*
Lecturer: Ueli Maurer
Assistants: Fabio Banfi, Daniel Jost, and Jiamin Zhu
*

## Lecture

The lecture takes place on Wednesdays 13–16 in CAB G 51.

The first lecture is on February 20. There are no exercise sessions in the first week.

## Lecture Notes

**The lecture notes are only available for users accessing this web page using ETH VPN. If you see this message, please use VPN**

## Exercises

A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during the exercise sessions in the following week. You are not required to hand in your solutions to the exercises. However, if you wish to receive feedback, feel free to hand in your solutions to your assistant.

### Exercise Sessions

The weekly exercise class discusses solutions to the exercise questions. The sessions on Monday and Tuesday cover the same material.

*There are no exercise classes in the first week of the semester, i.e., the first exercise classes are on February 25 and 26.*

Assistant | Time | Room |
---|---|---|

Jiamin Zhu | Monday 10–12 | CAB G 52 |

Fabio Banfi | Tuesday 13–15 | CAB G 57 |

### Exercise Sheets

Exercises | Solutions |
---|---|

Exercise 1 | Solution 1 |

Exercise 2 | Solution 2 |

Exercise 3 | Solution 3 |

Exercise 4 | Solution 4 |

Exercise 5 |

## Reading Assignments

The reading assignment for this lecture (note the 1 A in the course catalogue) is defined:

- Book chapter "Cryptography and Computation after Turing" by Prof. Ueli Maurer. Source: Chapter 4 of the book "The Once and Future Turing", Cambridge University Press, 2016

## Midterm

There will be one written intermediate exam ("midterm") during the semester. The grade achieved in the midterm influences the final grade if this influence is beneficial: The final grade is the maximum of (1) the grade achieved in the final session exam and (2) the weighted average of the grades achieved in the midterm (25%) and in the final session exam (75%).

All exams are “closed book”, i.e., no supplementary material is permitted.

Date | Starting Time | Duration | Room | |
---|---|---|---|---|

Intermediate Exam | April 3 | 13:15 | 60 Minutes | Normal lecture room |

## Literature

The course does not make use of textbooks, but we encourage the students to consult several books to get a more detailed and sometimes complementary view on the various topics. Some useful books on cryptography, each with a different focus, are listed below:

- O. Goldreich, Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001.
- J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2007.
- N. Smart, Cryptography Made Simple, Springer Verlag, 2016.
- W. Mao, Modern Cryptography - Theory and Practice, Prentice Hall, 2004.
- A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997.
- D.R. Stinson, Cryptography - Theory and Practice, CRC Press, 1995.