Ueli Maurer: Catalogue data in Spring Semester 2021

Award: The Golden Owl
Name Prof. Dr. Ueli Maurer
FieldInformatik
Address
Inst. f. Theoretische Informatik
ETH Zürich, CAB H 19.2
Universitätstrasse 6
8092 Zürich
SWITZERLAND
Telephone+41 44 632 74 20
Fax+41 44 632 18 92
E-mailmaurer@inf.ethz.ch
URLhttp://www.crypto.ethz.ch/~maurer/
DepartmentComputer Science
RelationshipFull Professor

NumberTitleECTSHoursLecturers
252-0408-00LCryptographic Protocols Information 6 credits2V + 2U + 1AM. Hirt, U. Maurer
AbstractThe course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.
ObjectiveIndroduction to a very active research area with many gems and paradoxical
results. Spark interest in fundamental problems.
ContentThe course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc.
Lecture notesthe lecture notes are in German, but they are not required as the entire
course material is documented also in other course material (in english).
Prerequisites / NoticeA basic understanding of fundamental cryptographic concepts
(as taught for example in the course Information Security or
in the course Cryptography Foundations) is useful, but not required.
263-4651-00LCurrent Topics in Cryptography Information Restricted registration - show details
Number of participants limited to 24.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
2 credits2SD. Hofheinz, U. Maurer, K. Paterson
AbstractIn this seminar course, students present and discuss a variety of recent research papers in Cryptography.
ObjectiveIndependent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
ContentThe course lecturers will provide a list of papers from which students will select.
LiteratureThe reading list will be published on the course website.
Prerequisites / NoticeIdeally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”.