The course studies the question of how to build cryptographic systems resilient to dramatic leakage of sensitive information, such as secret keys. In practice, attacks of this sort are, in many cases, more likely than attacks which directly "crack" the cryptographic assumptions on which the security of the scheme is based. And while at first glance it might appear that not much can be done to prevent or mitigate the damage caused by key exposure, the study of exposure-resilient cryptography has led to a variety of diverse and effective approaches for combating key exposure.

Tentative topics include:

The course will be accessible to master and PhD students with minimal cryptographic background.

Last modified: February 2, 2007