ECS 227 - Modern Cryptography
- Copyright notice: Lecture notes
available from this Web page are Copyright 1996 by Phillip Rogaway.
-
Disclaimer: These notes are quick, not polished.
Please forgive their myriad mistakes.
-
Request: Please don't use these notes (eg., in another cryptography class)
without my consent.
Topic for Lecture 16 (Thursday, 11/21/96):
Asymmetric encryption
Lecture Notes
- Lecture 1 - Overview (9/26)
- Lecture 2 - The Data Encryption Standard (10/1)
- Lecture 3 - Collision-Intractable Hashing (10/3)
- Lectures 4-5 - The Notion of Symmetric Encryption (10/8, 10/10)
- Lectures 6-7 - Achieving Symmetric Encryption (10/15, 10/17)
- Lecture 8 - Bit Commitment (10/22) - scribe: Nick Puketza
- Lecture 9 - Odds and ends (10/24)
- Lecture 10 - Interactive Proofs (10/29)
- Lecture 11 - Perfect zero knowlege (10/29)
- Lecture 12 - Computational zero knowledge (11/6)
- Lectures 13-14 - Message authentication (11/16)
- Lectures 15 - Entity authentication (11/19) (paper)
Problem Sets
Other Handouts
Go to Phil's
home page.