Bonn-Aachen International Center
for Information Technology





city life
cosec >students >Teaching >Winter 2009/2010  

Winter 2009/2010

Note that the course Cryptography will be required for the courses in the upcoming summer!  This is part of a new scheduling of our courses.  More information on this issue will appear here soon.

  • Monday, 1300-1430,  b-it bitmax.
  • Thursday, 1300-1430,  b-it bitmax.
  • Tutorial 1: Monday, 1445-1615, b-it bitmax.
  • Tutorial 2: Tuesday, 1130-1300, b-it Rheinsaal.
No lecture on Thursday, 7 January 2010.

Cryptography (4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )

Prof. Joachim von zur Gathen

Tutorial: Konstantin Ziegler
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures ...
  • Tuesday 1300-1430, b-it Rheinsaal.
  • Wednesday 1300-1430, b-it Rheinsaal.
  • Tutorial: Tuesday 1445-1615, b-it Rheinsaal or b-it 1.25.
First meeting: Tuesday, 27 October 2009, 1330, b-it Rheinsaal.

Elliptic Curve Cryptography (4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )

Michael Nüsken
Tutorial: Daniel Loebenberger
We intend to introduce elliptic curves as used in cryptography. That encompasses definition and properties of the group law and of pairings. The necessary maths will be discussed in the course. The computationally interesting part starts when we try to implement elliptic curve arithmetic as good as possible.  The last few years have brought up quite a few surprising developments.  One ...
  • Monday, 1700- 1830, b-it 2.1.
First meeting : Monday 26 October 2009, 1630, b-it 2.1.

Seminar Biometry & Security
(2 SWS, 4 credits )

 Laila El Aimani, Deniz Sarier

These are the possible topics of the talks (Asterisks indicate advanced topics). Students are also welcome to propose their own topics.
  1. Fuzzy extractors
    • (*) Dodis, Y., Reyzin, L., Smith, A.: ...

  • Thursday 1000 - 1200, b-it 1.25.
First meeting: Thursday, 29 October 2009, 1000, b-it 1.25.
The topic is not yet determined.  Previous instantiations dealt with Fuzzy Coding Theory, Zero-Knowledge, PCP, Ellitpic Curve Theory, ...  In any case the topic will try to dig deeper than what you expect in a standard course or seminar. Coding theory with a focus to Misoczki & Barreto (2009)
  • Thursday 1500-1715, b-it 1.25.
Organizational meeting: Thursday 29 October 2009, 1500 , b-it 1.25.

Oberseminar Computer Security, Winter 2009/2010

Prof. Dr. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.
  • Donnerstag, 1930-2030, b-it bitmax.

Ringvorlesung Datenschutz

Prof. Dr. Joachim von zur Gathen,
Prof. Alexander Markowetz, PhD

Diese Ringvorlesung widmet sich dem Datenschutz, einem brisanten, jedoch relativ jungen Thema. In der Tat beschränkt sich der politische Diskurs bezüglich des Umgangs mit unseren Daten fast gänzlich auf die zweite Hälfte des zwanzigsten Jahrhunderts. Deutschland war mit dem weltweit ersten Datenschutzgesetz wegweisend, und in kaum einem anderen Land wurde das Thema ...
Imprint, webmaster & more