Math 691 Spring 2001, MW 12-1:30 DRL 4C8
Topics in Mathematical Foundations of Computer Security
Office: Room 4E6 in David Rittenhouse Laboratory
Telephone: eight five nine eight three
( Math. Dept. Office: eight eight one seven eight )
Fax: three four zero six three
E-mail: lastname at math
Office Hours: By appointment
About This Course
This is an Advanced Topics course in Mathematical Foundations of
Computer Security. Prerequisites:
Math 690 Fall 2000
or
Math 690 Fall 1999
or permission of instructor.
Course grade will be based on student presentations and active student
participation in the course.
Topics
In the news ...
Selected Sources
- "Handbook of Applied Cryptography" by Menezes, van Oorschot, and Vanstone.
CRC Press, 1996. ISBN: 0-8493-8523-7.
- "Cryptography: Theory and Practice" by Stinson. CRC Press, 1996,
The Fourth Printing. ISBN: 0-8493-8521-0.
- O. Goldreich. "Modern Cryptography, Probabilistic Proofs and
Pseudo-randomness." Springer-Verlag, 1999. ISBN: 3-540-64766-X.
-
O. Goldreich. The Foundations of Cryptography.
- B. Schneier. "Applied Cryptography : Protocols, Algorithms, and Source
Code in C." John Wiley & Sons, 1995. ISBN: 0471117099.
-
Ron Rivest's Cryptography and Security Page at MIT.
-
The Cypherpunks Home Page at UC Berkeley.
-
Crypto FAQ site at RSA Security.
-
J. Clark and J. Jacob. A Survey of Authentication Protocol Literature.
Version 1.0, November, 1997.
- R. Kemmerer, C. Meadows, and J. Millen. Three Systems for Cryptographic
Protocol Analysis. Journal of Cryptology, Vol. 7, no. 2, 1994.
-
J.C. Mitchell, M. Mitchell, and U. Stern. Automated Analysis of Cryptographic
Protocols Using Murphi, IEEE Symp. Security and Privacy, Oakland, 1997, pages
141-153.
-
J.P. Anderson. Computer Security Technology Planning Study.
ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA (Oct. 1972)
[NTIS AD-758 206].
-
M. Bishop's History of Computer Security Web Site at UC Davis.