All lecture notes can be found at intensecrypto.org.

Note that you will need to read the lecture notes for each lecture before it is given.

Tentative schedule

Lecture Day Date Lecture Slides
1 Tuesday Jan 23 introduction -
2 Thursday Jan 25 Computational security -
3 Tuesday Jan 30 Pseudorandom generators -
4 Thursday Feb 1 Pseudorandom (aka key derivation) functions -
5 Tuesday Feb 6 Pseudorandom functions from pseudorandom generators, block ciphers -
6 Thursday Feb 8 Chosen ciphertext security -
7 Tuesday Feb 13 Hash functions, random oracles, proofs of work, cryptocurrencies -
8 Thursday Feb 15 More hash functions: Entropy extraction, protecting passwords, slow hashes, merkle trees -
9 Tuesday Feb 20 Private key crypto recap -
10 Thursday Feb 22 Public key cryptography, the obfuscation paradigm, Diffie Hellman and DSA -
11 Tuesday Feb 27 Concrete candidates: RSA -
12 Thursday March 1 Lattice based crypto -
13 Tuesday March 6 Secure communication and the “handhsake”, SSL/TLS and friends -
14 Thursday March 8 Zero Knowledge Proofs -
- Harvard Spring Break - - -
15 Tuesday March 20 Fully homomorphic encryption 1 -
16 Thursday March 22 Fully homomorphic encryption 2 -
17 Tuesday March 27 Multiparty secure computation -
18 Thursday March 29 Multiparty secure computation 2 -
19 Tuesday April 3 Software obfuscation 1 -
20 Thursday April 5 Software obfuscation 2 -
21 Tuesday April 10 Quantum computing and crypto -
22 Thursday April 12 Quantum computing and crypto 2 -
23 Tuesday April 17 Anonymous routing -
24 Thursday April 19 Cryptography, morality, and policy -
25 Tuesday April 24 Course recap -