Cryptographic protocols allow parties with potentially conflicting interests to jointly perform certain tasks. This course covers basic and advanced constructions for cryptographic protocols and their applications, including Commitments, Secure Coin Flipping, Zero-Knowledge Proofs, Mixnets, Anonymous Credentials, Private Information Retrieval, Secure Multiparty Computation, and Hardware-assisted Cryptographic Protocols.
Basic knowledge in applied cryptography is strongly recommended, e.g., by successfully completing the course “Computer Security” or "Introduction to Cryptography”.
Lectures and exercises will take place in presence. We will provide recordings of the lectures.
In case of questions regarding this course, please contact email@example.com-….