CSE 536 Cryptography
Winter 1996
Instructor
Paul Beame,
beame@cs.washington.edu
- Lectures TuTh 12:00 - 1:20 in Sieg 226.
- Office Sieg 416
- Phone 543-5114
- Office Hours M 2:00-3:00, W 9:30-11:30, F 10:00-11:00 or by appointment.
Handouts
Syllabus
Exercises
Exercises - Updated periodically
Lecture Notes
For directions on producing these see
/homes/june/beame/SHARED/lectures/DIRECTIONS
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Texts:
I told the bookstore that there were two recommended texts: The Second Edition
of Applied Cryptography by Schneier and Pseudorandomness by Luby. I won't
follow either book and a chunk of stuff will come from papers. The Schneier
book is encyclopedic but it contains lots of errors and doesn't
distinguish between security that is conjectured and that based on proven
complexity results. The Luby book has a very good exposition of a portion
of the 1980's cryptography theory.