Course Outline and Lectures:
The following is a tentative outline for the lectures for the course:
| Date | Module | Lecture | Description | Reading |
|---|---|---|---|---|
| Jan 19 | 1 | 1 | Introduction, Definitions, and Threat Models | |
| Jan 28 | 2 | Cryptographic Primitives (Symmetric and Assymetric Encryption) | ||
| Feb 2 | 3 | Cryptographic Primitives (Signatures and Hashing) | ||
| Feb 9 | 4 | Epistemic Logic for Information Security | ||
| Feb 16 | 5 | The Dolev-Yao Model | ||
| Feb 23 | 6 | Formal Verification of Security Protocols | ||
| TBD | 2 | 7 | Heartbleed Vulnerability | |
| TBD | 8 | Privacy and Security in Web Browsing | ||
| TBD | 9 | Electronic Voting Machines | ||
| TBD | 10 | Prompt Injection in LLMs | ||
| TBD | 3 | 12 | Zero-Knowledge Proofs | |
| TBD | 13 | Secure Multi-party Computation | ||
| TBD | 14 | Post-Quantum Cryptography |