|Name||Prof. Dr. Ueli Maurer|
Inst. f. Theoretische Informatik
ETH Zürich, CAB H 19.2
|Telephone||+41 44 632 74 20|
|Fax||+41 44 632 18 92|
|252-0408-00L||Cryptographic Protocols||6 credits||2V + 2U + 1A||M. Hirt, U. Maurer|
|Abstract||The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.|
|Objective||Indroduction to a very active research area with many gems and paradoxical|
results. Spark interest in fundamental problems.
|Content||The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.|
|Lecture notes||the lecture notes are in German, but they are not required as the entire|
course material is documented also in other course material (in english).
|Prerequisites / Notice||A basic understanding of fundamental cryptographic concepts |
(as taught for example in the course Information Security or
in the course Cryptography Foundations) is useful, but not required.
|263-4651-00L||Current Topics in Cryptography |
Number of participants limited to 24.
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
|2 credits||2S||D. Hofheinz, U. Maurer, K. Paterson|
|Abstract||In this seminar course, students present and discuss a variety of recent research papers in Cryptography.|
|Objective||Independent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.|
|Content||The course lecturers will provide a list of papers from which students will select.|
|Literature||The reading list will be published on the course website.|
|Prerequisites / Notice||Ideally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”.|