Universität Paderborn - Home deutsch english Universität Paderborn
Die Universität der Informationsgesellschaft  42  

Sie befinden sich auf den alten Webseiten der Arbeitsgruppe!

Die aktuelle Version finden Sie unter http://www.cs.uni-paderborn.de/fachgebiete/ag-bloemer/lehre.

LSF login:

content of this page:

Fachgebiet Codes und Kryptographie

Cryptographic Protocols (SS 2007)

This site is still under construction!

Module information [^]

For further information see the corresponding section in the module handbook (in german only).

Topics [^]

Examination [^]

Please note the new regulations regarding the registration! In order to participate in the examination you have to register:

Students of any course program (including the old Bachelor/Diplom Computer Science course program, aka DPO4) have to register at their Prüfungsekretariat (office of examination affairs) at least three weeks before the examination date. Note that any regulations of your own course program apply.

Students, who are only interested in a Leistungsnachweis (graded certificate of proficiency) may participate without prior registration.

Additionally, we advise you to send an email to naestef[at]uni-paderborn.de containing the following information:

We will publish the schedule on this website on 1th October 2007.

Dates [^]

Lecture notes [^]

This course will make use of the literature given below. Beside this there will be no lecture notes.

Slides [^]

At some point, the slides from the lectures will be published here.

Exercises [^]

Here we will publish the home exercises. Eventually, solutions to the exercises will be posted here. The tutorial exercises will be handed out during the tutorials.

We encourage you to work on the exercises in small groups of 2 to 4 persons. This will greatly enhance your learning success (and your fun during this process). You may submit your exercise in such groups, but submission for more than 4 students will be assessed with 0 points!

Bonus system [^]

There will be no bonus system. However, your effort in the tutorials und exercises will be considered in the oral examination.

Literature [^]

[BR04]

Bellare, Rogaway: Lecture Notes on "Introduction to Modern Cryptography", University of California, San Diego, 2004--2005. Lecture notes available online!

[Gol01]

Goldreich: "Foundations of Cryptography: Basic Tools", Cambridge University Press, 2001. ISBN: 0-521-79172-3. Early draft version available online!

[GB01]

Goldwasser, Bellare: Lecture Notes on "Cryptography", MIT, 1996--2001. Lecture notes available online!

[Lin05]

Lindell: Lecture Notes on "Introduction to Cryptography", Bar-Ilan University, 2005. Lecture notes available online!

[MOV96]

Menezes, van Oorschot, Vanstone: "Handbook of Applied Cryptography", CRC Press, 1996. ISBN: 0-8493-8523-7. Complete book available online!

[Sho05]

Shoup: "A Computational Introduction to Number Theory and Algebra", Cambridge University Press, 2005. ISBN: 0-521-85154-8. Complete book available online!

[Sti01]

Stinson: "Cryptography: Theory and Practice", 2nd edition, Chapman & Hall / CRC Press, 2001. ISBN: 1-5848-8206-9.

[TW05]

Trappe, Washington: "Introduction to Cryptography with Coding Theory", 2nd edition, Pearson Prentice Hall, 2005. ISBN: 0-13-198199-4.


Letzte Änderung Mon, 1. Oct 2007, 13:56 CEST von