The slides of today's lecture are online under "Materials".
!!! Date Change
Unfortunately we need to move the introductory lecture from May 28, 4pm to June 04, 4pm.
Dates in Calendar
The proseminar dates with the respective topics can be found in the calendar and main page of the event.
If you already want to have a look at the topics that will be discussed in this seminar, you can do so now :)
Our Kick-Off Meeting will take place on Friday, April 30, from 3-4 pm via Zoom.
Please be prepared to switch on your camera during this call.
Seminal Papers in Cryptography
In this proseminar we study a selection of seminal research works in cryptography—starting with the invention of public-key cryptography in the 1970s and making our way towards the present. We discuss the novelty of these research results when they were first published as well as how they have shaped our understanding of modern cryptography.
Seminar Dates (Zoom links in Email):
Kick-off Meeting: Friday, April 30, 3-4pm via Zoom (link in Email)
- Presentation "Intro to Provable Security": Friday,
May 28June 04, 4-5:30 pm
- Student Presentations 1: Friday, June 11, 4-5:30 pm
- Diffie, Hellman: New Directions in Cryptography (1976)
- Goldwasser, Micali: Probabilistic Encryption & How to Play Mental Poker Keeping Secret All Partial Information (1982)
- Student Presentations 2: Friday, June 18, 4-5:30 pm
- Goldreich, Goldwasser, Micali: How to Construct Random Functions (1986)
- Bellare Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (1993)
- Student Presentations 2: Friday, June 25, 4-5:30 pm
- Bellare, Canetti, Krawczyk: Keying Hash Functions for Message Authentication (1996)
- Coron, Dodis, Malinaud, Puniya: Merkle-Damgård Revisited: how to Construct a Hash Function (2005)
- Presentations à 20-23 min + 20 min group discussion
- Final grade determined by presentation + active participation in discussion (read each paper before the session)
- Language is English both for presentation and discussion
Requirements: A basic understanding of cryptographic primitives such as encryption, signatures, and hash functions