ECS 227  Modern Cryptography
 Copyright notice: Lecture notes
available from this Web page are Copyright 1996 by Phillip Rogaway.

Disclaimer: These notes are quick, not polished.
Please forgive their myriad mistakes.

Request: Please don't use these notes (eg., in another cryptography class)
without my consent.
Topic for Lecture 16 (Thursday, 11/21/96):
Asymmetric encryption
Lecture Notes
 Lecture 1  Overview (9/26)
 Lecture 2  The Data Encryption Standard (10/1)
 Lecture 3  CollisionIntractable Hashing (10/3)
 Lectures 45  The Notion of Symmetric Encryption (10/8, 10/10)
 Lectures 67  Achieving Symmetric Encryption (10/15, 10/17)
 Lecture 8  Bit Commitment (10/22)  scribe: Nick Puketza
 Lecture 9  Odds and ends (10/24)
 Lecture 10  Interactive Proofs (10/29)
 Lecture 11  Perfect zero knowlege (10/29)
 Lecture 12  Computational zero knowledge (11/6)
 Lectures 1314  Message authentication (11/16)
 Lectures 15  Entity authentication (11/19) (paper)
Problem Sets
Other Handouts
Go to Phil's
home page.