The course focuses on cryptographic protocols, their evaluation and analysis. For this, the construction of various modern cryptographic primitives, oblivious transfer, commitments, threshold cryptography, zero-knowledge proofs, secure multiparty computation (Yao’s garbled circuits), and identification protocols will be covered.