Website for Applied Cryptography Course at American University of Beirut: Serves as a unified source of truth. Bookmark it during the course and visit regularly. It has various sections like course description, dates & times, prerequisites, textbooks, interactive learning tools, syllabi, and more.
- Course Description: Explores modern cryptography theory and application. Covers foundational concepts to real-world deployments like TLS and post-quantum cryptography.
- Course Dates & Times: Term from August 25th to December 13th, 2025. Lectures on Tuesdays and Thursdays, 12:30 - 13:45 in Nicely Hall Room 320. Lab times and locations unknown. Key Exchange times to be determined. Instructor's email provided.
- Course Prerequisites: Intended for senior undergraduates. Graduate students welcome with relevant research. Optional prerequisites include CMPS 215. Review a revision chapter to assess background.
- Textbooks: Required textbooks include "The Joy of Cryptography" (free online updated edition) and "Serious Cryptography, 2nd Edition". Online readings provide supplementary material.
- Interactive Learning Tools: Includes various websites like ASecuritySite.com, hax Playground, Learn Me a Bitcoin, etc. for hands-on learning.
- Syllabus: A PDF copy available.
Course Structure:
- Part 1: Focuses on theoretical underpinnings through provable security. Covers topics like One-Time Pad, pseudorandomness, various attacks, and hash functions.
- Part 2: Shifts to practical applications. Examines secure messaging protocols, authenticated key exchange, zero-knowledge proofs, post-quantum cryptography, and more.
- Problem Sets: Assigned periodically. Reinforce lecture material with theoretical and practical exercises. Include topics like provable security, symmetric/asymmetric cryptography, secure channel protocols, etc. Each set has different focuses and bonus challenges.
- Lab Projects: Worked on weekly during lab sessions. Groups of 1 - 3 students pick at most two topics. Experiment with libraries, simulate attacks, and use relevant tools. Graded based on preparedness, engagement, and completion. Topics include password manager, secure messenger, protocol modeling with ProVerif, zero-knowledge battleship, post-quantum migration, and propose own projects.
- The Key Exchange: Optional weekly gathering for career training. Discusses research papers, develops presentation and writing skills, and explores career paths. Includes paper deep dives, student presentations, writing workshops, and career café. Special sessions like crypto conference simulation also held.
**粗体** _斜体_ [链接](http://example.com) `代码` - 列表 > 引用
。你还可以使用@
来通知其他用户。