*
Lecturer: Ueli Maurer
Assistants: Christian Badertscher and Fabio Banfi
*

## News

- April 11:
**The Reading Assignment is defined.**See below for futher details. - April 5: The midterm location has changed: ML H 44 (April 11, 13:15-14:15). See below for futher details. After the midterm the lecture continues at 14:30 in the usual lecture room.

## Lecture

The lecture takes place on Wednesdays 13–16 in CAB G 51.

The first lecture is on February 21. There are no exercise sessions in the first week.

## Lecture Notes

**The lecture notes are only available for users accessing this web page using ETH VPN. If you see this message, please use VPN**

## Exercises

A new problem set is distributed every week at the beginning of the lecture. Detailed solutions are handed out during the exercise sessions in the following week. You are not required to hand in your solutions to the exercises. However, if you wish to receive feedback, feel free to hand in your solutions to your assistant.

### Exercise Sessions

The weekly exercise class discusses solutions to the exercise questions. The sessions on Monday and Tuesday cover the same material.

*There are no exercise classes in the first week of the semester, i.e., the first exercise classes are on February 26 and 27.*

Assistant | Time | Room |
---|---|---|

Fabio Banfi | Monday 10–12 | CAB G 52 |

Christian Badertscher | Tuesday 13–15 | CAB G 57 |

### Exercise Sheets

Exercises | Exercise Solutions |
---|---|

Exercise 1 | Solution 1 |

Exercise 2 (Updated on March 5) | Solution 2 |

Exercise 3 | Solution 3 |

Exercise 4 | Solution 4 |

Exercise 5 | Solution 5 (Updated on April 9) |

Exercise 6 (Updated on April 4) | Solution 6 |

Exercise 7 | - |

Exercise 8 | - |

## Reading Assignments

The reading assignment for this lecture (note the 1 A in the course catalogue) is defined:

- Book chapter "Cryptography and Computation after Turing" by Prof. Ueli Maurer. Source: Chapter 4 of the book "The Once and Future Turing", Cambridge University Press, 2016

## Midterm

There will be one written intermediate exam ("midterm") during the semester. The grade achieved in the midterm influences the final grade if this influence is beneficial: The final grade is the maximum of (1) the grade achieved in the final session exam and (2) the weighted average of the grades achieved in the midterm (25%) and in the final session exam (75%).

All exams are “closed book”, i.e., no supplementary material is permitted.

Date | Starting Time | Duration | Room | |
---|---|---|---|---|

Intermediate Exam | April 11 | 13:15 | 60 Minutes | ML H 44 |

### Review of the Midterm

The correction of the midterm can be reviewed. Date and location will be announced.

## Literature

The course does not make use of textbooks, but we encourage the students to consult several books to get a more detailed and sometimes complementary view on the various topics. Some useful books on cryptography, each with a different focus, are listed below:

- O. Goldreich, Foundations of Cryptography, Basic Tools, Cambridge University Press, 2001.
- J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall, 2007.
- N. Smart, Cryptography Made Simple, Springer Verlag, 2016.
- W. Mao, Modern Cryptography - Theory and Practice, Prentice Hall, 2004.
- A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997.
- D.R. Stinson, Cryptography - Theory and Practice, CRC Press, 1995.