G22.3210-001/G63.2170 Introduction to Cryptography
September 30, 2008
Lecture 5
Lecturer: Yevgeniy Dodis Fall 2008
In this lecture we formalize our understanding of next-bit security and its relationship to pseudorandomness. Namely, we prove that next-bit
G22.3210-001/G63.2170 Introduction to Cryptography
Sep 16, 2008
Lecture 3
Lecturer: Yevgeniy Dodis
Fall 2008
This lecture mainly discusses some basic facts about Z, Zp , Zn . Special interest is given to
the computational complexity of various operations
G22.3210-001/G63.2170 Introduction to Cryptography
September 2, 2008
Lecture 1
Lecturer: Yevgeniy Dodis
Fall 2008
These notes dene the problem of secure communication, identify the relevant agents, and offer
some assumptions about those agents. An initial
G22.3210-001/G63.2170 Introduction to Cryptography
Sep 23, 2008
Lecture 4
Lecturer: Yevgeniy Dodis
Fall 2008
This lecture will study the notion of hardcore bit for a given OWF f . Intuitively, such
a hardcore bit h(x) is easy to compute from x, but almost
G22.3210-001/G63.2170 Introduction to Cryptography
October 14, 2008
Lecture 7
Lecturer: Yevgeniy Dodis
Fall 2008
Last time we proved that if there exists a secure PKE E to encrypt one bit, then there
also exists a secure PKE E to encrypt as many bits as w
G22.3210-001/G63.2170 Introduction to Cryptography
December 2, 2008
Lecture 14
Lecturer: Yevgeniy Dodis
Fall 2008
This lecture is on Commitment Schemes. Informally, a commitment scheme abstracts
the notion of a locked box: the contents of the box are hidd
G22.3210-001/G63.2170 Introduction to Cryptography
November 18, 2008
Lecture 12
Lecturer: Yevgeniy Dodis
Fall 2008
We saw that -universal hash families are very useful in the design of pseudorandom
functions (and, thus, message authenticated codes). We wi
G22.3210-001/G63.2170 Introduction to Cryptography
November 11, 2008
Lecture 11
Lecturer: Yevgeniy Dodis
Fall 2008
Last time we dened almost universal hash functions, and showed how they are useful
for message authentication. Recall, such family H = cfw_h
G22.3210-001/G63.2170 Introduction to Cryptography
November 4, 2008
Lecture 10
Lecturer: Yevgeniy Dodis Fall 2008
Last time we defined several modes of operation for encryption. Today we prove their security, and then spend the rest of the lecture studyin