After starting teaching in cryptology and data security during 2019 and 2020, we are currently planning the following course offerings.

Undergraduate level – Bachelor Informatik, University of Bern

Two yearly courses:

  • Diskrete Mathematik (Fall)

  • Algorithmen, Wahrscheinlichkeit und Information (in German) (Spring)

Graduate level – University of Bern and Joint Master in Computer Science

Planned courses:

  • Cryptography (Fall 2020)

This course presents an introduction to modern cryptography. Based on mathematical models for reasoning about the security of information systems, the course explains the fundamental concepts of cryptography and discusses the most important cryptographic algorithms that are in everyday use on the Internet.

  • Cryptographic protocols (Spring 2021)

This course gives an introduction to the amazing world of cryptographic protocols with multilateral security. They realize such diverse goals as zero-knowledge proofs, secure multi-party computation, private online elections, auctions without trusted parties, distributed threshold cryptosystems and more. These methods have been developed over the last decades and start to find applications on the Internet today, ranging from nation-wide electronic voting and secure cloud platforms to cryptocurrencies and blockchains.

  • Privacy and Data Security (Fall 2021)

This course covers privacy and data security. It discusses privacy issues of the digital society and presents cryptographic and non-cryptographic methods relevant for privacy, anonymity, and data security.

  • Distributed Algorithms (Spring 2022)

This course provides an introduction to computing in a distributed environment without a central coordinator. It presents fundamental programming abstractions for distributed systems and fault-tolerant, highly available, and secure protocols that implement them. Important problems of distributed computing are discussed and influential impossibility results are shown. The central question of the course is how to tolerate uncertainty and adversarial influence, which may arise from network delays, faults, or malicious attacks in a distributed system.

See here for up-to-date information on the actual offerings.