Bonn-Aachen International Center
for Information Technology





city life
cosec >students >Teaching >Summer 2010 

Summer 2010

Note that the courses require knowledge in Cryptography, see our programme. This is for example provided by the course Cryptography in Winter 2009/2010.

  • Monday,  1315-1445 sharp, Hörsaal, b-it.
  • Thursday, 1230-1400 sharp, Hörsaal, b-it.
  • Tutorial: Monday, 1100-1230 sharp, Meeting room, 1.25.

The art of cryptography: integral lattices
(4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )

Prof. Joachim von zur Gathen
Tutorial: Daniel Loebenberger
Lattices are of great importance in the design and the analysis of cryptographic algorithms. The most important algorithm is the so called lattice basis reduction, which was invented by Lenstra, Lenstra and Lovasz in 1982 and revolutionized computational aspects of "the geometry of numbers", leading to breakthroughs in fields like computer algebra, cryptography and algorithmic number theory.
  • Tuesday, 1330-1500, Hörsaal, b-it. 
  • Wednesday, 1330-1500, Hörsaal, b-it.
  • Tutorial : Tuesday, 1515-1645, Hörsaal, b-it.
First meeting: Tuesday 13 April 2010 at 1330-

Esecurity: secure internet & evoting
(4+2 SWS, 8 credits. Optionally, 3+2 SWS, 6 credits. )

Michael Nüsken
Tutorial: Konstantin Ziegler
This course is about various aspects of security in the internet. In the first part we deal with secure connections, whereas the second part considers electronic voting schemes involving further tasks.
  • Monday, 1630-1800 , b-it 2.1
    First meeting: Monday, 26 April 2010 at 1630-

Seminar Securing ecommerce (2 SWS, 4 credits )

Prof. Dr. Joachim von zur Gathen, Konstantin Ziegler

  • Thursday 1000 - 1200, b-it 1.25.
First meeting: Thursday, 15 April 2010, 1000, b-it 1.25.
Each semester this seminar tries to dig deep into one specific topic within the wide area of cryptography and related subjects.  This subject is chosen short before the start (though ideas may be around much earlier). This semester's topic is Symmetric mobile cryptography We will start with a discussion of the algorithms used for securing communication with mobile phones and the most successful attacks. We will consider GSM and UMTS.
  • Thursday 1500-1715, b-it 1.25.
Organizational meeting: Thursday 29 April 2010 at 1500 , b-it 1.25.

Oberseminar Computer Security, Summer 2010

Prof. Dr. Joachim von zur Gathen
The seminar discusses subjects of current interest in computer security. Some of the lectures will be given by invited guests.
Imprint, webmaster & more