ENEE/CMSC/MATH456 Cryptography: Spring 2022 Lecture Summaries
Lecture 1
(1/24). See also
Class Exercise
.
Lecture 2
(1/26).
Lecture 3
(1/31). See also
Class Exercise
. Some additional notes
here
.
Lecture 4
(2/2). See also
Class Exercise Solutions
. Some additional notes
here
.
Lecture 5
(2/7). See also
Optional Class Exercise
. Some additional notes
here
.
Lecture 6
(2/9). See also
Class Exercise
. Some additional notes
here
.
Lecture 7
(2/14). See also
Class Exercise Short Solutions
and
Detailed Solutions
. Some additional notes
here
.
Lecture 8
(2/16). See also
Class Exercise
Some additional notes
here
.
Lecture 9
(2/21). See also
Class Exercise Solutions
. Some additional notes
here
.
Lecture 10
(2/23). See also
Class Exercise
. Some additional notes
here
.
Lecture 11
(2/28). See also
Class Exercise Solutions
. Some additional notes
here
.
Lecture 12
(3/2). Some additional notes
here
.
Lecture 13
(3/7). Some additional notes
here
.
Lecture 14
(3/9).
Review Session
(3/14).
Lecture 15
(3/28). See also
Class Exercise
and
Class Exercise Solutions
. Some additional notes
here
.
Lecture 16
(3/30). See also
SPN Diagram
See also
Class Exercise
and
Class Exercise Solutions
. Some additional notes
here
.
Lecture 17
(4/4). See also
Class Exercise
and
Class Exercise Solutions
. Some additional notes
here
.
Lecture 18
(4/6). Some additional notes
here
.
Lecture 19
(4/11). See also
Class Exercise
, and an
additional resource
on Extended Euclidean Algorithm. See also
Class Exercise Solutions
. Some additional notes
here
.
Lecture 20
(4/13). See also
Class Exercise
and
Class Exercise Solutions
. Some additional notes
here
.
Lecture 21
(4/18). Some additional notes
here
.
Lecture 22
(4/20). See also
Optional Class Exercise
and
Optional Class Exercise Solutions
. Some additional notes
here
.
Lecture 23
(4/25). Some additional notes
here
.
Lecture 24
(4/27). See also
Class Exercise
. and
Class Exercise Solutions
. Some additional notes
here
.
Lecture 25
(5/2). See also
Class Exercise
. Additional notes and solutions can be found
here
. Some additional notes
here
.
Lecture 26
(5/4). See also
Class Exercise
and
Class Exercise Solutions
.
Review Session
(5/9).
Notes
for optional lecture on Lattice-Based Cryptography.
Notes
for optional lecture on Discrete-Log-Based Signatures.