Cryptography and Information Security / Cryptography Foundations 2016 [PDF]

A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during th

2 downloads 40 Views 49KB Size

Recommend Stories


PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Read PdF Cryptography and Network Security
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Read PDF Cryptography and Network Security
Don't count the days, make the days count. Muhammad Ali

Download PDF Cryptography And Network Security
Where there is ruin, there is hope for a treasure. Rumi

Cryptography
The happiest people don't have the best of everything, they just make the best of everything. Anony

White-Box Cryptography Cryptography
I tried to make sense of the Four Books, until love arrived, and it all became a single syllable. Yunus

cryptography
Everything in the universe is within you. Ask all from yourself. Rumi

Cryptography
You often feel tired, not because you've done too much, but because you've done too little of what sparks

Idea Transcript


ETH Zürich » Computer Science » Theory » Cryptography

Cryptography Foundations 2016 Home Publications Teaching People Open Positions

Lecturer: Ueli Maurer Assistants: Christian Matt and Gregor Seiler Å Å

Lecture The lecture takes place on Wednesdays 13–16 in CAB G 51. The first lecture is on February 24th.

Material The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.

Exercises A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during the exercise sessions in the following week. You are not required to hand in your solutions to the exercises. However, if you wish to receive feedback, feel free to hand in your solutions to your assistant. Each task is assigned a difficulty level, where the four different levels have the following semantics: (H) a quite simple task (HH) moderately difficult; all students should be able to solve it (HHH) requires some nontrivial idea (HHHH) a major challenge for the best students

Exercise Sessions The weekly exercise class discusses solutions of the problem set from the previous week. The sessions on Monday and Tuesday cover the same material. There are no exercise classes in the first week of the semester, i.e., the first exercise classes are on February 29th and March 1st. Assistant

Time

Room

Christian Matt Monday 10–12 CAB G 52 Gregor Seiler

Tuesday 13–15 ETZ G 91

Exercise Sheets The material for this lecture is only available for users accessing this web page from the ETH network. If you see this message, please use VPN.

Reading Assignments There will be an additional reading assignment for this lecture (note the 1 A in the course catalogue). The reading assignment is the paper Practical Chosen Ciphertext Secure Encryption from Factoring by Dennis Hofheinz, Eike Kiltz, and Victor Shoup.

Exams There will be two written intermediate exams during the semester and one final oral exam during the exam session. The grade of each intermediate exam amounts to 20% of the final grade, and the grade of the final exam amounts to 60% of the final grade. All exams are “closed book”, i.e., no supplementary material is permitted. Date Intermediate Exam 1 April 6th

Starting Time

Duration

Room

13:15

45 Minutes ETF E 1

Intermediate Exam 2 May 11th 13:15

45 Minutes ETF E 1

Exam Review The correction of the first midterm can be reviewed on Tuesday, April 19th from 17:00 to 18:30 in CAB H 53. The correction of the second midterm can be reviewed on Monday, May 30th from 17:00 to 18:30 in CAB H 53.

Literature The course does not make use of textbooks, but we encourage the students to consult several books to get a more detailed and sometimes complementary view on the various topics. Some useful books on cryptography, each with a different focus, are listed below: O. Goldreich, Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001. J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2007. W. Mao, Modern Cryptography - Theory and Practice, Prentice Hall, 2004. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997. D.R. Stinson, Cryptography - Theory and Practice, CRC Press, 1995. 03-Jun-2016 / [email protected]

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.