ETH Zürich » Computer Science » Theory » Cryptography
Cryptography Foundations 2016 Home Publications Teaching People Open Positions
Lecturer: Ueli Maurer Assistants: Christian Matt and Gregor Seiler Å Å
Lecture The lecture takes place on Wednesdays 13–16 in CAB G 51. The first lecture is on February 24th.
Material The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.
Exercises A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during the exercise sessions in the following week. You are not required to hand in your solutions to the exercises. However, if you wish to receive feedback, feel free to hand in your solutions to your assistant. Each task is assigned a difficulty level, where the four different levels have the following semantics: (H) a quite simple task (HH) moderately difficult; all students should be able to solve it (HHH) requires some nontrivial idea (HHHH) a major challenge for the best students
Exercise Sessions The weekly exercise class discusses solutions of the problem set from the previous week. The sessions on Monday and Tuesday cover the same material. There are no exercise classes in the first week of the semester, i.e., the first exercise classes are on February 29th and March 1st. Assistant
Time
Room
Christian Matt Monday 10–12 CAB G 52 Gregor Seiler
Tuesday 13–15 ETZ G 91
Exercise Sheets The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.
Reading Assignments There will be an additional reading assignment for this lecture (note the 1 A in the course catalogue). The reading assignment is the paper Practical Chosen Ciphertext Secure Encryption from Factoring by Dennis Hofheinz, Eike Kiltz, and Victor Shoup.
Exams There will be two written intermediate exams during the semester and one final oral exam during the exam session. The grade of each intermediate exam amounts to 20% of the final grade, and the grade of the final exam amounts to 60% of the final grade. All exams are “closed book”, i.e., no supplementary material is permitted. Date Intermediate Exam 1 April 6th
Starting Time
Duration
Room
13:15
45 Minutes ETF E 1
Intermediate Exam 2 May 11th 13:15
45 Minutes ETF E 1
Exam Review The correction of the first midterm can be reviewed on Tuesday, April 19th from 17:00 to 18:30 in CAB H 53. The correction of the second midterm can be reviewed on Monday, May 30th from 17:00 to 18:30 in CAB H 53.
Literature The course does not make use of textbooks, but we encourage the students to consult several books to get a more detailed and sometimes complementary view on the various topics. Some useful books on cryptography, each with a different focus, are listed below: O. Goldreich, Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001. J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2007. W. Mao, Modern Cryptography - Theory and Practice, Prentice Hall, 2004. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997. D.R. Stinson, Cryptography - Theory and Practice, CRC Press, 1995. 03-Jun-2016 /
[email protected]