These are the courses about cryptography, security, or privacy given by CrySP faculty members. Note that the offering dates and instructors listed are subject to change.

Courses in the School of Computer Science

CS 458/658 Computer Security and Privacy

This course provides an introduction to security and privacy issues in various aspects of computing, including programs, operating systems, networks, databases, and Internet applications. It examines causes of security and privacy breaches, and gives methods to help prevent them. CS 458 is intended for 3rd or 4th year undergraduates; CS 658 is intended for graduate students. Course home page

CS 634 Security and Privacy for Health Systems

An overview of basic security and privacy principles relevant in the design and use of applications in health settings. Program security, operating system security, network security, data security, and issues related to the management of security and privacy policies are introduced. Master of Health Informatics students only. Course home page

CS 758 Cryptography / Network Security

This course covers cryptographic protocols and their application to secure communication, especially in a network setting. Course home page

CS 858 Hot Topics in Privacy Enhancing Technologies

This is a seminar course that examines current research into technologies that help users maintain their privacy, both online and in the real world. Topics covered will include anonymity and pseudonymity systems, censorship resistance, private credentials, and electronic cash. Course home page

CS 858 Unconditionally Secure Cryptography

The security of many cryptographic protocols depends on the (presumed) difficulty of solving computational problems such as factoring and discrete logarithm. However, it is also possible to design cryptographic protocols that can be proven secure without recourse to any computational assumptions. These protocols are termed "unconditionally secure". Basically, unconditional security can be achieved through the use of shared secret information (the one-time pad is the most famous example) or through distributed information (e.g., secret-sharing schemes). In this seminar course, we will examine recent research trends in several areas of unconditionally secure cryptography by reading and analyzing recent research papers. Course home page

CS 858 Mobile Privacy and Security (MoPS)

Many people now carry a smartphone with them all the time. A smartphone has many sensors, which it can use to sense potentially sensitive information about its owner, such as voice or location data. In addition, users can install their own applications on their smartphone. Some of these applications may access sensitive information and forward it to third parties without the owner of the smartphone noticing, which violates user privacy. Some applications may be malicious, leading to security problems. The goal of the MoPS course is to make students aware of the security and privacy challenges raised by smartphones and of possible defenses against these challenges. Course home page

CS 858 CS 858: (Very Hot) Topics in Computing on Encrypted Data

A course about encryption-in-use. In this course we study techniques, cryptographic algorithms, and methods that enable encryption-in-use and allow applications to run over encrypted data. Topics include multi-party computation protocols, homomorphic, functional, searchable and attribute-based encryption schemes, as well as secure hardware technologies. We study mathematics behind these algorithms, crypto, performance impacts and integration challenges. Course home page

Courses in the Department of Combinatorics and Optimization

C&O 485/685 The Mathematics of Public-Key Cryptography

An in-depth study of public-key cryptography and number-theoretic problems related to the efficient and secure use of public-key cryptographic schemes. Topic covered may include algorithmic number theory, public-key encryption, signature schemes, key establishment, pairing-based cryptography, and provable security. Course home page

C&O 487 Applied Cryptography

This course is a comprehensive introduction to modern cryptography that is aimed primarily at those interested in applications. The topics discussed will include an introduction to classical cryptography: encryption algorithms, hash functions, and message authentication codes. In the area of public-key cryptography, topics will include an overview of specific systems (Diffie-Hellman, RSA, DSA, etc.) and a few advanced protocols. The security of these schemes and the use of public-key techniques for generating digital signatures will be described. An emphasis will be placed on tools that are currently being used to secure the Internet and enable secure electronic commerce. Course home page


Cryptography, Security, and Privacy Research Group
David R. Cheriton School of Computer Science
University of Waterloo
Waterloo, Ontario, Canada N2L 3G1
Tel: 519-888-4567 x36163
Fax: 519-885-1208

Contact | Feedback: | Cryptography, Security, and Privacy (CrySP)

Valid HTML 4.01!Valid CSS! Last modified: Wednesday, 15-Feb-2017 18:46:40 EST