Foundations of Cryptography (Spring 2026)
W 9:50-11:25, F 13:30-15:05; @6A211
Office hour: W 13:00 - 14:00 @FIT 4-6008 (6th floor)
Email: [email protected]
TAs: Xinmiao Han, Liheng Ji, Wenjie Li
Main reference:
A Course in Cryptography, Chapters 1-6, Rafael Pass & abhi shelat
https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
A Course in Cryptography, Chapters 1-6, Rafael Pass & abhi shelat
https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
Other references:
A graduate course in applied cryptography, Dan Boneh & Victor Shoup
Foundations of Cryptography I, II, Oded Goldreich
A graduate course in applied cryptography, Dan Boneh & Victor Shoup
Foundations of Cryptography I, II, Oded Goldreich
Tentative Schedule: (subject to change by holiday schedule)
0225 Lecture 1: Introduction I
0227 Lecture 2: Introduction II
0304 Lecture 3: Encryption with perfect secrecy
0306 Lecture 4: Computational hardness and one-way functions, factoring
0311 Lecture 5: Algorithms and hard problems related to factoring, RSA, and discrete-log
0313 Lecture 6: Indistinguishability and pseudorandomness
0318 Lecture 7: Pseudorandom generators
0320 Lecture 8: Hardcore bits, Goldreich-Levin
0325 Lecture 9: Pseudorandom functions: definitions and construction attempts
0327 Lecture 10: GGM's construction of PRF, and probabilistic encryption
0401 Lecture 11: Public-key encryption
0403 Lecture 12: Private-key encryption
0408 Lecture 13: Digital Signature
0410 Lecture 14: Collision resistant hash functions and signature in the random oracle model
0415 Lecture 15: Public-key encryption from LWE
0417 Lecture 16: Levelled fully homomorphic encryption from LWE, bootstrapping
0422 Midterm exam
0424 Lecture 17: Interactive proofs, zero-knowledge. Project ideas discussion
0429 Lecture 18: Zero-knowledge proofs for graph-isomorphism
0508 Lecture 19: Zero-knowledge proofs for all NP, commitments
0513 Lecture 20: Secure multiparty computation (MPC): definition, Oblivious transfer
0515 Lecture 21: Secure MPC: Yao's Garbled circuits
0520 Lecture 22: Obfuscation I: definitions
0522 Lecture 23: Obfuscation II: applications
0527 Lecture 24: Obfuscation III: constructions, and other interesting topics
0529 Lecture 25: Other interesting topics
0603 Project presentation I
0605 Project presentation II
0610 Project presentation III
0612 Project presentation IV. Ending.