Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.
I7 Logo
Chair for Foundations of Software Reliability and Theoretical Computer Science
Informatik Logo TUM Logo
Cryptography 2010/2011

  News | Dates | Grading | Content | Exercises | Material | Programming Project

Slides

  • Current version (09.02.2011, 14:56): [PDF][4-on-1-PDF]

  • Errata:
    • Slide 145: in the formula, replace one occurrence of U_{l(n)} by G(U_n).
    • Slide 240: replace ``not CPA-secure'' by ``not CCA-secure''.
    • Slide 241: the message should only consist of the last n bits, i.e., m_0 = 0^n, m_1= 1^n
    • Slide 377: in the formula replace ``hc_I'' by ``hc_J''. Alice and Eve only have access to the public function paramters J.


  • Annotated slides:

    Disclaimer: Provided "as is" with no claim of correctness.

References, Further Reading, Tools