- Please read the course handout
- Email me if you need a copy of the project ideas. I'll also bring more printouts to class on Thursday.
- Problem set one is here
- Problem set two is here
- Problem set three is here
- Example latex for POA analysis is here
- Problem set four is here
- Interesting lecture on public-key crypto here
- Project progress reports due on Tuesday, April 5th. Please write a (typeset, preferrably with LaTeX) summary of: (1) reiteration of the project proposal; (2) refinements subsequently made to the proposal; (3) what you've got so far done; and (4) description of what you still have to do.
- Problem set five is here

Topic | Slides | Lecture notes |

Introduction | ||

Blockciphers | ||

Pseudorandom functions | ||

Birthday bounds | - | |

Symmetric Encryption | ||

Padding oracle attacks | - | |

Hash functions | ||

Message authentication | ||

Authenticated encryption | - | |

AE in practice: TLS, SSH, IPSec | ||

Randomness generation | ||

Computational number theory basics | ||

Public-key encryption | ||

PKE in practice: PGP | ||

Digital signatures | ||

Signatures in practice | ||

Key exchange | - | |

KE in practice: TLS, SSH | ||

Further topics: secure function evaluation, homomorphic encryption | ||