Week 01                       |
2019.02.25/2019.02.26                     |
Lecture 01: Course Introduction Lecture 02: Cryptography                 |
 | #The Security Mindset by Bruce Schneier  | #The Internet: Cybersecurity & Crime by Parisa Tabriz and Jenny Martin  | #The Internet: Encryption & Public Keys by Mia Epner  | #Data Encryption Standard (DES)  | #The Wonderful World of Elliptic Curve Cryptography by Bill Buchanan OBE  | #Elliptic Curve Integrated Encryption Scheme (ECIES) by Bill Buchanan OBE  | #Elliptic Curve Cryptography Overview by John Wagnon  | #A Survey on Homomorphic Encryption Schemes: Theory and Implementation by A. Acar et al.  | #Proxy Re-encryption by David Vassallo  | #Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage by G. Ateniese et al.  | Due: Project Grouping |
Week 02     |
2019.03.04/2019.03.05     |
Lecture 03: Cryptanalysis   |
 | #Cryptanalysis by Sourav Mukhopadhyay  | Due: Proposal Presentation |
Week 03           |
2019.03.11/2019.03.12           |
Lecture 04: Blockchain         |
 | #The Rise and Rise of Bitcoin  | #How the Bitcoin Protocol Actually Works by Michael Nielsen  | #Bitcoin: A Peer-to-Peer Electronic Cash System by Satoshi Nakamoto  | #51% Attack Explained by Bisade Asolo  | #Bitcoin and Cryptocurrency Technologies Online Course |
Week 04       |
2019.03.18/2019.03.19       |
Lecture 05: Secure Connection     |
 | #SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements by J. Clark and P. Oorschot  | #SSL and HTTPS by Nickolai Zeldovich  | #Everything About HTTPS and SSL (Java) by Akhil Raj |
Week 05         |
2019.03.25/2019.03.26         |
Lecture 06: Secure Routing and Forwarding       |
 | #The Internet: Packets, Routing & Reliability by Lynn Root and Vint Cerf  | #BGP Hijack Explained by Jorge Ribas  | #Why Is It Taking So Long to Secure Internet Routing? by Sharon Goldberg  | #FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking |
Week 06     |
2019.04.01/2019.04.02     |
Lecture 07: Anonymous Communication   |
 | #Anonymous Communication by Nick Mathewson  | #Tor: The Second-Generation Onion Router (2012 DRAFT) by Dingledine et al. |
Week 07           |
2019.04.08/2019.04.09           |
Lecture 08: Wi-Fi Security         |
 | #WiFi Security by Nick Kartsioukas  | #How does WPA and WPA2 Work?  | #Top Ten Wi-Fi Security Threats by Lisa Phifer  | #Wireless Attacks Unleashed by Chintan Gurjar  | Assignment Due April 15 |
Week 08             |
2019.04.15/2019.04.16             |
Lecture 09: Zero-Knowledge Proof Lecture 10: Course Review         |
 | Due: Wrapup Presentation  | Due: Demo  | Report Due: April 23  | #The 3 Secrets of Highly Successful Graduates by Reid Hoffman  | #Wish You Well  | #See You |