Copyright by ACM 2007. Formally define security properties and reason about them mathematically. since for a given y there may be many x's such that y=f(x), adversary is successful Additional reading: It is used everywhere and by billions of people worldwide on a daily basis. Computational complexity is covered in many places Introduction to Cryptography. Cryptography or "secret writing" has been around for about 4000 years, but was revolutionized in the last few decades. No mandatory textbook. can be found in this interview of Martin Hellman. Office hours: Wednesday 3:30 until there are no more questions on Zoom, TA: Goldwasser-Micali-Rivest factoring based hash function is obtained through the intermediate notion of Bellare's course discusses the issues in defining security for encryption schemes and perfect security. data mining.