| 1 |              
 Course Introduction (PDF)
 |                |          
| 2 |               Security Mechanisms and Principles (PDF)
  |              Juels, Ari, and Ronald Rivest. "Honeywords: Making Password-Cracking Detectable." ACM CCS (2013): 145–60. |          
| 3 |              
 Encryption, Perfect Secrecy, One-Time Pad (PDF - 1.6MB)
 |              [Katz and Lindell] Chapters 1, 2, and 3. |          
| 4 |              
 Cryptographic Hash Functions (PDF - 1.6MB)
 |              
 Avgerinos, Thanassis, Sang Kil Cha, et al. "Automatic Exploit Generation." Communications of the ACM 57, no. 2 (2014): 74–84.              Hess, Austin. "Student Innovators May Get New Legal Resource." The Tech 134, no. 5 (2014). 
 |          
| 5 |              
 Hashing Applications and Constructions (PDF - 1.7MB)
 |              Rivest, Ronald L., and Adi Shamir.  "PayWord and MicroMint: Two Simple Micropayment Schemes." (PDF) MIT Laboratory for Computer Science, 2001. |          
| 6 |              Bitcoin (PDF) |                |          
| 7 |              
 Secret Sharing (PDF - 2.2MB)              (Only read the section on secret sharing) |                |          
| 8 |              
 Block Ciphers (PDF - 2.8MB)
 |                |          
| 9 |              
 Block Cipher Modes (PDF - 5.2MB)
 |              Desai, Anand. "New Paradigms for Constructing Symmetric Encryption Schemes Secure Against Chosen-Ciphertext Attack." Advances in Crptography 1880 (2000): 394–412. (University of California at San Diego.) |          
| 10 |              
 Message Authentication Codes (PDF - 6.7MB)
 |              Bellare, M., P. Rogaway, et al. "The EAX Mode of Operation." Fast Software Encryption 3017 (2004): 389–407. |          
| 11 |              
 Prime Finding and other "Crypto" Math (PDF - 8.1MB)
 |              Cao, Zhengjun.  "A Note On the Storage Requirement for AKS Primality Testing Algorithm." (PDF) Shanghai University. |          
| 12 |              
 Diffie-Hellman Key Exchange and Crypto Groups (PDF - 7.6MB)
 |              Cryptographic Auctions |          
| 13 |              
 Pedersen Commitment, PK Encryption, DDH (PDF - 8.4MB)
 |              
   Paar, Christof, and Jan Pelzl. Chapters 6, 7, and 8 in Understanding Cryptography: A Textbook for Students and Practitioners. Springer, 2011. ISBN: 9783642041006. [Preview with Google Books]              [Katz and Lindell] Chapter 10. 
 |          
| 14 |              
 Malleability of El Gamal, IND-CCA2 (PDF - 8.1MB)
 |              
 Diffie, Whitfield, and Martin E. Hellman. "New Directions in Cryptography." IEEE Transactions on Information Theory 22, no. 6 (1976): 644–54.              Boneh, Dan.  "Twenty Years of Attacks on the RSA Cryptosystem." (PDF) Notices of the AMS 42, no. 2 (1999): 203–13. 
 |          
| 15 |              
 Digital Signatures (PDF - 8.4MB)
 |                |          
| 16 |              
 DSA, Gap Groups (PDF - 3.0MB)
 |              Project Progress Review |          
| 17 |              
 Gap Groups, Bilinear Maps, and Applications (PDF - 5.2MB)
 |              
 Dutta, R., R. Barua, et al. "Pairing-Based Cryptographic Protocols: A Survey." Cryptology ePrint Archive: Report 2004 / 064.              The Pairing-Based Crypto Lounge. 
 |          
| 18 |              
 Zero-Knowledge Proofs (PDF - 4.0MB)
 |              
 Goldreich, Oded. "A Short Tutorial of Zero-Knowledge." Weizmann Institute of Science, 2010.              Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. 
 |