Below you can find slides and course notes. The latter are co-authored with Phillip Rogaway. The slides represent the course content and syllabus. The notes may be out of synch with the slides and you use them at your own discretion and risk.
Preface: pdf
Chapter | Notes | Slides |
Introduction | ||
Block ciphers | ||
Pseudorandom functions | ||
Symmetric encryption | ||
Hash functions | ||
Message authentication | ||
Authenticated encryption | - | |
Stream ciphers and PRGs | - | |
Computational number theory |
||
Number-theoretic primitives | - | |
Asymmetric encryption | ||
Digital signatures | ||
Key distribution | - | |
Applications and protocols | - | |
Appendix: The birthday problem | - |