## Nice to know

For more resources please refer to

__Science for all__.## Events

A list of nice periodically events.

For more information, click here.

For more information, click here.

## Books

A list of popular science books.

For more information, click here.

For more information, click here.

## Movies

A list of movies (that at least claim to be) about science.

For more information, click here.

For more information, click here.

## Websites

A list of interesting websites.

For more information, click here.

For more information, click here.

## Lectures

- About the course [lecture 0]
- Introduction. Motivation. Principles [lecture 1]
- History [lecture 2]
- Principles of modern cryptography [lecture 3]
- Perfect secrecy. One time pad [lecture 4]
- Computational cryptography [lecture 5]
- Stream ciphers [lecture 6] - Examples: RC4 [lecture 6.1] , WEP [lecture 6.2]
- Semantic security [lecture 7]
- Block ciphers [lecture 8]
- PRP constructions [lecture 9] - Examples: DES [lecture 9.1], AES [lecture 9.2]
- CPA-security and CCA-Security [lecture 10]
- MACs [lecture 11]
- More on MACs: CCA-secure encryption [lecture 12], Message confidentiality and authenticity [lecture 13]
- Hash [lecture 14] - Examples: Password Storage [lecture 14.1], MD5 [lecture 14.2], SHA-2 [lecture 14.3]
- HMAC [lecture 15] - Examples: Timing Attack [lecture 15.1]
- Public-key cryptography [lecture 16]
- Cryptographic assumptions [lecture 17]
- Security notions for public-key cryptography [lecture 18]
- Hybrid encryption [lecture 19]
- Trapdoor permutations [lecture 20] - Constructions: RSA [lecture 20.1], PKCS [lecture 20.2]
- DLP [lecture 21] - Constructions: Diffie-Hellman key exchange [lecture 21.1], ElGamal [lecture 21.2]
- DLP on EC [lecture 22] - Constructions: Diffie-Hellman key exchange on EC [lecture 22.1], ElGamal on EC [lecture 22.2]
- More on cryptography [final lecture] - Digital Signatures [final lecture.1]