Date: Tue, 26 Nov 1996 18:38:53 GMT Server: NCSA/1.5.2 Last-modified: Fri, 19 Jan 1996 02:09:23 GMT Content-type: text/html Content-length: 4623 CS 182 Syllabus

Computer Science 182 - Seminar on Encryption

Pomona College
Spring Semester, 1996
Mr. Bull
Millikan 210
TTh 2:45

Prerequisites:
In Computer Science, students should have taken at least Pomona CS 41 or HMC CS 60. A background of several upper­ division courses, particularly Algorithms, would be helpful but is not absolutely necessary.

In Mathematics, students should have taken at least one course which contains formal definitions, theorems, and proofs. Linear Algebra is usually such a course. There will be some basic number theory that will be covered along the way, so students should be comfortable reading, understanding, and discussing mathematical topics.

Materials:
There is no textbook to purchase. We will be using books and journal articles from the libraries and resources from the web. Some of these will be mentioned in class; others will be discovered by members of the class. Expect to spend some time in the library, and see the note below on the bibliography project.

Topics:
The seminar is about systems for encryption and authentication, with an emphasis on mathematical foundations and algorithms. Although implementations, social issues, and legal questions are important, they are of secondary interest. The specific topics will depend on the interests of the participants and the available resources.

Requirements and Grading:
Each student will carry out a research project during the semester. We will discuss possible topics by the third or fourth week of the semester. A proposal, with a topic and a list of possible sources, is due on March 7. A paper of approximately ten pages is due on April 30.

The seminar will consist primarily of student presentations and discussion. Each student will make two to four presentations, one of which will be a report on the student's project.

Grades will be determined by the project, seminar presentations, participation in discussion, and contributions to the bibliography.

Office Hours:
Mondays 1:15-2:30, Tuesdays 11-12, Fridays 11-12, and by appointment. Millikan 212­ c. Extension 18709. Electronic mail: rbull@pomona.edu

Bibliography Project:
The class will compile a bibliography of encryption. Turn in the bibliographic information and a one­ sentence description of each and every book or article that you consult. The form does not matter, as long as all the information is there. Here are a few examples.

For a book, include the author, title, publisher, series and/or edition (if applicable), and date of publication. In all cases, attach your name or initials to a short descriptive comment.

For an article in a journal, include the author, article title, journal name, volume and number of the issue, date, and pages.

For a contributed chapter, include the author, contribution title, editor, book title, publisher, series and/or edition (if applicable), date of publication, and pages.



Everett Bull
January 18, 1996