Date | Topic | |
---|---|---|
Part 1: Cryptography | ||
Tue Feb 2 | Message integrity | |
Thu Feb 4 | Pseudorandomness | |
Tue Feb 9 | Stream ciphers and block ciphers | |
Thu Feb 11 | [Buffer] | |
Tue Feb 16 | Asymmetric cryptography | |
Thu Feb 18 | Key exchange | |
Tue Feb 23 | Authenticating people | |
Thu Feb 25 | [Buffer] | |
Part 2: Securing systems | ||
Tue Mar 2 | Public key infrastructure | |
Thu Mar 4 | Operating system security | |
Tue Mar 9 | Hardware and side channels | |
Thu Mar 11 | [Buffer] | |
Tue Mar 16 | Spring Recess | |
Thu Mar 18 | [Buffer] | |
Tue Mar 23 | [Buffer] | |
Thu Mar 25 | Network Security | |
Tue Mar 30 | Web security | |
Thu Apr 1 | Vulnerabilities and Malware | |
Tue Apr 6 | [Buffer] | |
Part 3: Special topics | ||
Thu Apr 8 | Privacy | |
Tue Apr 13 | Anonymous communication | |
Thu Apr 15 | Cryptocurrencies | |
Tue Apr 20 | Machine learning and security | |
Thu Apr 22 | Machine learning and security | |
Tue Apr 27 | Fraud and cybercrime | |
Final exam | ||
May TBD | Time/Location TBD |