陈 一 镭 Yilei Chen
  • Main
  • Outputs
  • Inputs
  • Misc
    • Cryptographers seldom sleep well
    • My Favorite Open Problem
    • Superluminal fiction
    • Top 10 fake college ranking
    • Why study Chinese
  • Courses
    • Cryptography S2026
    • Cryptography S2025
    • Cryptography S2024
    • Cryptography S2023
    • Cryptography S2022
    • Cryptography S2021
    • Lattices F2025
    • Lattices F2024
    • Lattices F2023
    • Lattices F2022

Foundations of Cryptography (Spring 2026) 


W 9:50-11:25, F 13:30-15:05;  @6A211
Office hour: W 13:00 - 14:00 @FIT 4-6008 (6th floor)
Email: [email protected]​
TAs: Xinmiao Han, Liheng Ji, Wenjie Li
​
Main ​reference:
A Course in Cryptography, Chapters 1-6,  Rafael Pass & abhi shelat

https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
​Other references:
A graduate course in applied cryptography,  Dan Boneh & Victor Shoup
Foundations of Cryptography I, II, Oded Goldreich

Tentative Schedule: (subject to change by holiday schedule)
0225 Lecture 1: Introduction I
0227 Lecture 2: Introduction II
0304 Lecture 3: Encryption with perfect secrecy
0306 Lecture 4: ​Computational hardness and one-way functions, factoring
0311 Lecture 5: Algorithms and hard problems related to factoring, RSA, and discrete-log
0313 Lecture 6: Indistinguishability and pseudorandomness
0318 Lecture 7: Pseudorandom generators
0320 Lecture 8: Hardcore bits: Yao, Goldreich-Levin
0325 Lecture 9: Pseudorandom functions: definitions and construction attempts
0327 Lecture 10: GGM's construction of PRF, and probabilistic encryption
0401 Lecture 11: Public-key encryption
0403 Lecture 12: Private-key encryption
0408 Lecture 13: Digital Signature
​0410 Lecture 14: Collision resistant hash functions and signature in the random oracle model
0415 Lecture 15: Correlation Intractability
0417 Lecture 16: Public-key encryption from LWE
0422 Lecture 17: Levelled fully homomorphic encryption from LWE, bootstrapping
0424 Lecture 18: Interactive proofs, zero-knowledge
0429 Lecture 19: Zero-knowledge proofs for graph-isomorphism
0508 Lecture 20: Zero-knowledge proofs for all NP, commitments
0513 Lecture 21: Secure multiparty computation (MPC): definition, Oblivious transfer
0515 Lecture 22: Secure MPC: Yao's Garbled circuits
0520 Lecture 23: Obfuscation I: definitions
0522 Lecture 24: Obfuscation II: applications
0527 Lecture 25: Obfuscation III: constructions, and other interesting topics
0529 Project presentation I
0603 Project presentation II
0605 Project presentation III
0610 Project presentation IV. Ending.