Skip to content

Latest commit

 

History

History
157 lines (122 loc) · 3.38 KB

index.md

File metadata and controls

157 lines (122 loc) · 3.38 KB
suppress-bibliography index
true
num name file draft
0.0
Preface
lec_00_0_foreword
false
num name file draft
0.5
Mathematical background
lec_00_1_mathematical-background
false
num name file draft
1.0
Introduction
lec_01_introduction
false
num name file draft
2.0
Computational security
lec_02_computational-security
false
num name file draft
3.0
Pseudorandom generators
lec_03_pseudorandom-generators
false
num name file draft
4.0
Pseudorandom functions
lec_04_pseudorandom-functions
false
num name file draft
5.0
Pseudorandom functions from pseudorandom generators
lec_05_prf-from-prg
false
num name file draft
6.0
Chosen ciphertext security
lec_06_CCA
false
num name file draft
7.0
Hash functions, proofs of work and cryptocurrencies
lec_07_hash_functions
false
num name file draft
8.0
More hash functions
lec_08_hash_functions_part2
false
num name file draft
9.0
Public key cryptography
lec_10_public_key_intro
false
num name file draft
10.0
Concrete public key schemes
lec_11_concrete_pkc
false
num name file draft
11.0
Lattice based cryptography
lec_12_lattices
false
num name file draft
12.0
Chosen Ciphertext Security for Public Key Encryption
lec_12a_CCA_public_key
false
num name file draft
13.0
Establishing secure communication channels
lec_13_handshake
false
num name file draft
14.0
Zero knowledge proofs
lec_14_zero_knowledge
false
num name file draft
15.0
Fully homomorphic encryption
lec_15_FHE
false
num name file draft
16.0
Fully homomorphic encryption II
lec_16_FHE_part2
false
num name file draft
17.0
Multiparty secure computation
lec_17_SFE
false
num name file draft
18.0
Multiparty secure computation II
lec_18_SFE_part2
false
num name file draft
19.0
Quantum computing and cryptography
lec_19_quantum
false
num name file draft
20.0
Quantum computing and cryptography II
lec_20_quantum_part2
false
num name file draft
21.0
Software obfuscation
lec_21_obfuscation
false
num name file draft
22.0
Software obfuscation II
lec_22_obfuscation_part2
false
num name file draft
23.0
Anonymous routing
lec_23_anonymous
false
num name file draft
24.0
Cryptography morality and policy
lec_24_policy
false
num name file draft
25.0
Course recap
lec_25_course_recap
false

Work in progress

These are lecture notes for lecture notes for an introductory but fast-paced undergraduate/beginning graduate course on cryptography. I am using these notes for Harvard CS 127.

You can also download all lecture notes in a single PDF file.

If you have any comments, suggestions, typo fixes, etc.. I would be very grateful if you post them as an issue or pull request in the GitHub repository where I am maintaining the source files for these notes.


showindex: false showheader: false hidetoc: true