| 1 | Public-key Encryption | Problem set 1 out |
| 2 | Public-key Encryption (cont.) | |
| 3 | Public-key Encryption (cont.) | |
| 4 | Public-key Encryption (cont.) | Problem set 1 due |
| 5 | Public-key Encryption (cont.) | Problem set 2 out |
| 6 | Digital Signatures | |
| 7 | Digital Signatures (cont.) | Problem set 2 due |
| 8 | Digital Signatures (cont.) | Problem set 3 out |
| 9 | Digital Signatures (cont.) | |
| 10 | Digital Signatures (cont.) | Problem set 3 due |
| 11 | Pseudo-random Number Generation | Problem set 4 out |
| 12 | Pseudo-random Number Generation (cont.) | |
| 13 | Pseudo-random Number Generation (cont.) | |
| 14 | Pseudo-random Number Generation (cont.) | |
| 15 | Pseudo-random Number Generation (cont.) | |
| 16 | Basic Protocols | Problem set 4 due |
| 17 | Basic Protocols (cont.) | Problem set 5 out |
| 18 | Basic Protocols (cont.) | |
| 19 | Basic Protocols (cont.) | |
| 20 | Basic Protocols (cont.) | |
| 21 | Computational Complexity Requirements | Problem set 5 due |
| 22 | Computational Complexity Requirements (cont.) | Problem set 6 out |
| 23 | Computational Complexity Requirements (cont.) | |
| 24 | Computational Complexity Requirements (cont.) | |
| 25 | Computational Complexity Requirements (cont.) | Problem set 6 due |
| 26 | Computational Complexity Requirements (cont.) | |