diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md
index daf7d75..4d35c83 100644
--- a/website/docs/schedule/lectures.md
+++ b/website/docs/schedule/lectures.md
@@ -30,12 +30,12 @@ Data Privacy* (AFDP) by Cynthia Dwork and Aaron Roth, available
11/7 | Defensive measures
**Paper:** Madry, Makelov, Schmidt, Schmidt, Tsipras, and Valdu. [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf). | Maddy
|
**Cryptographic Techniques**
|
11/12 | Applied crypto: overview and basics | Justin
-11/14 | Verifiable computing
**Paper:** Braun, Feldman, Ren, et al. [*Verifying Computations with State*](https://eprint.iacr.org/2013/356.pdf).
**Due: Milestone 2**
| Kan
-11/19 | Verifiable differential privacy
**Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf). | Fayi
-11/21 | Homomorphic encryption
**Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf). | Yue
+11/19 | Verifiable differential privacy
**Paper:** Narayan, Feldman, Papadimitriou, and Haeberlen. [*Verifiable Differential Privacy*](https://www.cis.upenn.edu/~ahae/papers/verdp-eurosys2015.pdf).
**Due: Milestone 2**
| Fayi
+11/19 | Homomorphic encryption
**Paper:** Ducas and Micciancio. [*FHEW: Bootstrapping Homomorphic Encryption in Less than a Second*](https://eprint.iacr.org/2014/816.pdf). | Yue
| **Language-Based Security**
|
-11/26 | Language-based security: overview and basics | Justin
-11/28 | Languages for privacy
**Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam
+11/21 | Language-based security: overview and basics | Justin
+11/26 | Languages for privacy
**Paper:** Reed and Pierce. [*Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy*](https://www.cis.upenn.edu/~bcpierce/papers/dp.pdf). | Sam
+11/28 | **TBA** |
12/3 | Languages for authenticated datastructures
**Paper:** Miller, Hicks, Katz, and Shi. [*Authenticated Data Structures, Generically*](https://www.cs.umd.edu/~mwh/papers/gpads.pdf). | Zichuan
12/5 | Languages for oblivous computing
**Paper:** Zahur and Evans. [*Obliv-C: A Language for Extensible Data-Oblivious Computation*](https://eprint.iacr.org/2015/1153.pdf). | Zhiyi
12/10 | Languages for information flow
**Paper:** Griffin, Levy, Stefan, et al. [*Hails: Protecting Data Privacy in Untrusted Web Applications*](https://www.usenix.org/system/files/conference/osdi12/osdi12-final-35.pdf). | Arjun