The text books for the course are:
The Handbook is not a textbook, but rather an encyclopedic reference. All concepts discussed in the course can be found here, but it is not always easy reading.
Bellare and Rogaway focus on a variant of provable security as developed by the authors. Excellent discussion, careful definitions and detailed proofs. Very rewarding for a mathematically mature reader, but not completely congruent with course contents.
Lesson | Material |
---|---|
1 | Paragraph 1.2 |
2 | Cryptography Berkley - Notes |
2 | Paragraphs: 2.1.1 (probability theory) 2.1.6 (Random mappings) |
2 | Paragraphs: 1.5.1 |
2 | Shannon's Theory of Cryptography |
4 | Diffie-Hellman paper |
4 | Paragraph 1.8.1, 1.8.2, 1.8.4 |
5 | History of RSA with a mathematical taste |
5 | RSA and modular arithmetics for computer scientists |
5 | Overview of RSA, proofs, attacks, and more |
5 | Fermat primality test |
5 | Primality tests (sections 1 to 4) |
6 | Paragraph 2.4 |
8 | Needham-Schroeder protocol |
8 | Needham-Schroeder protocol |
8 | Turing Award to Diffie-Hellmann movie |
8 | Non-Interactive Key Exchange |
9 | I.e. "Handbook of Applied Cryptography" ,Menezes, Oorschot, Vanstone (Chapters 10.3, 10.3.1, 10.3.2, 10.4, 10.4.1, 10.4.3, 10.4.4) |
9 | Secure Multiparty Computation and Secret Sharing: An Information Theoretic Approach, R. Cramer, I. Damgard, J. Buus Nilsen (Chapters 1, 3.1, 3.2, 3.3.4) |