Summer 2010
Note that the courses require knowledge in Cryptography, see our programme. This is for example provided by the course Cryptography in Winter 2009/2010.
- Monday, 1315-1445 sharp, Hörsaal, b-it.
- Thursday, 1230-1400 sharp, Hörsaal, b-it.
- Tutorial: Monday, 1100-1230 sharp, Meeting room, 1.25.
The art of cryptography: integral lattices
(4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.
)
Prof. Joachim von zur GathenTutorial: Daniel Loebenberger
Lattices are of great importance in the design and the analysis of cryptographic algorithms. The most important algorithm is the so called lattice basis reduction, which was invented by Lenstra, Lenstra and Lovasz in 1982 and revolutionized computational aspects of "the geometry of numbers", leading to breakthroughs in fields like computer algebra, cryptography and algorithmic number theory.
...
...
- Tuesday, 1330-1500, Hörsaal, b-it.
- Wednesday, 1330-1500, Hörsaal, b-it.
- Tutorial : Tuesday, 1515-1645, Hörsaal, b-it.
Esecurity: secure internet & evoting
(4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits.
)
Michael NüskenTutorial: Konstantin Ziegler
This course is about various aspects of security in the internet. In the first part we deal with secure connections, whereas the second part considers electronic voting schemes involving further tasks.
- Who can read my email?
- How do I know that eBay is eBay, or amazon is amazon?
- What is the public key of Angela Merkel? Where do I get it and how do I verify that ...
- Monday, 1630-1800 , b-it 2.1
First meeting: Monday, 26 April 2010 at 1630-
- Thursday 1000 - 1200, b-it 1.25.
Seminar Advanced Topics in Crytography (S2. )
Michael Nüsken
Each semester this seminar tries to dig deep into one specific topic within the wide area of cryptography and related subjects. This subject is chosen short before the start (though ideas may be around much earlier).
This semester's topic is
Symmetric mobile cryptography
We will start with a discussion of the algorithms used for securing communication with mobile phones and the most successful attacks. We will consider GSM and UMTS.
- Thursday 1500-1715, b-it 1.25.
Oberseminar Computer Security, Summer 2010
Prof. Dr. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.