num |
name |
file |
draft |
0.0 |
Preface |
lec_00_0_foreword |
false |
|
num |
name |
file |
draft |
0.5 |
Mathematical background |
lec_00_1_mathematical-background |
false |
|
num |
name |
file |
draft |
1.0 |
Introduction |
lec_01_introduction |
false |
|
num |
name |
file |
draft |
2.0 |
Computational security |
lec_02_computational-security |
false |
|
num |
name |
file |
draft |
3.0 |
Pseudorandom generators |
lec_03_pseudorandom-generators |
false |
|
num |
name |
file |
draft |
4.0 |
Pseudorandom functions |
lec_04_pseudorandom-functions |
false |
|
num |
name |
file |
draft |
5.0 |
Pseudorandom functions from pseudorandom generators |
lec_05_prf-from-prg |
false |
|
num |
name |
file |
draft |
6.0 |
Chosen ciphertext security |
lec_06_CCA |
false |
|
num |
name |
file |
draft |
7.0 |
Hash functions, proofs of work and cryptocurrencies |
lec_07_hash_functions |
false |
|
num |
name |
file |
draft |
8.0 |
More hash functions |
lec_08_hash_functions_part2 |
false |
|
num |
name |
file |
draft |
9.0 |
Public key cryptography |
lec_10_public_key_intro |
false |
|
num |
name |
file |
draft |
10.0 |
Concrete public key schemes |
lec_11_concrete_pkc |
false |
|
num |
name |
file |
draft |
11.0 |
Lattice based cryptography |
lec_12_lattices |
false |
|
num |
name |
file |
draft |
12.0 |
Chosen Ciphertext Security for Public Key Encryption |
lec_12a_CCA_public_key |
false |
|
num |
name |
file |
draft |
13.0 |
Establishing secure communication channels |
lec_13_handshake |
false |
|
num |
name |
file |
draft |
14.0 |
Zero knowledge proofs |
lec_14_zero_knowledge |
false |
|
num |
name |
file |
draft |
15.0 |
Fully homomorphic encryption |
lec_15_FHE |
false |
|
num |
name |
file |
draft |
16.0 |
Fully homomorphic encryption II |
lec_16_FHE_part2 |
false |
|
num |
name |
file |
draft |
17.0 |
Multiparty secure computation |
lec_17_SFE |
false |
|
num |
name |
file |
draft |
18.0 |
Multiparty secure computation II |
lec_18_SFE_part2 |
false |
|
num |
name |
file |
draft |
19.0 |
Quantum computing and cryptography |
lec_19_quantum |
false |
|
num |
name |
file |
draft |
20.0 |
Quantum computing and cryptography II |
lec_20_quantum_part2 |
false |
|
num |
name |
file |
draft |
21.0 |
Software obfuscation |
lec_21_obfuscation |
false |
|
num |
name |
file |
draft |
22.0 |
Software obfuscation II |
lec_22_obfuscation_part2 |
false |
|
num |
name |
file |
draft |
23.0 |
Anonymous routing |
lec_23_anonymous |
false |
|
num |
name |
file |
draft |
24.0 |
Cryptography morality and policy |
lec_24_policy |
false |
|
num |
name |
file |
draft |
25.0 |
Course recap |
lec_25_course_recap |
false |
|