Lectures:
-
Topic 00: Course Policy and Outline (Week 01)
-
Topic 01: Mathematical Basics (Summations) (Week 01)
-
Topic 02: Mathematical Basics (Probability) (Week 01)
-
Homework 1 [Source Files: file1 file2] (Due Date: 04 September, 2022)
-
Topic 03: One-time Pad for Bit-strings (Week 02)
-
Topic 04: Groups and Fields (Week 02)
-
Topic 05: Repeated Squaring (Week 03)
-
Topic 06: Private-key Encryption (Definition and Security of One-time Pad) (Week 03)
-
Homework 2 [Source Files: file1 file2] (Due Date: 18 September, 2022)
-
Topic 07: Graph Representation (Week 04)
-
Topic 08: Shamir Secret-sharing Scheme (Introduction) (Week 04)
-
Topic 09: Shamir Secret-sharing Scheme (Lagrange Interpolation) (Week 05)
-
Topic 10: Shamir Secret-sharing Scheme (Code) (Week 05)
-
Homework 3 [Source Files: file1 file2] (Due Date: 03 October, 2022)
-
Topic 11: Efficient Algorithms (Week 06)
-
Topic 12: Generating Large Primes (Week 06)
-
Topic 13: Extended GCD Algorithm (Week 07)
-
Topic 14: One-way Functions (Week 08)
-
Topic 15: Pseudo-random Generators (Week 09)
-
Homework 4 [Source Files: file1 file2] (Due Date: 30 October, 2022)
-
Topic 16: Encrypting Long Messages (Week 09)
-
Topic 17: Random Functions and Encrypting Long Messages (Week 10)
-
Topic 18: Pseudorandom Functions (Week 10)
-
Topic 19: Message Authentication Codes (Week 11)
-
Topic 20: Message Authentication Codes from PRF (Week 11)
-
Homework 5 [Source Files: file1 file2] (Due Date: 20 November, 2022)
-
Topic 21: RSA Assumption (Week 12)
-
Topic 22: RSA Encryption (Week 12)
-
Homework 6 [Source Files: file1 file2] (Due Date: TBD)
-
Topic 24: Digital Signatures using RSA Assumption (Week 13)
-
Topic 25: Digital Signatures for Arbitrary-length Messages (Week 13)
-
Midterm Solution Discussion
-
Revision
-
Hash Functions: Universal Hash Function, Universal One-way Hash Function, Collision-Resistant Hash Function, Merkle-Damgard Construction
-
Discrete Log, Computational Diffie-Hellman, Decisional Diffie-Hellman: Relationships, Candidate Groups, Constructions (PRG, PRF, Key-agreement, PKE (ElGamal), CRHF)
-
Secure Computation: 2-choose-1 Oblivious Transfer, Construction from RSA, GMW Protocol
-
LWE, SIS, CRHF from SIS, Private-key encryption from SIS
|