A nice series of introductory talks that cover a handful of important MPC protocols. The later videos give an overview of some at-the-time recent papers in the space (from 2015).
I spent a lot of my first year in grad school trying to pick up the basics in different areas of cryptography. These are the introductory materials in each topic that helped me the most.
This book gives a high-level introduction to various common MPC protocols and techniques. It’s very digestible and covers a lot more protocols than the Bar-Ilan winter school videos. There are no security proofs though, unfortunately.
Simulation proofs are used in many areas of cryptography, but they’re especially critical for MPC. This paper helped me wrap my head around what simulation-based definitions actually mean, why they’re used, and how the proofs work.
A high-level introduction to universal composability from the UC oracle himself. Watch before reading Ran’s UC Paper, which as far as I know is the only complete description of the UC framework.
A series of talks from various speakers. Starts with the basics and culminates with Gentry’s FHE scheme.
A set of typed lecture notes and homeworks from a class Chris Peikert teaches. The lecture notes are more detailed than his survey (see below), and there’s some good exercises in the homeworks.
I think this is the most complete written introduction to lattice based crypto out there. It’s a nice overview of common lattice problems and cryptographic constructions.
A semester’s worth of lectures on differential privacy. There’s full lecture videos, problem sets, and typed notes. So good.
Phillip Rogaway powerfully argues that cryptographers have a duty to confront the social and political implications of our work. Alternatively, watch the talk version.
A talk by Seny Kamara that lays out a vision for how cryptographic research can better serve marginalized groups.
A short essay that discusses why much of the cryptographic research that enhances privacy has failed to make its way into the real world. Also read part 2 here.
A textbook that covers the history and present of digital surveillance and cryptography in US activist movements.