PK rRE` ` imsmanifest.xml
IMS Content
1.1
OCW
CWSpace
0.1
Cryptography and Cryptanalysis
OCW Master Course Number
6.875
Spring 2005
OCW Course Topics
Engineering
Computer Science
Cryptography
OCW Course Topics
Engineering
Computer Science
Theory of Computation
contents/index.htm.xml
Cryptography and Cryptanalysis
-
Cryptography and Cryptanalysis
-
6-875s05.jpg
-
6-875s05-th.jpg
-
Syllabus
-
Calendar
-
Readings
-
Assignments
-
ho11_ps6.pdf
-
ho7_ps3.pdf
-
ho4_ps1.pdf
-
ho10_ps5.pdf
-
ho9_ps4.pdf
-
ho5_ps2.pdf
-
Study Materials
-
ho3.pdf
-
ho6.pdf
-
template1.tex
-
Legal Notices
-
Privacy Statement
-
Trademark Notices
contents/syllabus/index.htm.xml
contents/assignments/index.htm.xml
contents/assignments/ho7_ps3.pdf.xml
contents/assignments/ho11_ps6.pdf.xml
contents/readings/index.htm.xml
contents/study-materials/template1.tex.xml
contents/study-materials/index.htm.xml
contents/study-materials/ho6.pdf.xml
contents/index.htm.xml
contents/6-875s05-th.jpg.xml
contents/assignments/ho10_ps5.pdf.xml
contents/assignments/ho9_ps4.pdf.xml
contents/6-875s05.jpg.xml
contents/assignments/ho4_ps1.pdf.xml
contents/study-materials/ho3.pdf.xml
contents/calendar/index.htm.xml
contents/assignments/ho5_ps2.pdf.xml
PK lrR~3! 6-875-spring-2005/ReadMe.txtThis zip package contains the HTML pages and files associated with the course.
Some materials - such as videos, java applets, and other special content - are not posted on the OCW server, and are therefore not part of this package. This prevents zip packages from becoming too large for download. To download these resources to your computer, please read the FAQ at https://ocw.mit.edu/help/faq-technology/ .
Use of the materials in this package are governed by the same Creative Commons license as all other materials published on MIT OpenCourseWare. For more information, see https://ocw.mit.edu/terms .
If you have any trouble using this package, please contact us at ocw@mit.edu .PK lrR%aD6 6 6-875-spring-2005/START.htm
MIT OpenCourseWare | Welcome
Welcome to MIT Open Course Ware. You will be automatically redirected to Home. If you aren not forwarded to the new page, Click here to access the home page of the downloaded Click Here
PK rRU* U* . 6-875-spring-2005/contents/6-875s05-th.jpg.xml
6-875s05-th.jpg
New image Upload
en
LOMv1.0
2
Spring 2005
/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/6-875s05-th.jpg
image/jpeg
10704
LOMv1.0
Browser
LOMv1.0
Chrome
40.0
LOMv1.0
Browser
LOMv1.0
Safari
8.0
LOMv1.0
Browser
LOMv1.0
Mozilla Firefox
38.0
LOMv1.0
Browser
LOMv1.0
Internet Explorer
9.0
LOMv1.0
Browser
LOMv1.0
Edge
13.1
LOMv1.0
Other
OCW_LOMv1.0
Graduate
LOMv1.0
yes
This site (c) Massachusetts Institute of Technology 2021. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions.
LOMv1.0
ispartof
OCW Master Course Number
6.875 Cryptography and Cryptanalysis Spring 2005
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.
CIP
111003
Computer and Information Systems Security
LCSH
Cryptography
6.875
modern cryptography
fundamental cryptographic primitives
public-key encryption
digital signatures
pseudo-random number generation
basic protocols
computational complexity
two-party protocols
zero-knowledge
PK rR%G~ ' ' ( 6-875-spring-2005/contents/index.htm.xml
Cryptography and Cryptanalysis
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.
OCW Master Course Number
6.875
en
LOMv1.0
4
Spring 2005
2005/10/07 02:28:55 GMT-4
2016/02/05 02:37:34.869 US/Eastern
/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/index.htm
LOMv1.0
Browser
LOMv1.0
Chrome
40.0
LOMv1.0
Browser
LOMv1.0
Safari
8.0
LOMv1.0
Browser
LOMv1.0
Mozilla Firefox
38.0
LOMv1.0
Browser
LOMv1.0
Internet Explorer
9.0
LOMv1.0
Browser
LOMv1.0
Edge
13.1
OCW_LOMv1.0
Graduate
LOMv1.0
yes
This site (c) Massachusetts Institute of Technology 2021. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions.
CIP
111003
Computer and Information Systems Security
LCSH
Cryptography
6.875
modern cryptography
fundamental cryptographic primitives
public-key encryption
digital signatures
pseudo-random number generation
basic protocols
computational complexity
two-party protocols
zero-knowledge
PK rR ' 6-875-spring-2005/contents/6-875s05.jpg JFIF H H )Exif MM * b j( 1 r2 i
'
'Adobe Photoshop CS2 Macintosh 2009:07:18 09:25:35 @ &( . (a H H JFIF H H Adobe_CM Adobe d
s "
?
3 !1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw 5 !1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ? ֺCţ#2ˏKXH!u~+ ~ q̫ J #9}V[2;3)`w7?}$e_U]2wǫK.m,,i]͌\GK{:nczms+V=}Nt _CAĪ,(49c籎U7~$ l* ҩ?6OUzMɢm/
@mf?}? 'WԮ,nq1rX*Ⱥ۴z}շ}~?H_q 2*8d WYR:S2jMtW9>
vSouk*NOӧUF}n>ǹ$Xܜk\ٿ"[OWs ~ q̫ J ?@ ?U U#욟us5ՌlW{?fQoVG_UꭿS{.5ZaȪٷx:-?i) l* ҩ?6OUCkdmK1}[nW_U/=>t
}KӹrWY$S ~ q̫ J ?@ ?U VMS0-y6Yc1͟ӯ{=?QERuf3m1eZn3ߞg,gdUn?JbJo ?6OT'ʿ[Etϡy֏)u?o j~/ӓN5-ϭ/^MozB~gKiIN8d WK ~ q̫ J}Bۘr.{*wW'_
>o z,