Topic outline

    • File icon
      01-02-Lecture-Notes File
      Not available unless: You are a(n) Student

      In these lecture notes, we explain the main reduction methodology used in the course. The lecture notes are currently still missing 1 definition.

      January 9, 2019, 00:12: Update, fixed several typos, also in the figures.

      January 10, 2019, 13:08: Update, added motivation/explanation for secure channel definition

      January 14, 2019, 04:34: Update of administrative information

      February 04, 2019, 16:45: Added decomposed $-AE notion and details on last proof

    • File icon
      02-Lecture File
      Not available unless: You are a(n) Student

      This is a first draft of the lecture notes on key exchange. The pseudo-code is still missing, but most of the conceptual discussion is already available.

      Jan 14, 4:04: Substantial update

      Jan 16, 16:47: Included all the oracles in the txt-file

    • File icon
      03-Lecture File
      Not available unless: You are a(n) Student
    • File icon
      02-Lecture File
      Not available unless: You are a(n) Student

      These are the lecture notes of the second lecture, with minor corrections.

    • File icon
      03-key-schedule.xml File
      Not available unless: You are a(n) Student
    • File icon
      03-lecture.tex File
      Not available unless: You are a(n) Student
    • File icon
      04-lecture-code File
      Not available unless: You are a(n) Student
    • File icon
      04-lecture File
      Not available unless: You are a(n) Student

      Updated Jan 28: add slightly improved code in pdf

      Updated Jan 31: edited footnote 1 on the random oracle methodology to present a more balanced view on the topic

    • File icon
      05-Lecture-1-TLS File
      Not available unless: You are a(n) Student

      This is a high-level description of the TLS 1.3 protocol.

    • File icon
      05-Lecture-2-TLS File
      Not available unless: You are a(n) Student

      This is a high-level description of the TLS 1.3 protocol with some additional details. We will not include the red text in the modelling. It is only included for discussion.

    • File icon
      05-Lecture-3-TLS File
      Not available unless: You are a(n) Student
      This is a description of the TLS 1.3 protocol with some additional details. We will not include the red text in the modelling. It is only included for discussion.
    • File icon
      05-Lecture-4-TLS File
      Not available unless: You are a(n) Student

      This is a high-level description of the TLS 1.3 protocol with more details.

    • File icon
      05-Lecture-5-TLS File
      Not available unless: You are a(n) Student
      TLS 1.3 key schedule (without modelling)
    • File icon
      05-Lecture-Notes File
      Not available unless: You are a(n) Student
      These lecture notes contain additional information on the protocols that you analyze.
    • File icon
      04 lecture - xml for figure 8 File
      Not available unless: You are a(n) Student
    • File icon
      06-Lecture File
      Not available unless: You are a(n) Student

      This is a sketch of the current TLS 1.3 key schedule analysis.

    • File icon
      07-lecture File
      Not available unless: You are a(n) Student

      Feb 25: Draft

      Mar 4: First version

    • File icon
      08-Lecture File
      Not available unless: You are a(n) Student

      These are the handwritten lecture notes by Ameet Gadekar :-) Thanks, Ameet!

    • File icon
      09-Impagliazzo File
      Not available unless: You are a(n) Student

      This is a relevant paper by Impagliazzo that was (implicitly) used in the lecture today and might be interesting to read.

    • File icon
      09-Lecture File
      Not available unless: You are a(n) Student

      March 11: This is a first draft of the lecture notes, only the definitional part so far and the high-level lecture overview, more to come.

      March 16: Update on content and references to non-black-box techniques. The oracle separation proof is still missing. You can read Impagliazzo's paper in the meanwhile.

    • File icon
      Model Solution to Assignment 06 File
      Not available unless: You are a(n) Student
    • File icon
      10-Lecture File
      Not available unless: You are a(n) Student

      Learning theory and zero-knowledge proofs

      March 23: Corrected the phrasing of soundness, included cheating prover algorithm and changed "greater or equal to" into "smaller or equal to".

    • File icon
      07-Model solutions File
      Not available unless: You are a(n) Student
    • File icon
      11-Lecture File
      Not available unless: You are a(n) Student

      In this lecture, we further explore relations between SZK hardness and PAC-learning.

      Update March 31, 2019: Included reference to Ostrovsky-Wigderson.

    • File icon
      12-Lecture File
      Not available unless: You are a(n) Student
      PDF version. You can consult the PPT file for animations. You can consult Exercise Sheet 10 for definitions.
    • File icon
      12-Lecture-PPT File
      Not available unless: You are a(n) Student
      PPT version. You can consult the PDF file for non-animated variant. You can consult Exercise Sheet 10 for definitions.