Winter 2009/2010
Note that the course Cryptography will be required for the courses in the upcoming summer! This is part of a new scheduling of our courses. More information on this issue will appear here soon.
- Monday, 1300-1430, b-it bitmax.
- Thursday, 1300-1430, b-it bitmax.
- Tutorial 1: Monday, 1445-1615, b-it bitmax.
- Tutorial 2: Tuesday, 1130-1300, b-it Rheinsaal.
Cryptography (4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )
Prof. Joachim von zur GathenTutorial: Konstantin Ziegler
Cryptography deals with methods for secure data transfer. In earlier times this was the domain of military and intelligence agencies, but today modern cryptography has grown into a key technology, enabling e-commerce and secure internet communications. Its many applications range from credit and debit cards, mobile phones, tv decoders, and electronic money to unforgeable electronic signatures ...
- Tuesday 1300-1430, b-it Rheinsaal.
- Wednesday 1300-1430, b-it Rheinsaal.
- Tutorial: Tuesday 1445-1615, b-it Rheinsaal or b-it 1.25.
Elliptic Curve Cryptography (4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )
Michael NüskenTutorial: Daniel Loebenberger
We intend to introduce elliptic curves as used in cryptography. That encompasses definition and properties of the group law and of pairings. The necessary maths will be discussed in the course.
The computationally interesting part starts when we try to implement elliptic curve arithmetic as good as possible. The last few years have brought up quite a few surprising developments. One ...
- Monday, 1700- 1830, b-it 2.1.
These are the possible topics of the talks (Asterisks indicate advanced topics). Students are also welcome to propose their own topics.
- Fuzzy extractors
-
(*) Dodis, Y., Reyzin, L., Smith, A.: ...
-
- Thursday 1000 - 1200, b-it 1.25.
Seminar Advanced Topics in Crytography (S2. )
Michael Nüsken
The topic is not yet determined. Previous instantiations dealt with Fuzzy Coding Theory, Zero-Knowledge, PCP, Ellitpic Curve Theory, ... In any case the topic will try to dig deeper than what you expect in a standard course or seminar.
Coding theory with a focus to Misoczki & Barreto (2009)
- Misoczki & Barreto (2009). Compact McEliece Keys from Goppa Codes. ( ...
- Thursday 1500-1715, b-it 1.25.
Oberseminar Computer Security, Winter 2009/2010
Prof. Dr. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.
- Donnerstag, 1930-2030, b-it bitmax.
Diese Ringvorlesung widmet sich dem Datenschutz, einem brisanten, jedoch relativ jungen Thema. In der Tat beschränkt sich der politische Diskurs bezüglich des Umgangs mit unseren Daten fast gänzlich auf die zweite Hälfte des zwanzigsten Jahrhunderts. Deutschland war mit dem weltweit ersten Datenschutzgesetz wegweisend, und in kaum einem anderen Land wurde das Thema ...