CSE 661: Seminar in Data Privacy (Spring 2018)

Instructor: Omkant Pandey
Time: Thursday, 4:00pm - 5:30pm
Location: NCS 256
Email: omkant [at] cs.stonybrook.edu

Lecture Schedule

The focus of this year's cryptography seminar will be lattices in cryptography.

No Date Topic Notes Presenter
1 2018-01-25 ------ Course Structure ------
2 2018-02-01 Mathematical Background Peikert's lecture 1 Anand Aiyer
3 2018-02-08 SVP, Gram-Schmidt, LLL Peikert's lecture 2 Xiao Liang
4 2018-02-15 LLL, Coppersmith Peikert's lecture 3 Xiao Liang
5 2018-02-22 Coppersmith, Cryptanalysis Peikert's lecture 4 Rohit Chatterjee
6 2018-03-01 Cryptanalysis of Knapsack Cryptography Peikert's lecture 5 Rohit Chatterjee
7 2018-03-08 Algorithms for SVP, CVP Peikert's lecture 6 Allen Kim
8 2018-03-15 ------ Spring Break ------
9 2018-03-22 General Discussion and Chap: 1--3 Peikert's Survey (Ch1-3) Anand Aiyer
10 2018-03-29 Chapter 4: Modern Foundations (I) Peikert's Survey (Ch4) Anand Aiyer
11 2018-04-05 Chapter 4: Modern Foundations (II) Peikert's Survey (Ch4) Allen Kim
12 2018-04-12 Chapter 5: Essential Cryptographic Constructions (I) Peikert's Survey (Ch5) Xiao Liang
13 2018-04-19 Chapter 5: Essential Cryptographic Constructions (II) Peikert's Survey (Ch5) Xiao Liang
14 2018-04-26 Chapter 6: Advanced Constructions (I) Peikert's Survey (Ch6) Rohit Chatterjee
15 2018-05-03 Chapter 6: Advanced Constructions (II) Peikert's Survey (Ch6) Rohit Chatterjee

Useful Material

Peikert's Course Page
Peikert's Survey on Lattice Cryptography
Lattice Based Crypto for Beginners
Vaikuntanathan's Course
Micciancio's Lattice Crypto Page

Miscellaneous

Note: If you have a physical, psychological, medical or learning disability that may impact on your ability to carry out assigned course work, please contact the staff in the Disabled Student Services office (DSS), Room 133, Humanities, 632-6748v/TDD. DSS will review your concerns and determine with you what accommodations are necessary and appropriate. All information and documentation of disability are confidential.

Note: Each student must pursue his or her academic goals honestly and be personally accountable for all submitted work. Representing another person's work as your own is always wrong. Any suspected instance of academic dishonesty will be reported to the Academic Judiciary. For more comprehensive information on academic integrity, including categories of academic dishonesty, please refer to the Academic Honest Section at Graduate Bulletin.