Cryptography Sommersemester 2019 / Summer term 2019

LectureTuesday  09:15-10:45HG 0.18Prof. Dr. Meer
LectureThursday  13:45 - 15:15HG 0.19Prof. Dr. Meer
ExerciseFriday  13:45 - 15:15HG 2.44A. Naif, M.Sc.


Re-Exam in Cryptography, originally planned for March 2020:

The re-exam on the course 'Cryptography' taught by Prof. Meer last summer (2019) as well as the regular exam on this course given by Dr. Mehlitz during this summer term (2020) will be merged into one written exam.
This exam takes place
                                           on Friday, 24th of July,
                                           08:30 am - 10:00 am,
                                           in room ZHG Audimax 2.

Keep some writing paper ready, we will not provide any paper. You are allowed to bring with
you two handwritten standard A4 pages of notes (either the front and the back of a single
sheet of paper OR (exclusive OR) the fronts of two sheets of paper). The use of electronic
devices like calculators, smart watches, or smartphones is not allowed during the exam.
The use of other additional supplementary material like your lecture notes or text books is
also illegal. If necessary, we will equip you with a Vigenère table.
Please bring also an identification card and put it in front of your desk.

Special guidelines due to COVID-19 situation:

Course information

  • Enrollment: 
    1. electronically for the module
    2. You have to register yourself in Moodle using your BTU account.
        There is no password required, registration can be done immediately.
  • first lecture: 2 April 2019. Here we shall also discuss potential changes of the lecturing hours.
  • first exercise: 5 April 2019
  • Final written exam: Tuesday, 24 September 2019,
                                    01:00 - 02:30 p. m.
                                    ZHG, HS A
  • Important information on prerequisites: The course at many places is relying on basic knowledge about discrete mathematics that you should have learned in your Bachelor's education. Typical examples are a basic familiarity with concepts such as groups, rings, and (finite) fields, vector spaces, basic number theoretic statements and algorithms such as prime number decomposition, the (extended) Euclidean algorithm, the Chinese Remainder Theorem etc. Though in the run of the course we briefly address those things again when they come up you are strongly recommended to  study them early again in textbooks as soon as you have the feeling that your knowledge or remembrance is not sufficient. Most of the books in the reference list contain brief surveys on these topics.

Additional literature

  • G. Baumslag, B. Fine, M. Kreuzer, G. Rosenberger: A course in mathematical cryptography, De Gruyter Graduate 2015
  • J. Buchmann: Einführung in die Kryptographie (in German), Springer 2016
  • V. Diekert, M. Kufleitner, G. Rosenberger: Diskrete Algebraische Methoden (in German), De Gryuter Studium 2013; the book in the meanwhile is also available in English
  • J. Hoffstein, J. Pipher, J.S. Silverman: An Introduction to Mathematical Cryptography, 2nd edition, 2014 Springer
  • O. Goldreich: Foundations of Cryptography - Volume I Basic Tools, Cambridge University Press 2001
  • J. Rothe: Komplexitätstheorie und Kryptologie (in German), Springer 2008
  • D.R. Stinson: Cryptography - Theory and Practice, CRC Press 1995

Exercise sheets

Sheet 1
online since: 05.04.2019
Sheet 2
online since:  24.04.2019
Sheet 3
online since: 09.05.2019
Sheet 4
online since: 07.06.2019
Sheet 5
online since: 11.05.2019
Sheet 6
online since: 05.07.2019
Sheet 7
online since:
Sheet 8
online since:

Unsere Webseite verwendet Cookies. Diese haben zwei Funktionen: Zum einen sind sie erforderlich für die grundlegende Funktionalität unserer Website. Zum anderen können wir mit Hilfe der Cookies unsere Inhalte für Sie immer weiter verbessern. Hierzu werden pseudonymisierte Daten von Website-Besuchern gesammelt und ausgewertet. Das Einverständnis in die Verwendung der technisch nicht notwendigen Cookies können Sie jeder Zeit wiederrufen. Weitere Informationen erhalten Sie auf unseren Seiten zum Datenschutz.


Diese Cookies werden für eine reibungslose Funktion unserer Website benötigt.


Für den Zweck der Statistik betreiben wir die Plattform Matomo, auf der mittels pseudonymisierter Daten von Websitenutzern der Nutzerfluss analysiert und beurteilt werden kann. Dies gibt uns die Möglichkeit Websiteinhalte zu optimieren.

Name Zweck Ablauf Typ Anbieter
_pk_id Wird verwendet, um ein paar Details über den Benutzer wie die eindeutige Besucher-ID zu speichern. 13 Monate HTML Matomo
_pk_ref Wird benutzt, um die Informationen der Herkunftswebsite des Benutzers zu speichern. 6 Monate HTML Matomo
_pk_ses Kurzzeitiges Cookie, um vorübergehende Daten des Besuchs zu speichern. 30 Minuten HTML Matomo