Advanced Topics in Cryptography |
Instructor: Benny Pinkas, benny (at) pinkas.net, benny (at) cs.haifa.ac.il.
Spring semester 2010.
Dept.
of Computer Science,
This course will cover advanced topics in cryptographic research.
The course will aim to cover the following topics, although probably only a subset of them will be covered in class:
Introduction to cryptography.
Lecture |
Date |
Subject |
Files |
1 | March 7, 2010 | Oblivious Transfer. | slides (all slides are password protected. The password is the number of the room in which the lecture takes place). |
2 | March 14, 2010 | Oblivious Transfer. | slides. |
3 | March 21, 2010 | Yao's secure computation protocol. Secure computation of the median. | slides. |
4 | April 11, 2010 | Secure multi-party protocols. Private Information Retrieval. | slides. |
5 | April 18, 2010 | Private Information Retrieval. | slides. |
6 | April 25, 2010 | Homomorphic encryption. | slides. |
7 | May 2, 2010 | Private keyword search. Semantic security. | slides. |
8 | May 9, 2010 | Semantic security. The Cramer-Shoup cryptosystem. | slides. |
9 | May 23, 2010 | The Cramer-Shoup cryptosystem. Chosen ciphertext attacks. | slides. |
10 | May 30, 2010 | Identity based encryption. Cocks encryption scheme. | slides. |
11 | June 6, 2010 | Identity based encryption. Bilinear pairings. | slides. |
12 | June 13, 2010 | Chosen ciphertext security from identity based encryption. | slides. |
homework 3 (updated version, June 19)
Last updated: June 19, 2010.