Required textbook for both Csc 507 and 609 students:
Introduction to Modern Cryptography,
(Chapman & Hall/CRC Cryptography and Network Security Series) 2nd Edition, by Jonathan Katz and Yehuda Lindell.
((Amazon))
Twitter (for updates on homework postings): csc609
M. Bellare, P. Rogaway. Optimal Asymmetric Encryption -- How to encrypt with RSA. Extended abstract in Advances in Cryptology - Eurocrypt '94 Proceedings, Lecture Notes in Computer Science Vol. 950, A. De Santis ed, Springer-Verlag, 1995. (full version (pdf))
Digital Signatures
Definition, and adversary
Plain RSA signatures and forgeries
RSA-FDH (Full Domain Hash) and reduction to the RSA problem
Identification schemes, perfect correctness and probabilistic soundness
Schnorr identification, and knowledge extraction
Fiat-Shamir transformation and Schnorr dig-sig's
Lamport one-time signature based on hash functions.
Michael Ben-Or, Shafi Goldwasser, Avi Wigderson, Completeness
theorems for non-cryptographic fault-tolerant distributed computation,
Proc. 20-th ACM Symposium on Theory of Computing, 1988. pp 1-10.
Philippe Oechslin, Making a faster cryptanalytic time-memory trade-off,
Crypto 03. (cached)