Advanced Methods of Cryptography (V2/Ü1)
You should sign up in the Lehr- und Lernportal der RWTH Aachen for getting up-to-date information.
Links to RWTH Online
Contents
- Recapitulation of "Cryptography" (watch the video from the Video AG)
- Public key cryptography
- Cryptographic hash functions
- Signature schemes
- Identification and entity authentication
- Elliptic curves
- Quantum cryptography
- Cryptocurrencies
Prerequisites
Basic knowledge in stochastic and number theory. The knowledge of our lecture Cryptography is beneficial but not strictly required.
Literature
- Our lecture notes for Cryptography & Advanced Methods of Cryptography.
- Slides on Ellipctic Curve Cryptography
- Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone.
- Lecture notes of the lecture Stochastik für Informatiker by Rudolf Mathar.
- The book Informationstheorie by Rudolf Mathar.
- Complete list of the bibliography.
- Video recordings of the lecture in WS2015/16 by Video AG.
- Video recordings of the lecture in WS2012/13 by Video AG.
Help-sheet
- Help-sheet for Cryptography (english version)
- Hilfsblatt zur Kryptographie (german version)
Lecture Notes
- Lecture 1 (12.10.2018): Organizational stuff, repetition of cryptography, outlook to AMC
- Lecture 2 (19.10.2018)
- Lecture 3 (26.10.2018)
- Lecture 4 (02.11.2018)
- Lecture 5 (09.11.2018)
- Lecture 6 (16.11.2018)
- Lecture 7 (23.11.2018)
- Lecture 8 (30.11.2018)
- Lecture 9 (07.12.2018)
- Lecture 10 (21.12.2018)
- Lecture 11 (11.01.2019)
- Lecture 12 (18.01.2019)
- Lecture 13 (25.01.2019)
- Lecture 14 (01.02.2019)
Tutorials
- Tutorial 1 – Solution 1
- Tutorial 2 – Solution 2
- Tutorial 3 – Solution 3
- Tutorial 4 – Solution 4
- Tutorial 5 – Solution 5
- Tutorial 6 – Solution 6
- Tutorial 7 – Solution 7
- Tutorial 8 – Solution 8
- Tutorial 9 – Solution 9
- Tutorial 10 – Solution 10
- Tutorial 11 – Solution 11
- Tutorial 12 – Solution 12
- Tutorial Review – Solution Review