Cryptography II
Responsible
Prof. Dr. Joachim von zur Gathen
Lecture
Prof. Dr. Joachim von zur Gathen
Laila El Aimani
Time & Place
Tue. 12:30-14:00, b-it, 1.25
Wed. 17:30-19:00, b-it, 1.25
Tue. 10:00-11:30, b-it, 1.25 (Tutorial)
First meeting: Tuesday, 2006 April 4th, 12:30.
Prerequisites
Cryptography I recommended but not required
Contents
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures under orders and contracts in the internet. In this course, we will discuss thechnical and legal aspects of applications including digital signatures and identification, electronic passports, watermarking, and digital rights management.
Literature
-
- O. Goldreich, Foundations of Cryptography(Volumes I and II)
- O. Goldreich, Modern Cryptography, Probabilistic Proofs, and Pseudo-randomness.
- Lawrence C. Washington, Elliptic Curves, Number Theory and Cryptography