Suchergebnis: Katalogdaten im Frühjahrssemester 2022
Mathematik Bachelor | ||||||
Wahlfächer | ||||||
Auswahl: Theoretische Informatik Im Bachelor-Studiengang Mathematik ist auch 401-3052-05L Graph Theory als Wahlfach anrechenbar, aber nur unter der Bedingung, dass 401-3052-10L Graph Theory nicht angerechnet wird (weder im Bachelor- noch im Master-Studiengang). Wenden Sie sich für die Kategoriezuordnung nach dem Verfügen des Prüfungsresultates an das Studiensekretariat (www.math.ethz.ch/studiensekretariat). | ||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | |
---|---|---|---|---|---|---|
252-0408-00L | Cryptographic Protocols | W | 6 KP | 2V + 2U + 1A | M. Hirt | |
Kurzbeschreibung | The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc. | |||||
Lernziel | Indroduction to a very active research area with many gems and paradoxical results. Spark interest in fundamental problems. | |||||
Inhalt | The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc. | |||||
Skript | We provide short lecture notes and handouts of the slides. | |||||
Voraussetzungen / Besonderes | A basic understanding of fundamental cryptographic concepts (as taught for example in the course Information Security or in the course Cryptography Foundations) is useful, but not required. | |||||
263-4660-00L | Applied Cryptography Number of participants limited to 150. | W | 8 KP | 3V + 2U + 2P | K. Paterson | |
Kurzbeschreibung | This course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems. | |||||
Lernziel | The goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so. | |||||
Inhalt | Basic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications. | |||||
Literatur | Textbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”, https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf. | |||||
Voraussetzungen / Besonderes | Students should have taken the D-INFK Bachelor's course “Information Security" (252-0211-00) or an alternative first course covering cryptography at a similar level. / In this course, we will use Moodle for content delivery: https://moodle-app2.let.ethz.ch/course/view.php?id=14558. |
- Seite 1 von 1