Selected topics in cryptography

Master

In Maynard (USA)

Price on request

Description

  • Type

    Master

  • Location

    Maynard (USA)

  • Start date

    Different dates available

This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Facilities

Location

Start date

Maynard (USA)
See map
02139

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Materials

Course programme

Lectures: 2 sessions / week, 1.5 hours / session


We assume that you have taken 6.875 Introduction to Cryptography, or have equivalent introduction to theoretical cryptography (see the instructors if you have questions about your background).


There is no text for this course. We will make all materials for this course available on-line.


There will most likely be (approximately) four homework assignments. There will be no quizzes or finals. Students will "scribe" lectures in rotation. (Scribe notes must be written up in latex, and be reasonably "polished.")


The final grade will be computed using the following weights:


We require that all homework solutions be typed up in latex. Hand-drawn diagrams are permitted.


We strongly encourage collaboration. We do not expect you to be able to solve every homework problem on your own. We do, however, expect you to write up your own solution to every problem even if the solution is the result of a collaborative effort. To repeat: each person must write up their solutions separately. Also, in your write-up please credit the people with whom you worked. Also, please note on your homework which sources you used for each problem.


Don't show me this again


This is one of over 2,200 courses on OCW. Find materials for this course in the pages linked along the left.


MIT OpenCourseWare is a free & open publication of material from thousands of MIT courses, covering the entire MIT curriculum.


No enrollment or registration. Freely browse and use OCW materials at your own pace. There's no signup, and no start or end dates.


Knowledge is your reward. Use OCW to guide your own life-long learning, or to teach others. We don't offer credit or certification for using OCW.


Made for sharing. Download files for later. Send to friends and colleagues. Modify, remix, and reuse (just remember to cite OCW as the source.)


Learn more at Get Started with MIT OpenCourseWare


Selected topics in cryptography

Price on request