Selected Topics in Cryptography

Securely realizing an ideal functionality F.

Securely realizing an ideal functionality F. (Image courtesy of Brett Paci.)

Instructor(s)

MIT Course Number

6.897

As Taught In

Spring 2004

Level

Graduate

Cite This Course

Course Features

Course Description

This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Canetti, Ran. 6.897 Selected Topics in Cryptography, Spring 2004. (MIT OpenCourseWare: Massachusetts Institute of Technology), http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-897-selected-topics-in-cryptography-spring-2004 (Accessed). License: Creative Commons BY-NC-SA


For more information about using these materials and the Creative Commons license, see our Terms of Use.


Close