Lecture Notes on Cryptography

Lecture Notes on Cryptography

A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).

Tag(s): Cryptography

Publication date: 01 Aug 2001

ISBN-10: n/a

ISBN-13: n/a

Paperback: 283 pages

Views: 27,491

Type: Lecture Notes

Publisher: n/a

License: n/a

Post time: 31 Mar 2007 07:03:47

Lecture Notes on Cryptography

Lecture Notes on Cryptography A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).
Tag(s): Cryptography
Publication date: 01 Aug 2001
ISBN-10: n/a
ISBN-13: n/a
Paperback: 283 pages
Views: 27,491
Document Type: Lecture Notes
Publisher: n/a
License: n/a
Post time: 31 Mar 2007 07:03:47
From the Introduction:

This is a set of lecture notes on cryptography compiled for 687s, a one week long course on cryptography taught at MIT by Shafi Goldwasser and Mihir Bellare in the summers of 1996-2001. The notes were formed by merging notes written for Shafi Goldwasser's Cryptography and Cryptanalysis course at MIT with notes written for Mihir Bellare's Cryptography and network security course at UCSD. In addition, Rosario Gennaro (as Teaching Assistant for the course in 1996) contributed Section 9.6, Section 11.4, Section 11.5, and Appendix D to the notes, and also compiled, from various sources, some of the problems in Appendix E.

Cryptography is of course a vast subject. The thread followed by these notes is to develop and explain the notion of provable security and its usage for the design of secure protocols.

Much of the material in Chapters 2, 3 and 7 is a result of scribe notes, originally taken by MIT graduate students who attended Professor Goldwasser's Cryptography and Cryptanalysis course over the years, and later edited by Frank D'Ippolito who was a teaching assistant for the course in 1991. Frank also contributed much of the advanced number theoretic material in the Appendix. Some of the material in Chapter 3 is from the chapter on Cryptography, by R. Rivest, in the Handbook of Theoretical Computer Science.

Chapters 4, 5, 6, 8 and 10, and Sections 9.5 and 7.4.6; were written by Professor Bellare for his Cryptography and network security course at UCSD.
 




About The Author(s)



Shafi Goldwasser is the RSA Professor of Electrical Engineering and Computer Science at Massachusetts Institute of Technology, and of computer science and applied mathematics at Weizmann Institute of Science in Israel. She is also the co-leader of the Cryptography and Information Security (CIS) Group and a member of the Complexity Theory Group within the Theory of Computation Group and the Laboratory for Computer Science.

Shafi Goldwasser

Shafi Goldwasser is the RSA Professor of Electrical Engineering and Computer Science at Massachusetts Institute of Technology, and of computer science and applied mathematics at Weizmann Institute of Science in Israel. She is also the co-leader of the Cryptography and Information Security (CIS) Group and a member of the Complexity Theory Group within the Theory of Computation Group and the Laboratory for Computer Science.


Book Categories
Sponsors
Icons8, a free icon pack