title updates
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 1
|
||||
# CSE442T Introduction to Cryptography (Lecture 1)
|
||||
|
||||
## Chapter 1: Introduction
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 10
|
||||
# CSE442T Introduction to Cryptography (Lecture 10)
|
||||
|
||||
## Chapter 2: Computational Hardness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 11
|
||||
# CSE442T Introduction to Cryptography (Lecture 11)
|
||||
|
||||
Exam info posted tonight.
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 12
|
||||
# CSE442T Introduction to Cryptography (Lecture 12)
|
||||
|
||||
## Chapter 3: Indistinguishability and Pseudorandomness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 13
|
||||
# CSE442T Introduction to Cryptography (Lecture 13)
|
||||
|
||||
## Chapter 3: Indistinguishability and Pseudorandomness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 14
|
||||
# CSE442T Introduction to Cryptography (Lecture 14)
|
||||
|
||||
## Recap
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 15
|
||||
# CSE442T Introduction to Cryptography (Lecture 15)
|
||||
|
||||
## Chapter 3: Indistinguishability and Pseudorandomness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 16
|
||||
# CSE442T Introduction to Cryptography (Lecture 16)
|
||||
|
||||
## Chapter 3: Indistinguishability and Pseudorandomness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 17
|
||||
# CSE442T Introduction to Cryptography (Lecture 17)
|
||||
|
||||
## Chapter 3: Indistinguishability and Pseudorandomness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 18
|
||||
# CSE442T Introduction to Cryptography (Lecture 18)
|
||||
|
||||
## Chapter 5: Authentication
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 19
|
||||
# CSE442T Introduction to Cryptography (Lecture 19)
|
||||
|
||||
## Chapter 5: Authentication
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 2
|
||||
# CSE442T Introduction to Cryptography (Lecture 2)
|
||||
|
||||
## Probability review
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 20
|
||||
# CSE442T Introduction to Cryptography (Lecture 20)
|
||||
|
||||
## Chapter 5: Authentication
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 21
|
||||
# CSE442T Introduction to Cryptography (Lecture 21)
|
||||
|
||||
## Chapter 5: Authentication
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 22
|
||||
# CSE442T Introduction to Cryptography (Lecture 22)
|
||||
|
||||
## Chapter 7: Composability
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 23
|
||||
# CSE442T Introduction to Cryptography (Lecture 23)
|
||||
|
||||
## Chapter 7: Composability
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 24
|
||||
# CSE442T Introduction to Cryptography (Lecture 24)
|
||||
|
||||
## Chapter 7: Composability
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 3
|
||||
# CSE442T Introduction to Cryptography (Lecture 3)
|
||||
|
||||
All algorithms $C(x)\to y$, $x,y\in \{0,1\}^*$
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE442T Lecture 4
|
||||
# CSE442T Introduction to Cryptography (Lecture 4)
|
||||
|
||||
## Recap
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 5
|
||||
# CSE442T Introduction to Cryptography (Lecture 5)
|
||||
|
||||
## Chapter 2: Computational Hardness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 6
|
||||
# CSE442T Introduction to Cryptography (Lecture 6)
|
||||
|
||||
## Review
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 7
|
||||
# CSE442T Introduction to Cryptography (Lecture 7)
|
||||
|
||||
## Chapter 2: Computational Hardness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 8
|
||||
# CSE442T Introduction to Cryptography (Lecture 8)
|
||||
|
||||
## Chapter 2: Computational Hardness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# Lecture 9
|
||||
# CSE442T Introduction to Cryptography (Lecture 9)
|
||||
|
||||
## Chapter 2: Computational Hardness
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# System check for exam list
|
||||
# CSE442T Exam 1 Review
|
||||
|
||||
**The exam will take place in class on Monday, October 21.**
|
||||
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# CSE 442T
|
||||
# CSE442T Course Description
|
||||
|
||||
## Course Description
|
||||
|
||||
@@ -6,7 +6,7 @@ This course is an introduction to the theory of cryptography. Topics include:
|
||||
|
||||
One-way functions, Pseudorandomness, Private-key cryptography, Public-key cryptography, Authentication, and etc.
|
||||
|
||||
### Instructor:
|
||||
### Instructor
|
||||
|
||||
[Brian Garnett](bcgarnett@wustl.edu)
|
||||
|
||||
@@ -16,15 +16,15 @@ Proof based course and write proofs.
|
||||
|
||||
CSE 433 for practical applications.
|
||||
|
||||
### Office Hours:
|
||||
### Office Hours
|
||||
|
||||
Right after class! 4-5 Mon, Urbaur Hall 227
|
||||
|
||||
### Textbook:
|
||||
### Textbook
|
||||
|
||||
[A course in cryptography Lecture Notes](https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf)
|
||||
|
||||
### Comments:
|
||||
## Comments
|
||||
|
||||
Most proofs are not hard to understand.
|
||||
|
||||
@@ -39,7 +39,7 @@ I'm having a hard time to recover them without reading the book.
|
||||
|
||||
The lecturer's explanation is good but you'd better always pay attention in class or you'll having a hard time to catch up with the proof.
|
||||
|
||||
### Notations used in this course
|
||||
## Notations used in this course
|
||||
|
||||
The notations used in this course is very complicated. However, since we need to defined those concepts mathematically, we have to use those notations. Here are some notations I changed or emphasized for better readability at least for myself.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user