Lecture |
Date |
Handouts |
Slides |
1 |
Mon 9/14 |
- Handout 1,
- Homework 1,
- The RC5 Encryption Algorithm, by Ronald L. Rivest,
- Efficient DES Key Search, by Michael J. Wiener.
|
HTML, Postscript |
2 |
Mon 9/21 |
- How to Explain Zero-Knowledge Protocols to Your Children, by Jean-Jacques Quisquater, et.al.,
- Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks, by Paul Kocher,
- Elliptic Curves and Cryptography, by Aleksander Jurisic and Alfred J. Menezes,
- Security In Computing, by Charles Pfleeger, pages 153-159.
|
HTML, Postscript |
3 |
Mon 9/28 |
- Homework 2,
- Robustness Principles for Public Key Protocols, by Ross Anderson and Roger Needham,
- Programming Satan's Computer, by Ross Anderson and Roger Needham,
- Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham,
- Limitations of the Kerberos Authentication System, by S.M. Bellovin and M. Merritt.
|
HTML, Postscript |
4 |
Mon 10/5 |
- Rejoinder to Nessett, by Michael Burrows, Martin Abadi and Roger Needham,
- A Critique of the Burrows, Abadi and Needham Logic, by Dan M. Nessett,
- On the Security of Public Key Protocols, by Danny Dolev and Andrew C. Yao,
- A Logic of Authentication, by Michael Burrows, Martin Abadi, and Roger Needham,
- A Semantics for a Logic of Authentication, by Martin Abadi and Mark Tuttle.
| HTML,Postscript |
5 |
Fri 10/9 |
- Homework 3,
- Three Systems for Cryptographic Protocol Analysis, by R. Kemmerer, C. Meadows, and J. Millen,
- Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR, by Gavin Lowe,
- Fast, Automatic Checking of Security Protocols, by Darrell Kindred and Jeannette Wing,
- Automated Analysis of Cryptographic Protocols Using Mur, by John Mitchell, Mark Mitchell and Ulrich Stern,
- Proving Properties of Security Protocols by Induction, by Laurence Paulson
- Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols, by E.M. Clarke, S. Jha, and W. Marrero
|
  |
6 |
Mon 10/19 |
- Untraceable Electronic Cash, by David Chaum, Amos Fiat and Moni Naor
- Atomicity in Electronic Commerce, by J.D. Tygar
- iKP - A Family of Secure Electronic Payment Protocols, by Mihir Bellare, et.al.
- The Millicent Protocol For Inexpensive Electronic Commerce, by Steve Glassman, et.al.
- Untraceable Off-line Cash in Wallet with Observers, by Stefan Brands
- Universal Electronic Cash, by Tatsuaki Okamoto and Kazuo Ohta
|
HTML, Postscript |
7 |
Mon 10/26 |
- Security Without Identification: Transaction Systems To Make Big Brother Obsolete, by David Chaum
|
HTML, Postscript |
8 |
Mon 11/2 |
- Homework 4
- The Design and Implementation of a Secure Auction Service, by Matthew Franklin and Michael Reiter
- A Practical Secret Voting Scheme for Large Scale Elections, by Atsushi Fujioka, Tatsuaki Okamoto and Kazuo Ohta
- Secret Ballot Elections in Computer Networks, by Hannu Nurmi, ARto Salomaa and Lila Santean
- All-or-Nothing Disclosure of Secrets, by Gilles Brassard and Claude Crepeau
- Receipt-Free Secret-Ballot Elections, by Josh Benaloh and Dwight Tuinstra
- Verifiable Secret Sharing and Multiparty Protocols with Honest Majority, by Tal Rabin and Michael Ben-Or
- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, by Josh Cohen Benaloh
|
HTML, Postscript |
9 |
Mon 11/9 |
- Attacks On Copyright Marking Systems, by F. Petitcolas, R. Anderson and M. Kuhn
- Secure Spread Spectrum Watermarking for Multimedia, by I. Cox, J. Kilian, T. Leighton and T. Shamoon
- Multimedia Data-Embedding and Watermarking Technologies, by M. Swanson, M. Kobayshi and A. Tewfik
- Protecting Digital Media Content, by Nasir Memon and Ping Wah Wong
- Secure Copyright Protection Techniques for Digital Images, by A. Herrigel, J. O'Ruanaidh, H. Petersen, S. Pereira and T. Pun
|
HTML, Postscript |
10 |
Mon 11/16 |
Part I: Security in the Real World (Tom Longstaff) Part II: Digital Watermarking in the Real World (Adrian Perrig) |
Part I: HTML,Postscript PartII: HTML, Postscript
|
11 |
Mon 11/23 |
Part I: Electronic Commerce in the Real World(Marvin Sirbu) Part II: Electronic Auctions in the Real World(Ramayya Krishnan) |
HTML, Postscript |