Week 01                       |
2020.02.24/2020.02.25                     |
Lecture 01: Course Introduction Lecture 02: Cryptography                 |
 | #The Security Mindset by Bruce Schneier  | #The Internet: Cybersecurity & Crime by Parisa Tabriz and Jenny Martin  | #The Internet: Encryption & Public Keys by Mia Epner  | #Data Encryption Standard (DES)  | #The Wonderful World of Elliptic Curve Cryptography by Bill Buchanan OBE  | #Elliptic Curve Integrated Encryption Scheme (ECIES) by Bill Buchanan OBE  | #Elliptic Curve Cryptography Overview by John Wagnon  | #A Survey on Homomorphic Encryption Schemes: Theory and Implementation by A. Acar et al.  | #Proxy Re-encryption by David Vassallo  | #Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage by G. Ateniese et al.  | Due: Project Grouping |
Week 02     |
2020.03.02/2020.03.03     |
Lecture 03: Cryptanalysis   |
 | #Cryptanalysis by Sourav Mukhopadhyay  | Due: Proposal Presentation |
Week 03           |
2020.03.09/2020.03.10           |
Lecture 04: Blockchain         |
 | #The Rise and Rise of Bitcoin  | #How the Bitcoin Protocol Actually Works by Michael Nielsen  | #Bitcoin: A Peer-to-Peer Electronic Cash System by Satoshi Nakamoto  | #51% Attack Explained by Bisade Asolo  | #Bitcoin and Cryptocurrency Technologies Online Course |
Week 04       |
2020.03.16/2020.03.17       |
Lecture 05: Secure Connection     |
 | #SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements by J. Clark and P. Oorschot  | #SSL and HTTPS by Nickolai Zeldovich  | #Everything About HTTPS and SSL (Java) by Akhil Raj |
Week 05           |
2020.03.23/2020.03.24           |
Lecture 06: Secure Routing and Forwarding         |
 | #The Internet: Packets, Routing & Reliability by Lynn Root and Vint Cerf  | #BGP Hijack Explained by Jorge Ribas  | #Why Is It Taking So Long to Secure Internet Routing? by Sharon Goldberg  | #FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking  | Due: Mid-term Presentation |
Week 06     |
2020.03.30/2020.03.31     |
Lecture 07: Anonymous Communication   |
 | #Anonymous Communication by Nick Mathewson  | #Tor: The Second-Generation Onion Router (2012 DRAFT) by Dingledine et al. |
Week 07           |
2020.04.06/2020.04.07           |
Lecture 08: Wi-Fi Security         |
 | #WiFi Security by Nick Kartsioukas  | #How does WPA and WPA2 Work?  | #Top Ten Wi-Fi Security Threats by Lisa Phifer  | #Wireless Attacks Unleashed by Chintan Gurjar  | Assignment Due April 15 |
Week 08             |
2020.04.13/2020.04.14             |
Lecture 09: Zero-Knowledge Proof Lecture 10: Course Review         |
 | Due: Wrapup Presentation  | Due: Demo  | Report Due: April 23  | #The 3 Secrets of Highly Successful Graduates by Reid Hoffman  | #Wish You Well  | #See You |