| Date | Topics\slides | Outline | Readings | Lecture notes | 
|---|---|---|---|---|
| Week 1: Jan 10 | Course Overview [slides] | course plan, reading materials, grading, a brief introduction to every topic | 
	[Sta] William Stallings, Cryptography and Network Security: Principles and Practice [Du] Wenliang Du, Computer Security: A Hands-on Approach [KPS] Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World [KL] Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography  | 
    |
| Week 2: Jan 17 | Basic Cryptography 1: Symmetric-key cryptography [slides] | symmetric encryption, one-time pad, blockcipher, hash function, MAC, authenticated encryption. | 
	[KL] Section 2-7  [Std] Chapter 3, 5, 6, 7, 11, 12 Goldreich, Foundation of Cryptography II, Section 5.3.1, 5.3.2, 5.3.3, 5.4.3.  | 
    
		Lecture 2 by Haiyang Xue Source code  | 
  
| Week 3: Jan 31 | Basic Cryptography 2: Public-key cryptography [slides] | Diffie-Hellman, public key encryption, RSA, Digital signature | [KL] Section 8, 10,11, 12.1-12.5 | 
	Lecture 3 by Huijiong Yang, Tianyu Zheng, Zhikang Xie | 
  
| Week 4: Feb 7 | Network Security Principles [slides] | authenticated key exchange, PKI, and certification authorities | [KL] Section 12.7 Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 22 [Du] Section 24  | 
    Lecture 4 by Jialong Zhou and Zhiyuan Sun | 
| Week 5: Feb 14 | Network Security in Practice [slides] | secure sockets layer (SSL), transport layer security (TLS), HTTPS | [Sta] Section 16 [KPS] Section 13 RFC 2246, 5246, 8446  | 
    Lecture 5 by Zizhao Peng, Jerry Tong and Fangxiao Wang | 
| Week 6: Feb 21 | Authentication [slides][outline] | access control, password authentication, biometric authentication, public key authentication | Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 18 Authentication Cheat Sheet An Administrator’s Guide to Internet Password Research Biometrics: A Tool for Information Security SSH.com RFC 4251, 4252 [KPS] Section 13.8  | 
    Lecture 6 by Sai Ho Cheung, Weimin Chen, and Junjie Ma | 
| Week 7: Feb 28 | Privacy-Enhancing Technologies 1  [slides][outline]  | 
    post-quantum cryptography and fully-homomorphic encryption | 
	Post-quantum Cryptography by NIST Cryptographic Standards in the Post-Quantum Era Awesome Homomorphic Encryption in Github Homomorphic Encryption Standardization  | 
    Lecture 7 by Yerkezhan Sartayeva and Haiyang Xue | 
| Week 8: Mar 7 | Privacy-Enhancing Technologies 2  [slides]  | 
    zero-knowledge proofs | Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 19, 20 Berry Schoenmakers, Lecture Notes Cryptographic Protocols, Section 4, 5 awesome-zero-knowledge-proofs  | 
    
      Lecture 8 by Rui Song and Yuhuan Liu | 
  
| Week 9: Mar 14 | Privacy-Enhancing Technologies 3  [slides]  | 
    secure multiparty computation | 
	David Evans, Vladimir Kolesnikov and Mike Rosulek, A Pragmatic Introduction to
Secure Multi-Party Computation, Section 1, 2, 3 Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography, Section 23 Lindell, Resources for Getting Started with MPC  | 
    Lecture 9 by Donghui Dai, Huaien Zhang | 
| Week 10: Mar 21 | Security and Privacy in Practice | security and privacy in Blockchain | 
	Blockchain whitepaper blockchain.com  | 
    |
| Week 11: Mar 28 | Recap | |||
| Week 12: Apr 4 | Final presentation 1 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT | ||
| Week 13: Apr 11 | Final presentation 2 | papers from S&P, CCS, USENIX, NDSS, CRYPTO, or EUROCRYPT |