SES # | TOPICS | KEY DATES |
---|---|---|
1 | Introduction | |
2 | Security Mechanisms and Principles | Problem set 1 Out |
3 | Encryption, Perfect Secrecy, One-Time Pad | |
4 | Cryptographic Hash Functions | |
5 | Hashing Applications and Constructions | |
6 | Bitcoin | Problem set 1 Due, Problem set 2 Out |
7 | Secret Sharing | |
8 | Block Ciphers | |
9 | Block Cipher Modes | |
10 | Message Authentication Codes | Problem set 2 Due, Project Ideas Due, Problem set 3 Out |
11 | Prime Finding and other “Crypto” Math | |
12 | Diffie-Hellman Key Exchange and Crypto Groups | |
13 | Pedersen Commitment, PK Encryption, DDH | Project Draft Due |
14 | Malleability of El Gamal, IND-CCA2 | Problem set 3 Due, Problem set 4 Out |
15 | Digital Signatures | |
16 | DSA, Gap Groups | Project Progress Review |
17 | Gap Groups, Bilinear Maps, and Applications | |
18 | Zero-Knowledge Proofs | Problem set 4 Due |
19 | No Lecture (Quiz) | Quiz |
20 | Security of Voting | Problem set 5 Out, Project Progress Review |
21 | Security of Voting (cont.) | |
22 | Project Presentations | |
23 | Project Presentations (cont.) | Problem set 5 Due |
24 | Project Presentations (cont.) | |
25 | Project Presentations (cont.) | |
26 | No Class | Final Project Due |
Calendar
Course Info
Instructor
Departments
As Taught In
Spring
2014
Level
Topics
Learning Resource Types
assignment_turned_in
Problem Sets with Solutions
notes
Lecture Notes
group_work
Projects
assignment
Programming Assignments