Lectures | Topics | Update Time |
S-1 | How to Understand Breaking Assumption | 2022.1.24 |
Lecture 12 | Flaws in Papers | 2020.9.21 |
Lecture 11 | Revision of Security Reduction | 2020.9.21 |
Lecture 10 | Security Proofs for Encryption (Computational) | 2020.9.21 |
Lecture 9 | Security Proofs for Encryption (Decisional) | 2020.9.21 |
Lecture 8 | Security Proofs for Digital Signatures | 2021.3.18 |
Lecture 7 | Analysis (Towards A Correct Reduction) | 2020.9.21 |
Lecture 6 | Simulation and Solution | 2020.9.21 |
Lecture 5 | Difficulties in Security Reduction | 2020.9.21 |
Lecture 4 | Entry to Security Reduction | 2020.9.30 |
Lecture 3 | Preliminaries (Hard Problem and Secure Scheme) | 2020.9.21 |
Lecture 2 | Preliminaries (Field, Group, Pairing, and Hash Function) | 2020.9.21 |
Lecture 1 | Definitions (Algorithm and Security Model) | 2020.9.21 |
Lecture 0 | Subject Introduction | 2020.9.21 |
Fuchun Guo
School of Computing and Information Technology
Faculty of Engineering and Information Sciences
University of Wollongong NSW 2522
Office: 3.202
Phone: +61 2 4221 4402