Skip to main content.
Advanced Cryptography
Advanced lecture in winter term 2007/2008

Teaching Assistant
Lecture Period
Wed, March 12 - Fri, March 28 (block course)
Lectures
Daily (Mon-Fri) 10-12, Building E1 3, HS 001.
Tutorials
Daily (Mon-Fri) 16-18, Building E1 3, HS 001.
Course Material
Lecture notes, slides and papers suggested during the course
Language
English
Exam
Fri, April 11, 10-12, Building E1 3, HS 001 + 002 + 003.
Contact

News

Course Outline

Date Topics Slides Homework Solutions References
03/12/2008 Logistics, Introduction to One-Way Functions .pdf .pdf .pdf Goldreich (Chapter 1, 2.1, 2.2)
03/13/2008 On Weak vs. Strong One-Way Functions .pdf .pdf .pdf Goldreich (Chapter 2.3)
03/14/2008 Collections of OWF and TP, hard-core predicates .pdf .pdf .pdf Goldreich (Chapters 2.4.2, 2.4.4, 2.5)
03/17/2008 Computational indistinguishability, pseudorandom generators .pdf .pdf .pdf Goldreich (Chapters 3.2, 3.3, 3.4, 3.5)
03/18/2008 Pseudorandom functions .pdf .pdf .pdf Goldreich (Chapters 3.6.1, 3.6.2)
03/19/2008 Interactive proof systems, zero-knowledge proofs .pdf .pdf .pdf Goldreich (Chapters (4.1), 4.2, 4.3)
03/20/2008 Zero-knowledge for all of NP .pdf .pdf .pdf Goldreich (Chapter 4.4)
03/25/2008 Encryption Schemes I .pdf .pdf .pdf Goldreich II (Chapter 5)
03/26/2008 Encryption Schemes II .pdf .pdf .pdf Goldreich II (Chapter 5)
03/27/2008 Signatures I .pdf .pdf .pdf Goldreich II (Chapter 6)
03/28/2008 Signatures II .pdf .pdf .pdf Goldreich II (Chapter 6)

Description and List of Topics

This course will cover more advanced, foundational aspects of cryptography than those covered by the core lecture cryptography. In particular, things are treated more formally and from a more theoretical point of view. 

The first half of the lecture will follow the following book:

The second half will deal with different foundational aspects of cryptography not covered there, and we will give detailed references to papers and provide suitable lecture notes.

Prerequisites

This course is an advanced lecture on foundational issues in cryptography. You should have attended the core theory lecture on cryptography and have a solid background in theoretical computer science. Knowledge especially in complexity theory and elementary probability theory will prove useful.

Reading

Further reading will be suggested during the course.