Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

NPTEL

Foundations of Cryptography

NPTEL and Indian Institute of Science Bangalore via YouTube

Syllabus

noc20 cs02 lec01 Introduction.
noc20 cs02 lec02 Symmetric key Encryption.
noc20 cs02 lec03 Historical Ciphers and their Cryptanalysis.
noc20 cs02 lec04 Perfect Security.
noc20 cs02 lec05 Limitations of Perfect Security.
noc20 cs02 lec06 Introduction to Computational Security.
noc20 cs02 lec07 Semantic Security.
noc20 cs02 lec08 Pseudo random Generators PRGs.
noc20 cs02 lec09 Operations on Pseudorandom Generators.
noc20 cs02 lec10 Stream Ciphers.
noc20 cs02 lec11 Provably secure Instantiation of PRG.
noc20 cs02 lec12 Practical Instantiations of PRG.
noc20 cs02 lec13 CPA security.
noc20 cs02 lec14 Pseudo random Functions PRFs.
noc20 cs02 lec15 CPA secure Encryption from PRF.
noc20 cs02 lec16 Modes of Operations of Block Ciphers Part I.
noc20 cs02 lec17 Modes of Operations of Block Ciphers Part II.
noc20 cs02 lec18 Theoretical Constructions of Block Ciphers.
noc20 cs02 lec19 Practical Constructions of Block Ciphers Part I.
noc20 cs02 lec20 Practical Constructions of Block Ciphers Part II.
noc20 cs02 lec21 From Passive to Active Adversary.
noc20 cs02 lec22 Message Integrity and Authentication.
noc20 cs02 lec23 Message Authentication for Long Messages Part I.
noc20 cs02 lec24 Message Authentication for Long Messages Part II.
noc20 cs02 lec25 Information theoretic MACs Part I.
noc20 cs02 lec26 Information theoretic MACs Part II.
noc20 cs02 lec27 Cryptographic Hash Functions Part I.
noc20 cs02 lec28 Cryptographic Hash Functions Part II.
noc20 cs02 lec29 Message Authentication Using Hash Functions.
noc20 cs02 lec30 Generic Attacks on Hash Functions and Additional Applications of Hash Functions.
noc20 cs02 lec31 Random Oracle Model Part I.
noc20 cs02 lec32 Random Oracle Model Part II.
noc20 cs02 lec33 Authenticated Encryption.
noc20 cs02 lec34 Composing CPA secure Cipher with a Secure MAC Part I.
noc20 cs02 lec35 Composing CPA secure Cipher with a Secure MAC Part II.
noc20 cs02 lec36 Key Exchange Protocols Part I.
noc20 cs02 lec37 Key Exchange Protocols Part II.
noc20 cs02 lec38 Cyclic groups.
noc20 cs02 lec39 Cryptographic Hardness Assumptions in the Cyclic Groups.
noc20 cs02 lec40 Candidate Cyclic Groups for Cryptographic Purposes Part I.
noc20 cs02 lec41 Candidate Cyclic Groups for Cryptographic Purposes Part II.
noc20 cs02 lec42 Cryptographic Applications of the Discrete Log Assumption.
noc20 cs02 lec43 Public key Encryption.
noc20 cs02 lec44 El Gamal Public key Encryption Scheme.
noc20 cs02 lec45 RSA Assumption.
noc20 cs02 lec46 RSA Public key Cryptosystem.
noc20 cs02 lec47 Hybrid Public key Cryptosystem.
noc20 cs02 lec48 CCA Secure Public key Ciphers.
noc20 cs02 lec49 CCA Secure Public key Ciphers Based on Diffie Hellman Problems.
noc20 cs02 lec50 CCA Secure Public key Ciphers Based on RSA Assumption.
noc20 cs02 lec51 Digital Signatures.
noc20 cs02 lec52 RSA Signatures.
noc20 cs02 lec53 Identification Schemes.
noc20 cs02 lec54 Schnorr Signature Scheme and TLS or SSL.
noc20 cs02 lec55 Number Theory.
noc20 cs02 lec56 Secret Sharing.
noc20 cs02 lec57 Zero Knowledge Protocols Part I.
noc20 cs02 lec58 Zero Knowledge Protocols Part II.
noc20 cs02 lec59 Good Bye for Now.

Taught by

IISc Bangalore July 2018

Related Courses

Reviews

Start your review of Foundations of Cryptography

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free