Algorithm and Discrete Optimization: 2014-2015

The lecture notes are not yet typo free and will remain in a highly dynamic and unstable state until the next lecture. Hence, a strong suggestion is to wait until the next lecture to retrieve the final version. Moreover, students are invited and strongly encouraged to suggest modifications or corrections.

  • Notes on Dynamic Programming. PDF

Course website: AOD
Security Models: 2014-2015

The course is divided into two parts:

  • Security models in the computational setting.
  • Security models in the symbolic setting.
Exercise sheets for security models in the computational setting:
  1. Probability and Negligible Functions, SET00
  2. Reductions and Security Notions (IND-XXX), SET01
  3. Security analysis of mutual authentication protocols, SET02
  4. Mock exam, SET03 and Solutions

Office: D210 // Email: (λ x. λ y. x.y @ m4x.org) amrit kumar [see λ calculus]
Postal: INRIA Grenoble// 655 Avenue de l'Europe // 38330 Montbonnot-Saint-Martin, France