| Part 1: Cryptography
|
| Jan 29 |
Course intro & policies; Message integrity |
|
| Jan 31 |
Pseudorandomness and Stream ciphers |
|
| Feb 5 |
Asymmetric cryptography |
|
| Feb 7 |
Key exchange |
|
| Feb 12 |
Public key infrastructure - Part 1 |
|
| Feb 14 |
Public key infrastructure - Part 2 |
|
| Feb 19 |
Authenticating people |
|
| Feb 21 |
[Buffer] |
|
| Feb 26 |
Anonymous communication |
|
| Part 2: Securing systems
|
| Feb 28 |
Network security - part 1 |
|
| Mar 4 |
Network security - part 2 |
|
| Mar 6 |
Network security - part 3 |
| Mar 11 |
Spring Recess |
|
| Mar 13 |
Spring Recess |
|
| Mar 18 |
Web security |
|
| Mar 20 |
Cryptocurrencies |
|
| Mar 25 |
[Buffer] |
|
| Mar 27 |
Memory Safety |
|
| Part 3: Special topics
|
| Apr 1 |
Machine learning and security - Part 1 |
|
| Apr 3 |
Machine learning and security - Part 2 |
|
| Apr 8 |
Formal methods and security - Part 1 |
|
| Apr 10 |
Formal methods and security - Part 2 |
|
| Apr 15 |
Privacy |
|
| Apr 17 |
Side channel attacks |
|
| Apr 22 |
Quantum Security |
|
| Apr 24 |
Human Factors |
|
| Final exam
|
| May 10-16 |
Friend 101 |
|