Lectures

Lecture Date Handouts Slides
1 Mon 9/14
  • Handout 1,
  • Homework 1,
  • The RC5 Encryption Algorithm, by Ronald L. Rivest,
  • Efficient DES Key Search, by Michael J. Wiener.
HTML, Postscript
2 Mon 9/21
  • How to Explain Zero-Knowledge Protocols to Your Children, by Jean-Jacques Quisquater, et.al.,
  • Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks, by Paul Kocher,
  • Elliptic Curves and Cryptography, by Aleksander Jurisic and Alfred J. Menezes,
  • Security In Computing, by Charles Pfleeger, pages 153-159.
HTML, Postscript
3 Mon 9/28
  • Homework 2,
  • Robustness Principles for Public Key Protocols, by Ross Anderson and Roger Needham,
  • Programming Satan's Computer, by Ross Anderson and Roger Needham,
  • Prudent Engineering Practice for Cryptographic Protocols, by Martin Abadi and Roger Needham,
  • Limitations of the Kerberos Authentication System, by S.M. Bellovin and M. Merritt.
HTML, Postscript
4 Mon 10/5
  • Rejoinder to Nessett, by Michael Burrows, Martin Abadi and Roger Needham,
  • A Critique of the Burrows, Abadi and Needham Logic, by Dan M. Nessett,
  • On the Security of Public Key Protocols, by Danny Dolev and Andrew C. Yao,
  • A Logic of Authentication, by Michael Burrows, Martin Abadi, and Roger Needham,
  • A Semantics for a Logic of Authentication, by Martin Abadi and Mark Tuttle.
HTML,Postscript
5 Fri 10/9
  • Homework 3,
  • Three Systems for Cryptographic Protocol Analysis, by R. Kemmerer, C. Meadows, and J. Millen,
  • Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR, by Gavin Lowe,
  • Fast, Automatic Checking of Security Protocols, by Darrell Kindred and Jeannette Wing,
  • Automated Analysis of Cryptographic Protocols Using Mur, by John Mitchell, Mark Mitchell and Ulrich Stern,
  • Proving Properties of Security Protocols by Induction, by Laurence Paulson
  • Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols, by E.M. Clarke, S. Jha, and W. Marrero
 
6 Mon 10/19
  • Untraceable Electronic Cash, by David Chaum, Amos Fiat and Moni Naor
  • Atomicity in Electronic Commerce, by J.D. Tygar
  • iKP - A Family of Secure Electronic Payment Protocols, by Mihir Bellare, et.al.
  • The Millicent Protocol For Inexpensive Electronic Commerce, by Steve Glassman, et.al.
  • Untraceable Off-line Cash in Wallet with Observers, by Stefan Brands
  • Universal Electronic Cash, by Tatsuaki Okamoto and Kazuo Ohta
HTML, Postscript
7 Mon 10/26
  • Security Without Identification: Transaction Systems To Make Big Brother Obsolete, by David Chaum
HTML, Postscript
8 Mon 11/2
  • Homework 4
  • The Design and Implementation of a Secure Auction Service, by Matthew Franklin and Michael Reiter
  • A Practical Secret Voting Scheme for Large Scale Elections, by Atsushi Fujioka, Tatsuaki Okamoto and Kazuo Ohta
  • Secret Ballot Elections in Computer Networks, by Hannu Nurmi, ARto Salomaa and Lila Santean
  • All-or-Nothing Disclosure of Secrets, by Gilles Brassard and Claude Crepeau
  • Receipt-Free Secret-Ballot Elections, by Josh Benaloh and Dwight Tuinstra
  • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority, by Tal Rabin and Michael Ben-Or
  • Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret, by Josh Cohen Benaloh
HTML, Postscript
9 Mon 11/9
  • Attacks On Copyright Marking Systems, by F. Petitcolas, R. Anderson and M. Kuhn
  • Secure Spread Spectrum Watermarking for Multimedia, by I. Cox, J. Kilian, T. Leighton and T. Shamoon
  • Multimedia Data-Embedding and Watermarking Technologies, by M. Swanson, M. Kobayshi and A. Tewfik
  • Protecting Digital Media Content, by Nasir Memon and Ping Wah Wong
  • Secure Copyright Protection Techniques for Digital Images, by A. Herrigel, J. O'Ruanaidh, H. Petersen, S. Pereira and T. Pun
HTML, Postscript
10 Mon 11/16 Part I: Security in the Real World (Tom Longstaff)
Part II: Digital Watermarking in the Real World (Adrian Perrig)
Part I:
HTML,Postscript
PartII:
HTML, Postscript
11 Mon 11/23 Part I: Electronic Commerce in the Real World(Marvin Sirbu)
Part II: Electronic Auctions in the Real World(Ramayya Krishnan)
HTML, Postscript


Back to CS 15827: Security & Cryptography

Heather L. Marko
Last modified: September 1998