CSE 536 Cryptography
Winter 1996

Instructor

Paul Beame, beame@cs.washington.edu

Handouts

Syllabus

Exercises

Exercises - Updated periodically

Lecture Notes

For directions on producing these see /homes/june/beame/SHARED/lectures/DIRECTIONS
  • Lecture 1
  • Lecture 2
  • Lecture 3
  • Lecture 4
  • Lecture 5
  • Lecture 6
  • Lecture 7
  • Lecture 8
  • Lecture 9

    Texts:

    I told the bookstore that there were two recommended texts: The Second Edition of Applied Cryptography by Schneier and Pseudorandomness by Luby. I won't follow either book and a chunk of stuff will come from papers. The Schneier book is encyclopedic but it contains lots of errors and doesn't distinguish between security that is conjectured and that based on proven complexity results. The Luby book has a very good exposition of a portion of the 1980's cryptography theory.