[Katz and Lindell] = Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography. Chapman and Hall / CRC, 2007. ISBN: 9781584885511. [Preview with Google Books]
Some lectures do not have readings or handouts. Sessions after Session 18 are devoted to the quiz and project presentations.
| SES # | LECTURE TOPICS AND NOTES | READINGS AND HANDOUTS | 
|---|---|---|
| 1 | ||
| 2 | Juels, Ari, and Ronald Rivest. "Honeywords: Making Password-Cracking Detectable." ACM CCS (2013): 145–60. | |
| 3 | [Katz and Lindell] Chapters 1, 2, and 3. | |
| 4 | Avgerinos, Thanassis, Sang Kil Cha, et al. "Automatic Exploit Generation." Communications of the ACM 57, no. 2 (2014): 74–84. Hess, Austin. "Student Innovators May Get New Legal Resource." The Tech 134, no. 5 (2014). | |
| 5 | Rivest, Ronald L., and Adi Shamir.  | |
| 6 | ||
| 7 | 
 | |
| 8 | ||
| 9 | Desai, Anand. "New Paradigms for Constructing Symmetric Encryption Schemes Secure Against Chosen-Ciphertext Attack." Advances in Crptography 1880 (2000): 394–412. (University of California at San Diego.) | |
| 10 | Bellare, M., P. Rogaway, et al. "The EAX Mode of Operation." Fast Software Encryption 3017 (2004): 389–407. | |
| 11 | Cao, Zhengjun.  | |
| 12 | ||
| 13 | Paar, Christof, and Jan Pelzl. Chapters 6, 7, and 8 in Understanding Cryptography: A Textbook for Students and Practitioners. Springer, 2011. ISBN: 9783642041006. [Preview with Google Books] [Katz and Lindell] Chapter 10. | |
| 14 | Diffie, Whitfield, and Martin E. Hellman. "New Directions in Cryptography." IEEE Transactions on Information Theory 22, no. 6 (1976): 644–54. Boneh, Dan.  | |
| 15 | ||
| 16 | Project Progress Review | |
| 17 | Dutta, R., R. Barua, et al. "Pairing-Based Cryptographic Protocols: A Survey." Cryptology ePrint Archive: Report 2004 / 064. The Pairing-Based Crypto Lounge. | |
| 18 | Goldreich, Oded. "A Short Tutorial of Zero-Knowledge." Weizmann Institute of Science, 2010. Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. | 

