Advanced Topics in Cryptography |
Instructor: Benny Pinkas, benny (at) pinkas.net, benny (at) cs.haifa.ac.il.
Spring semester 2006.
Dept.
of Computer Science,
This course will cover recent topics of interest in the research of cryptographic techniques.
The course will aim to cover the following topics, although probably only a subset of them will be covered in class:
Introduction to cryptography.
1. Office Hours: Wednesday, 12-1pm.
Lecture |
Date |
Subject |
Files |
1 | March 5, 2006 | Oblivious Transfer. | slides, printer friendly slides. |
2 | March 12, 2006 | Oblivious Transfer, Yao's secure computation protocol. | slides, printer friendly slides. |
3 | March 19, 2006 |
Secure computation when a circuit is too large, Multi-party secure computation |
slides, printer friendly slides. |
4 |
March 26, 2006 |
Private Information Retrieval (PIR), keyword search |
slides, printer friendly slides. |
5 |
April 2, 2006 |
Paillier's cryptosystem |
|
6 | April 23, 2006 | Semantic security. | slides, printer friendly slides. |
7 | April 30, 2006. | El Gamal encryption, chosen ciphertext security, the Cramer-Shoup cryptosystem. | slides, printer friendly slides. |
8 | May 7, 2006. | The Cramer-Shoup cryptosystem. Bleichenbacher's attack on PKCS #1. | slides, printer friendly slides. |
9 | May 14, 2006. | Identity based encryption. Cocks' scheme. | slides, printer friendly slides. |
10 | May 21, 2006. | Bilinear mappings and their applications. | slides, printer friendly slides. |
11 | June 4, 2006. | Chosen ciphertext security from IBE. | slides, printer friendly slides. |
12 | June 11, 2006. | Search on encrypted data. | slides, printer friendly slides. |
13 | June 18, 2006. | Search on encrypted data and on streaming data. | slides, printer friendly slides. |
Last updated: June 19, 2006.