Instructor : Andrej Bogdanov
Textbook : Introduction to Modern Cryptography , Jonathan Katz ,Yehuda Lindell
Download slides from here
| 1 | What is cryptography? The one-time pad. Computational assumptions. | [pdf] |
| 2 | Message indistinguishability and semantic security. Pseudorandom generators. Private-key encryption. | [pdf] |
| 3 | Pseudorandom functions. Chosen plaintext attacks. | [pdf] |
| 4 | Construction of pseudorandom functions. Message authentication. Chosen ciphertext attacks. | [pdf] |
| 5 | Construction of CCA-secure encryptions. Variable-length MACs. | [pdf] |
| 6 | Cryptographic hash functions. One-way functions and pseudorandom generators. | [pdf] |
| 7 | The Goldreich-Levin theorem. | [pdf] |
| 8 | Public-key encryption. | [pdf] |
| 9 | Oblivious transfer and secure two-party computation. | [pdf] |
| 10 | Two-party protocol for honest-but-curious adversaries. Bit commitment and coin flipping. | [pdf] |
| 11 | Zero-knowledge proofs. | [pdf] |
| 12 | Enforcing honesty in two-party computation. | [pdf] |
No comments:
Post a Comment