Lectures
Table of Contents
| Week | Dates | Topics | Scribe |
|---|---|---|---|
| 1 | Oct 31 | Administrative, Introduction, Perfect Secrecy and its Limitations | Lec1 |
| 2 | Nov 7 | Computational Secrecy | Lec2 |
| 3 | Nov 14 | Pseudorandomness, One-Way Functions, and Hardcore Bits | Lec3 |
| 4 | Nov 21 | The Goldreich-Levin Theorem and Pseudorandom Functions | Lec4 |
| 5 | Nov 28 | Pseudorandom Functions: Constructions and Applications (MACs and Signatures) | Lec5 |
| 6 | Dec 12 | Digital Signatures Recap, Public-Key Encryption | Lec6 |
| 7 | Dec 19 | Zero-Knowledge Proofs | Lec7 |
| 8 | Dec 26 | Multi-Party Computation, Reduction to Semi-Honest Adversaries | Lec8 |
| 9 | January 2 | MPC against Semi-Honest Adversaries, GMW, and Yao's Garbled Circuit | Lec9 |
| 10 | Jan 9 | Fully-Homomorphic Encryption | Lec10 |
| 11 | Jan 16 | Non-Interactive Zero Knowledge | Lec11 |
| 12 | Jan 23 | Adaptive NIZK and Chosen-Ciphertext Attacks | Lec12 |





