Lectures
Lecture notes: Attach:lecturenotes.pdf
Information about lectures
Lecture 1 (Historical cyphers) board photos Lecture 2 (Perfect secrecy and One-Time-Pad) board photos, link to the recorded lecture Lecture 3 (Stream Ciphers) board photos, link to the recorded lecture Lecture 4 (Block Ciphers) board photos, link to the recorded lecture Lecture 5 (Modes of Operation) board photos, link to the recorded lecture Lecture 6 (Public Key Encryption, textbook RSA) board photos, link to the recorded lecture Lecture 7 (ElGamal Encryption) board photos, link to the recorded lecture Lecture 8a (Malleability of ElGamal. IND_CCA security) board photos, link to the recorded lecture Lecture 8b (Hybrid Encryption) board photos, link to the recorded lecture Lecture 8c (Hash functions. Collision resistance) board photos, link to the recorded lecture Lecture 9a (Merkle-Damgard hash construction) board photos, link to the recorded lecture Lecture 9b(Sponge hash construction) board photos, link to the recorded lecture Lecture 9c(Birthday attack) board photos, link to the recorded lecture Lecture 9d(Message authentication codes) board photos, link to the recorded lecture Lecture 9e(HMACs. EF-CMA security) board photos, link to the recorded lecture Lecture 10a (CBC-MACs) board photos, link to the recorded lecture Lecture 10b(Signatures. EF-CMA for signatures) board photos, link to the recorded lecture Lecture 10c(A naive approach for signatures) board photos, link to the recorded lecture Lecture 11a(Full-domain hash: construction) board photos, link to the recorded lecture Lecture 11b(Various security properties of hash functions) board photos, link to the recorded lecture Lecture 11c(Random oracle heuristic) board photos, link to the recorded lecture Lecture 11d(Proof sketch: RSA-FDH is secure in random oracle) board photos, link to the recorded lecture Lecture 12a(Secure function evaluation/multiparty computation. Secure AND.) board photos, link to the recorded lecture Lecture 12b(Secret-sharing based MPC) board photos, link to the recorded lecture Lecture 12c(Yao's garbled circuits with physical boxes) board photos, link to the recorded lecture Lecture 12d(How to build the boxes for Yao's garbled circuits) board photos, link to the recorded lecture Lecture 13a(Zero-knowledge: introduction) board photos, link to the recorded lecture Lecture 13b(Zero-knowledge for Graph Isomorphism) board photos, link to the recorded lecture Lecture 13c(Zero-knowledge properties. Completeness and soundness (for GI)) board photos, link to the recorded lecture Lecture 14a(ZK definition) board photos, link to the recorded lecture Lecture 14b(Graph Isomorphism is ZK) board photos, link to the recorded lecture Lecture 14c(Symbolic Cryptography. NS(L) protocol) board photos, link to the recorded lecture Lecture 14d(Symbolic crypto model for NSL) board photos, link to the recorded lecture Lecture 14e(Proof sketch for NSL in symbolic crypto) board photos, link to the recorded lecture Lecture 15a(Quantum Cryptography. Quantum computers) board photos, link to the recorded lecture Lecture 15b(Grover's algorithm. Shor's algorithm.) board photos, link to the recorded lecture Lecture 15c(Quantum key distribution) board photos, link to the recorded lecture