| 1 | Public-key Encryption | Problem set 1 out | 
| 2 | Public-key Encryption (cont.) |  | 
| 3 | Public-key Encryption (cont.) |  | 
| 4 | Public-key Encryption (cont.) | Problem set 1 due | 
| 5 | Public-key Encryption (cont.) | Problem set 2 out | 
| 6 | Digital Signatures |  | 
| 7 | Digital Signatures (cont.) | Problem set 2 due | 
| 8 | Digital Signatures (cont.) | Problem set 3 out | 
| 9 | Digital Signatures (cont.) |  | 
| 10 | Digital Signatures (cont.) | Problem set 3 due | 
| 11 | Pseudo-random Number Generation | Problem set 4 out | 
| 12 | Pseudo-random Number Generation (cont.) |  | 
| 13 | Pseudo-random Number Generation (cont.) |  | 
| 14 | Pseudo-random Number Generation (cont.) |  | 
| 15 | Pseudo-random Number Generation (cont.) |  | 
| 16 | Basic Protocols | Problem set 4 due | 
| 17 | Basic Protocols (cont.) | Problem set 5 out | 
| 18 | Basic Protocols (cont.) |  | 
| 19 | Basic Protocols (cont.) |  | 
| 20 | Basic Protocols (cont.) |  | 
| 21 | Computational Complexity Requirements | Problem set 5 due | 
| 22 | Computational Complexity Requirements (cont.) | Problem set 6 out | 
| 23 | Computational Complexity Requirements (cont.) |  | 
| 24 | Computational Complexity Requirements (cont.) |  | 
| 25 | Computational Complexity Requirements (cont.) | Problem set 6 due | 
| 26 | Computational Complexity Requirements (cont.) |  |