ECRYPT II Logo and Red Temática Matemáticas
en la Sociedad de la Información
and i-math Logo

Summer School On Provable Security


September 7th - 11th 2009


A. Dent

Introduction to Provable Security

P. Rogaway

Symmetric Techniques


Public Key Encryption-1
Public Key Encryption-2

T. Shrimpton

Hash Functions

G. Neven

Digital Signatures-1
Digital Signatures-2

V. Lyubashevsky

Cryptography and Lattices

X. Boyen

Pairing Based Systems

B. Blanchet

Automating Security Proofs

B. Warinschi

Symbolic Methods-1
Symbolic Methods-2

K. Paterson

The Real World