Previous Years
Spring 2020
Teaching fellows: Leor Fishman and Alec Sun
Schedule:
Lecture |
Day |
Date |
Topic |
1 |
Tuesday |
Jan 28 |
introduction |
2 |
Thursday |
Jan 30 |
Computational security |
3 |
Tuesday |
Feb 4 |
Pseudorandom generators |
4 |
Thursday |
Feb 6 |
Pseudorandom (aka key derivation) functions |
5 |
Tuesday |
Feb 11 |
Pseudorandom functions from pseudorandom generators, block ciphers |
6 |
Thursday |
Feb 13 |
Chosen ciphertext security |
7 |
Tuesday |
Feb 18 |
Hash functions, random oracles, proofs of work, cryptocurrencies |
8 |
Thursday |
Feb 20 |
More hash functions: Entropy extraction, protecting passwords, slow hashes, merkle trees |
9 |
Tuesday |
Feb 25 |
Public key cryptography, the obfuscation paradigm, Diffie Hellman and DSA |
10 |
Thursday |
Feb 27 |
Concrete candidates: RSA |
11 |
Tuesday |
Mar 3 |
Lattice based crypto |
12 |
Thursday |
Mar 5 |
Secure communication and the “handhsake”, SSL/TLS and friends |
13 |
Tuesday |
Mar 10 |
Fully homomorphic encryption 1 |
14 |
Thursday |
March 12 |
Fully homomorphic encryption 2 |
spring break |
|
|
|
15 |
Tuesday |
March 24 |
Review of public key crypto, secure channels, and FHE |
16 |
Thursday |
March 26 |
Zero Knowledge Proofs |
17 |
Tuesday |
March 31 |
Multiparty secure computation 1 |
18 |
Thursday |
April 2 |
Multiparty secure computation 2 |
19 |
Tuesday |
April 7 |
Software obfuscation 1 |
20 |
Thursday |
April 9 |
Software obfuscation 2 |
21 |
Tuesday |
April 14 |
Quantum computing and crypto |
22 |
Thursday |
April 16 |
Quantum computing and crypto 2 |
23 |
Tuesday |
April 21 |
TBD |
24 |
Thursday |
April 23 |
Embedded EthiCS |
25 |
Tuesday |
April 28 |
Course recap |
Spring 2018
Teaching fellows: Chi-Ning Chou and Yueqi Sheng
Schedule:
Lecture |
Day |
Date |
Lecture |
Slides |
1 |
Tuesday |
Jan 23 |
introduction |
powerpoint |
2 |
Thursday |
Jan 25 |
Computational security |
- |
3 |
Tuesday |
Jan 30 |
Pseudorandom generators |
- |
4 |
Thursday |
Feb 1 |
Pseudorandom (aka key derivation) functions |
- |
5 |
Tuesday |
Feb 6 |
Pseudorandom functions from pseudorandom generators, block ciphers |
- |
6 |
Thursday |
Feb 8 |
Chosen ciphertext security |
- |
7 |
Tuesday |
Feb 13 |
Hash functions, random oracles, proofs of work, cryptocurrencies |
- |
8 |
Thursday |
Feb 15 |
More hash functions: Entropy extraction, protecting passwords, slow hashes, merkle trees |
- |
9 |
Tuesday |
Feb 20 |
Public key cryptography, the obfuscation paradigm, Diffie Hellman and DSA |
- |
10 |
Thursday |
Feb 22 |
Concrete candidates: RSA |
- |
11 |
Tuesday |
Feb 27 |
Lattice based crypto |
- |
12 |
Thursday |
March 1 |
Secure communication and the “handhsake”, SSL/TLS and friends |
- |
13 |
Tuesday |
March 6 |
Fully homomorphic encryption 1 |
- |
14 |
Thursday |
March 8 |
Fully homomorphic encryption 2 |
- |
- |
Harvard Spring Break |
- |
- |
- |
15 |
Tuesday |
March 20 |
Zero Knowledge Proofs |
- |
16 |
Thursday |
March 22 |
Multiparty secure computation |
- |
17 |
Tuesday |
March 27 |
no class |
- |
18 |
Thursday |
March 29 |
Multiparty secure computation 2 |
- |
19 |
Tuesday |
April 3 |
Guest lecture by Yael Kalai Software obfuscation 1 |
- |
20 |
Thursday |
April 5 |
Guest lecture by Yael Kalai Software obfuscation 2 |
- |
21 |
Tuesday |
April 10 |
Quantum computing and crypto |
- |
22 |
Thursday |
April 12 |
Quantum computing and crypto 2 |
- |
23 |
Tuesday |
April 17 |
SNARKs and their friends |
- |
24 |
Thursday |
April 19 |
Course recap |
- |
25 |
Tuesday |
April 24 |
Guest lecture by Bruce Schneier |
- |