UPB Bildmarke
Codes and Cryptography
Contact
  • Deutsch
  • English
    • Open Page "Teaching"
      • Open Page "Current Courses"
      • Foundations of Cryptography
      • Komplexitätstheorie (in English)
      • Seminar: Current topics in Cryptography
      • Open Page "Terms"
      • Overview of all terms
      • ST 2025
      • WS 2024/25
      • SS 2024
      • WT 2023/24
      • SS 2023
      • WT 2022/23
      • ST 2022
      • WT 2021/22
      • ST 2021
      • WT 2020/21
      • ST 2020
      • WT 2019/2020
      • Open Page "Student Projects"
      • Open Theses
      • Material / Theses templates
      • Completed Diploma-/Masterstheses
      • Completed Bachelorstheses
    • Open Page "Research"
      • Open Page "Thematic Priorities"
      • Anonymous Credential Systems
      • Cryptimeleon
      • Incentive Systems
      • Rational Cryptography
      • Secure Multiparty Computation
      • Clusteranalysis
      • Open Page "Projects"
      • CRC 901
      • Soft-Clustering -- Von Heuristiken zu Approximationsalgorithmen
      • Securing the Financial Cloud
      • KogniHome
      • Completed Projects
      • Open Page "Publications"
      • List of Publications
      • Dissertations
    • Open Page "Team"
    • Johannes Blömer
    • Elisabeth Schlatt
    • Henrik Bröcher
    • Laurens Porzenheim
    • Stanislaw Soltan
    • Yinzi Xiao
    • Former Employees
    • Open Page "Faculty"
    • Faculty of Computer Science, Electrical Engineering and Mathematics
    • Department of Electrical Engineering and Information Technology
    • Department of Computer Science
    • Institute of Mathematics
Found­a­tions of Cryp­to­graphy
Found­a­tions of Cryp­to­graphy
Or­gan­isa­tion
Dates and Times
  1. Faculty of Computer Science, Electrical Engineering and Mathematics
  2. Institute of Computer Science
  3. Codes and Cryptography
  4. Teaching
  5. Courses
  6. ST 2025
  7. Foundations of Cryptography

Found­a­tions of Cryp­to­graphy

This course covers theoretical foundations of cryptography. During this course, we address different cryptographic topics. Per topic, we typically proceed as follows: We introduce formal security definitions, construct a corresponding scheme from other primitives (such as one-way functions) and formally prove its security. These steps require understanding of (at least basic) probability theory, algorithm design and basic complexity theory. In the private-key setting, we especially construct encryption schemes and message authentication codes from one-way functions according to this pattern. In the public-key setting, for example, we construct encryption schemes and digital signatures.

Or­gan­isa­tion

After registering in PAUL for our course, you are enrolled (up to 24 hours later) to our PANDA course via which we organize FoC. This year, we offer FoC in the "traditional" way, so not in the flipped-classroom format from last years. 

Dates and Times

Check PAUL for lecture times and tutorial times. Any changes to the schedule will be published via PANDA.

Codes and Cryptography

Warburger Str. 100
33098 Paderborn
Germany

Universität Paderborn

Warburger Str. 100
33098 Paderborn
Germany

Phone University

+49 5251 60-0
Legal notice
  • Imprint
  • Data privacy
  • Whistleblower system
Social networks