Previous Years

Spring 2020

Teaching fellows: Leor Fishman and Alec Sun

Schedule:

Lecture Day Date Topic
1 Tuesday Jan 28 introduction
2 Thursday Jan 30 Computational security
3 Tuesday Feb 4 Pseudorandom generators
4 Thursday Feb 6 Pseudorandom (aka key derivation) functions
5 Tuesday Feb 11 Pseudorandom functions from pseudorandom generators, block ciphers
6 Thursday Feb 13 Chosen ciphertext security
7 Tuesday Feb 18 Hash functions, random oracles, proofs of work, cryptocurrencies
8 Thursday Feb 20 More hash functions: Entropy extraction, protecting passwords, slow hashes, merkle trees
9 Tuesday Feb 25 Public key cryptography, the obfuscation paradigm, Diffie Hellman and DSA
10 Thursday Feb 27 Concrete candidates: RSA
11 Tuesday Mar 3 Lattice based crypto
12 Thursday Mar 5 Secure communication and the “handhsake”, SSL/TLS and friends
13 Tuesday Mar 10 Fully homomorphic encryption 1
14 Thursday March 12 Fully homomorphic encryption 2
spring break
15 Tuesday March 24 Review of public key crypto, secure channels, and FHE
16 Thursday March 26 Zero Knowledge Proofs
17 Tuesday March 31 Multiparty secure computation 1
18 Thursday April 2 Multiparty secure computation 2
19 Tuesday April 7 Software obfuscation 1
20 Thursday April 9 Software obfuscation 2
21 Tuesday April 14 Quantum computing and crypto
22 Thursday April 16 Quantum computing and crypto 2
23 Tuesday April 21 TBD
24 Thursday April 23 Embedded EthiCS
25 Tuesday April 28 Course recap

Spring 2018

Teaching fellows: Chi-Ning Chou and Yueqi Sheng

Schedule:

Lecture Day Date Lecture Slides
1 Tuesday Jan 23 introduction powerpoint
2 Thursday Jan 25 Computational security -
3 Tuesday Jan 30 Pseudorandom generators -
4 Thursday Feb 1 Pseudorandom (aka key derivation) functions -
5 Tuesday Feb 6 Pseudorandom functions from pseudorandom generators, block ciphers -
6 Thursday Feb 8 Chosen ciphertext security -
7 Tuesday Feb 13 Hash functions, random oracles, proofs of work, cryptocurrencies -
8 Thursday Feb 15 More hash functions: Entropy extraction, protecting passwords, slow hashes, merkle trees -
9 Tuesday Feb 20 Public key cryptography, the obfuscation paradigm, Diffie Hellman and DSA -
10 Thursday Feb 22 Concrete candidates: RSA -
11 Tuesday Feb 27 Lattice based crypto -
12 Thursday March 1 Secure communication and the “handhsake”, SSL/TLS and friends -
13 Tuesday March 6 Fully homomorphic encryption 1 -
14 Thursday March 8 Fully homomorphic encryption 2 -
- Harvard Spring Break - - -
15 Tuesday March 20 Zero Knowledge Proofs -
16 Thursday March 22 Multiparty secure computation -
17 Tuesday March 27 no class -
18 Thursday March 29 Multiparty secure computation 2 -
19 Tuesday April 3 Guest lecture by Yael Kalai Software obfuscation 1 -
20 Thursday April 5 Guest lecture by Yael Kalai Software obfuscation 2 -
21 Tuesday April 10 Quantum computing and crypto -
22 Thursday April 12 Quantum computing and crypto 2 -
23 Tuesday April 17 SNARKs and their friends -
24 Thursday April 19 Course recap -
25 Tuesday April 24 Guest lecture by Bruce Schneier -