Table of Lecture Notes

DateTopicReferences
Jan 18Course outline, security definition[Ps 1.1-1.3], [KL 1.1,1.2,1.4,2.1]
Jan 23Perfect security, one-time pads[Ps 1.3], [KL 2.1-2.3]
Jan 25Efficient computation, adversary, PRG[Ps 2.1,3.1-3.2], [KL 3.1-3.3]
Jan 30Computational indistinguishability[Ps 3.1]
Feb 1Computational indistinguishability[Ps 3.1]
Feb 6PRG[Ps 3.3], [KL 3.3]
Feb 8Pseudo-random functions[Ps 3.7, 3.8] [KL 8.5]
Feb 13CPA-secure encryption[Ps 3.9] [KL 3.2, 3.4]
Feb 15Pseudo-random functions[Ps 3.7, 3.8] [KL 8.5], Abhishek@JHU, Goldwasser@Berkeley, Wichs@Northeastern
Feb 20One-way functions[Ps 2.2] [KL 8.1]
Feb 22Factoring, reduction[Ps 2.3-2.4], [KL 9.2.3]
Feb 27From weak to strong OWF[Ps 2.4], Wichs@NEU, Goldwasser@Berkeley, LTW05
Feb 29Universal OWF[Ps 2.13], Wichs@NEU
Mar 12Hard-core lemma[Ps 3.4] [KL 8.3.3] Bellare@UCSD
Mar 14Hard-core lemma[Ps 3.4] [KL 8.3.3] Bellare@UCSD
Mar 19Min-entropy, Mazor-PassBarak@Princeton, Mazor-Pass 2023
Mar 21Mazor-Pass PRGMazor-Pass 2023 and the video recording at TCC 2023
Mar 26Message Authentication[Ps 5.1, 5.2] [KL 4.1-4.3]
Mar 28Digital Signatures[Ps 5.3] [KL 13.1, 13.2, 13.6, 14.4], Lamport’79, Goldwasser@Berkeley
Apr 2Zero-knowledge proof[Ps 4.1-4.6]
Apr 4Application of ZKP[Ps 4.9]
Apr 9ZKP for graph 3-coloring[Ps 4.7-4.9]
Apr 11Commitments ZKP for NP[Ps 4.7]
  
Apr 30(last lecture)