

Tuesday 13–15 ETZ G 91

Exercise Sheets The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.

Reading Assignments There will be an additional reading assignment for this lecture (note the 1 A in the course catalogue). The reading assignment is the paper Practical Chosen Ciphertext Secure Encryption from Factoring by Dennis Hofheinz, Eike Kiltz, and Victor Shoup.

Exams There will be two written intermediate exams during the semester and one final oral exam during the exam session. The grade of each intermediate exam amounts to 20% of the final grade, and the grade of the final exam amounts to 60% of the final grade. All exams are “closed book”, i.e., no supplementary material is permitted. Date Intermediate Exam 1 April 6th

Starting Time

Duration

Room

13:15

45 Minutes ETF E 1

Intermediate Exam 2 May 11th 13:15

45 Minutes ETF E 1

Exam Review The correction of the first midterm can be reviewed on Tuesday, April 19th from 17:00 to 18:30 in CAB H 53. The correction of the second midterm can be reviewed on Monday, May 30th from 17:00 to 18:30 in CAB H 53.

Literature The course does not make use of textbooks, but we encourage the students to consult several books to get a more detailed and sometimes complementary view on the various topics. Some useful books on cryptography, each with a different focus, are listed below: O. Goldreich, Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001. J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2007. W. Mao, Modern Cryptography - Theory and Practice, Prentice Hall, 2004. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997. D.R. Stinson, Cryptography - Theory and Practice, CRC Press, 1995. 03-Jun-2016 / [email protected]

Loading...

Cryptography Foundations 2016

ETH Zürich » Computer Science » Theory » Cryptography Cryptography Foundations 2016 Home Publications Teaching People Open Positions Lecturer: Ueli ...

49KB Sizes 2 Downloads 29 Views

Recommend Documents

Foundations of Cryptography
Exercises. Exercises on Fridays from September 15 to October 20. In total, 6 exercise lessons (6 × 2h = 12h). There are

Yehuda Lindell: Foundations of Cryptography
Most of the course will follow the presentation of the relevant material in the books Foundations of Cryptography, Volum

Foundations of Cryptography: Basic Tools
May 3, 2013 - approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for

KTH | DD2448 Foundations of Cryptography 7.5 credits
Advanced course in computer science giving an introduction to modern cryptography. ... Number of exercises. 4 (prelimina

TMA4160 Cryptography - Fall 2016 - wiki.math.ntnu.no
You should be familiar with basic abstract algebra such as groups, rings and fields. It is helpful, but not required, to

Foundations of Cryptography (Fragments of a Book) - Electronic
Feb 23, 1995 - in the evolving foundations of cryptography and shared with me their constant e orts of further developin

PENN CIS 620, FALL 2007: FOUNDATIONS OF CRYPTOGRAPHY
I will structure the broad discussion and lecture a bit, but each week there will be one or more designated discussants

Cryptography
4 Aug 2015 - http://echidna.maths.usyd.edu.au/ kohel/tch/Crypto/vigenere.html. Consider those ciphertexts from previous

RSA.pdf | Cryptography | Key (Cryptography)
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No. 7, July 2013 9. Data Encryption and De

Cryptography
Cryptography is the study of mathematical techniques related to information ... symmetric cipher (secret key cryptograph