Lectures

Table of Contents

Week | Dates | Topics | Scribe | Tex |
---|---|---|---|---|

1 | Oct 26 | Administrative, Introduction, Perfect Secrecy and its Limitations | Lec1 | tex preamble |

2 | Nov 2 | Computational Secrecy | Lec2 | tex |

3 | Nov 9 | Pseudorandomness and One-Way Functions | Lec3 | tex |

4 | Nov 16 | Hardcore Bits and The Goldreich-Levin Theorem | Lec4 | tex |

5 | Nov 23 | Pseudorandom Functions | Lec5 | tex |

6 | Nov 30 | Authentication and Digital Signatures | Lec6 | tex |

7 | Dec 7 | Public-Key Encryption | Lec7 | tex |

8 | Dec 14 | Zero-Knowledge Proofs | Lec8 | tex |

9 | Dec 21 | Multi-Party Computation, Reduction to Semi-Honest Adversaries | Lec9 | tex |

10 | Dec 28 | MPC against Semi-Honest Adversaries, GMW, and Yao's Garbled Circuit | Lec10 | tex |

11 | Jan 4 | Fully-Homomorphic Encryption | Lec11 | tex |

12 | Jan 11 | Functional Encryption | Lec12 | tex |

13 | Jan 18 | Code Obfuscation | Lec13 | tex |