Lecture Notes and Readings

[Katz and Lindell] = Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography. Chapman and Hall / CRC, 2007. ISBN: 9781584885511. [Preview with Google Books]

Some lectures do not have readings or handouts. Sessions after Session 18 are devoted to the quiz and project presentations.

SES # LECTURE TOPICS AND NOTES READINGS AND HANDOUTS

1

This resource may not render correctly in a screen reader.Course Introduction (PDF)

 

2

This resource may not render correctly in a screen reader.Security Mechanisms and Principles (PDF)

Juels, Ari, and Ronald Rivest. "Honeywords: Making Password-Cracking Detectable." ACM CCS (2013): 145–60.

3

This resource may not render correctly in a screen reader.Encryption, Perfect Secrecy, One-Time Pad (PDF - 1.6MB)

[Katz and Lindell] Chapters 1, 2, and 3.

4

This resource may not render correctly in a screen reader.Cryptographic Hash Functions (PDF - 1.6MB)

Avgerinos, Thanassis, Sang Kil Cha, et al. "Automatic Exploit Generation." Communications of the ACM 57, no. 2 (2014): 74–84.

Hess, Austin. "Student Innovators May Get New Legal Resource." The Tech 134, no. 5 (2014).

5

This resource may not render correctly in a screen reader.Hashing Applications and Constructions (PDF - 1.7MB)

Rivest, Ronald L., and Adi Shamir. This resource may not render correctly in a screen reader."PayWord and MicroMint: Two Simple Micropayment Schemes." (PDF) MIT Laboratory for Computer Science, 2001.

6

Bitcoin (PDF)

 

7

This resource may not render correctly in a screen reader.Secret Sharing (PDF - 2.2MB)
(Only read the section on secret sharing)

 

8

This resource may not render correctly in a screen reader.Block Ciphers (PDF - 2.8MB)

 

9

This resource may not render correctly in a screen reader.Block Cipher Modes (PDF - 5.2MB)

Desai, Anand. "New Paradigms for Constructing Symmetric Encryption Schemes Secure Against Chosen-Ciphertext Attack." Advances in Crptography 1880 (2000): 394–412. (University of California at San Diego.)

10

This resource may not render correctly in a screen reader.Message Authentication Codes (PDF - 6.7MB)

Bellare, M., P. Rogaway, et al. "The EAX Mode of Operation." Fast Software Encryption 3017 (2004): 389–407.

11

This resource may not render correctly in a screen reader.Prime Finding and other "Crypto" Math (PDF - 8.1MB)

Cao, Zhengjun. This resource may not render correctly in a screen reader."A Note On the Storage Requirement for AKS Primality Testing Algorithm." (PDF) Shanghai University.

12

This resource may not render correctly in a screen reader.Diffie-Hellman Key Exchange and Crypto Groups (PDF - 7.6MB)

 

13

This resource may not render correctly in a screen reader.Pedersen Commitment, PK Encryption, DDH (PDF - 8.4MB)

Paar, Christof, and Jan Pelzl. Chapters 6, 7, and 8 in Understanding Cryptography: A Textbook for Students and Practitioners. Springer, 2011. ISBN: 9783642041006. [Preview with Google Books]

[Katz and Lindell] Chapter 10.

14

This resource may not render correctly in a screen reader.Malleability of El Gamal, IND-CCA2 (PDF - 8.1MB)

Diffie, Whitfield, and Martin E. Hellman. "New Directions in Cryptography." IEEE Transactions on Information Theory 22, no. 6 (1976): 644–54.

Boneh, Dan. This resource may not render correctly in a screen reader."Twenty Years of Attacks on the RSA Cryptosystem." (PDF) Notices of the AMS 42, no. 2 (1999): 203–13.

15

This resource may not render correctly in a screen reader.Digital Signatures (PDF - 8.4MB)

 

16

This resource may not render correctly in a screen reader.DSA, Gap Groups (PDF - 3.0MB)

Project Progress Review

17

This resource may not render correctly in a screen reader.Gap Groups, Bilinear Maps, and Applications (PDF - 5.2MB)

Dutta, R., R. Barua, et al. "Pairing-Based Cryptographic Protocols: A Survey." Cryptology ePrint Archive: Report 2004 / 064.

The Pairing-Based Crypto Lounge.

18

This resource may not render correctly in a screen reader.Zero-Knowledge Proofs (PDF - 4.0MB)

Goldreich, Oded. "A Short Tutorial of Zero-Knowledge." Weizmann Institute of Science, 2010.

Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles.