Topics in Cryptography  - Spring 2009

Instructors: Shafi Goldwasser and Moni Naor

Grader: Gil Segev

When: Tuesdays -- Note: first meeting March 24th
Where: Ziskind 1
First meeting:  March 24th


DESCRIPTION:  

In recent years, we are witnessing a surge of new cryptographic ideas applied to old cryptographic problems such as security against chosen cipher text attack, protection against side channel attacks, and software protection. In addition we see the emergence of new areas of investigation such as game theory and cryptography. In this course we aim to cover these recent developments. Topics covered will include:

PREREQUISITES: Students are expected to be familiar with algorithms, complexity theory, probability theory, and linear algebra, at an undergraduate level and to have taken a previous course in cryptography.

REQUIREMENTS: Students are expected to read papers, prepare homework.


Handouts and Homework

Bibliography

  • Combatting Side Channels and key leakage:
     Attacks:Dan Boneh and David Brumley, Remote timing attacks are practical, USENIX 2003. slides
  • Paul Kocher, Joshua Jaffe and Benjamin Jun, Differential Power Analysis, Crypto 1999.
  • Dan Boneh, Richard DeMillo, and Richard Lipton, On the importance of checking cryptographic protocols for faults. Journal of Cryptology, 2001, pp. 101-119, 2001.
  • Dag Arne Osvik, Adi Shamir, Eran Tromer, Cache attacks and countermeasures: the case of AES, Proc. CT-RSA 2006. slides
  • J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, and Edward W. Felten, Lest We Remember: Cold Boot Attacks on Encryption Keys, Usenix Security 2008.
  • website

    Protection:

  • Lattice Based Cryptography
  • Homomorphic Encryption
  • Game Theory and Cryptography: