Course Info
Policies
Schedule
Homework
Labs
Exams
Lectures
TA Office hours
Gallery

 

Lecture slides

Padding in symmetric encryption

Hashing Functions Practical Implications (Bill Burr, NIST)

Lecture notes for Public Key Cryptography

Certificates and PKI

Kerberos

Malware Lecture Resources

Buffer Overflow Lecture Resources

Integer Manipulation Vulnerabilities