Note: This is an archvied version of our old webpage. Some links might be broken. The current one can be found here.
I7 Logo
Chair for Foundations of Software Reliability and Theoretical Computer Science
Informatik Logo TUM Logo
Cryptography: theory and applications

  News | Content | Grading | Time schedule | Material

16.06.2014

Note that all meetings take place from 10 till 12 (a.m.) in room 03.09.014.

06.02.2014

Distribution of topics is complete. The seminar is full now, sorry.. -- please do not write us any more emails.

For all participants: we will assign advisors and send you material in the next weeks :).

24.01.2014

Summary of first meeting:

If you want to participate, please write to me or Maximilian an email with

  • a short motivation including a list of courses related to cryptography you have taken;
  • the semester you are in; and
  • a list of at least three topics you are interested in -- feel free to rank the topics.
Deadline: 16.02.2014 06.02.2014

We will then assign topics on the 17.02. 07.02. and inform you accordingly.

In case of more than 10 applicants, we will base our decision on who to take on [in descending order of relevance] (1) the motivation & courses taken, (2) time of application, and (3) a random number generator (in the worst case) like this.

23.01.2014

First meeting on 24.01.2014 in 03.09.014 at 14:00.