The lecture notes are not yet typo free and will remain in a highly dynamic and unstable state until the next lecture. Hence, a strong suggestion is to wait until the next lecture to retrieve the final version. Moreover, students are invited and strongly encouraged to suggest modifications or corrections.
- Notes on Dynamic Programming. PDF
The course is divided into two parts:
- Security models in the computational setting.
- Security models in the symbolic setting.