Information processing by electronic devices leads to a multitude of security-relevant challenges. With the help of cryptography, many of these challenges can be solved and new applications can be made possible.
What methods are hereby used? On which mathematical foundations do they rest? How did the prevailing ideas and methods come about? What are the current developments, what challenges exist and which future challenges can be predicted?