Date | Topic | |
---|---|---|
Part 1: Cryptography | ||
Tue Feb 5 | Message integrity | |
Thu Feb 7 | Pseudorandomness | |
Tue Feb 12 | Stream ciphers and block ciphers | |
Thu Feb 14 | [Buffer] | |
Tue Feb 19 | Asymmetric cryptography | |
Thu Feb 21 | Key exchange | |
Tue Feb 26 | Authenticating people | |
Thu Feb 28 | [Buffer] | |
Part 2: Securing systems | ||
Tue Mar 5 | Public key infrastructure | |
Thu Mar 7 | Operating system security | |
Tue Mar 12 | Hardware and side channels | |
Thu Mar 14 | [Buffer] | |
Tue Mar 19 | Spring Recess | |
Thu Mar 21 | Spring Recess | |
Tue Mar 26 | Network Security | |
Thu Mar 28 | Web security | |
Tue Apr 2 | Vulnerabilities and Malware | |
Thu Apr 4 | [Buffer] | |
Part 3: Special topics | ||
Tue Apr 9 | Privacy | |
Thu Apr 11 | Anonymous communication | |
Tue Apr 16 | Cryptocurrencies | |
Thu Apr 18 | Machine learning and security | |
Tue Apr 23 | Machine learning and security | |
Thu Apr 25 | Fraud and cybercrime | |
Tue Apr 30 | Human factors | |
Thu May 2 | Physical security | |
Final exam | ||
May TBD | Time/Location TBD |