(Winter 2018) CS 485/585 - Intro to Cryptography

Resources

Books

Text

Applied crypto

These tend to be less careful and precise about definitions and proofs, but they are excellent references for more examples of concrete cryptosystems used in practice. After this course, you should understand how to critically evaluate the merits or deficiencies of the cryptosystems described below (and any new cryptographic constructions you encounter).

Math, algorithms, and complexity

Crypto courses offered at other institutes