From 62a8cb85e1df193dc15ab3731c3ec4867e26700a Mon Sep 17 00:00:00 2001 From: Justin Hsu Date: Mon, 17 Aug 2020 17:57:09 -0500 Subject: [PATCH] Update link to Boneh and Shoup. --- website/docs/resources/readings.md | 2 +- website/docs/schedule/lectures.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/website/docs/resources/readings.md b/website/docs/resources/readings.md index fae19af..3d934bb 100644 --- a/website/docs/resources/readings.md +++ b/website/docs/resources/readings.md @@ -277,7 +277,7 @@ - VĂ©ronique Cortier, Steve Kremer, and Bogdan Warinschi. [*A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems*](https://hal.inria.fr/inria-00379776/document). - Dan Boneh and Victor Shoup. - [*A Graduate Course in Applied Cryptography*](https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf). + [*A Graduate Course in Applied Cryptography*](http://toc.cryptobook.us/). - David Hand. [*Statistics and the Theory of Measurement*](http://www.lps.uci.edu/~johnsonk/CLASSES/MeasurementTheory/Hand1996.StatisticsAndTheTheoryOfMeasurement.pdf). - Judea Pearl. diff --git a/website/docs/schedule/lectures.md b/website/docs/schedule/lectures.md index ce5cee8..1bd9e53 100644 --- a/website/docs/schedule/lectures.md +++ b/website/docs/schedule/lectures.md @@ -18,7 +18,7 @@ 9/28 | Certified defenses
**Reading:** [*Certified Defenses for Data Poisoning Attacks*](https://arxiv.org/pdf/1706.03691.pdf)
**Reading:** [*Certified Defenses against Adversarial Examples*](https://arxiv.org/pdf/1801.09344) | --- | --- | 9/30 | Adversarial training
**Reading:** [*Towards Deep Learning Models Resistant to Adversarial Attacks*](https://arxiv.org/pdf/1706.06083.pdf)
**See also:** [*Ensemble Adversarial Training: Attacks and Defenses*](https://arxiv.org/pdf/1705.07204) | --- | --- | |

**Applied Cryptography**

| | | -10/2 | Overview and basic constructions
**Reading:** [Boneh and Shoup](https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_4.pdf), 11.6, 19.4
**See also:** [Evans, Kolesnikov, and Rosulek](https://securecomputation.org/), Chapter 3 | Justin | --- | +10/2 | Overview and basic constructions
**Reading:** [Boneh and Shoup](http://toc.cryptobook.us/), 11.6, 19.4
**See also:** [Evans, Kolesnikov, and Rosulek](https://securecomputation.org/), Chapter 3 | Justin | --- | 10/5 | Secure data collection at scale
**Reading:** [*Prio: Private, Robust, and Scalable Computation of Aggregate Statistics*](https://people.csail.mit.edu/henrycg/files/academic/papers/nsdi17prio.pdf) | --- | --- | 10/7 | Verifiable computing
**Reading:** [*SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud*](https://arxiv.org/pdf/1706.10268) | --- | --- | 10/9 | Side channels and implementation issues
**Reading:** [*On Significance of the Least Significant Bits For Differential Privacy*](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.366.5957&rep=rep1&type=pdf) | --- | --- |