The number of ECE ILLINOIS faculty members.
|Cryptocurrency Security||CS598||AM||67396||LEC||4||1100 - 1215||T R||4070 ECE Building|| Andrew Miller|
|Cryptocurrency Security||ECE598||AM||67363||LEC||4||1100 - 1215||T R||4070 ECE Building|| Andrew Miller|
Decentralized cryptocurrencies, such as Bitcoin and Ethereum, have gained rapid popularity, attracting the attention of academics, entrepreneurs, economists, and policymakers. They promise to create new disruptive markets, and revolutionize how we think of money and financial infrastructure.
The goal of this course is to introduce students to current research in cryptocurrencies. We’ll cover the technical background of applied cryptography and incentive mechanisms. The bulk of the course will consist of reading and discussion of recent research papers from top security conferences. Assignments will involve handson practice with cryptocurrency tools, such as sending and receive cryptocurrency payments, and programming smart contracts. The course will culminate with an original research project.
More course description:
The first few classes will consist of lectures from the instructor, especially intended to establish the necessary background. Thereafter, we will read and discuss research papers, especially from computer security conferences, Financial Cryptography, and the Bitcoin Research workshop, PETS, WEIS, etc.
Cryptocurrencies are fun because they’re a contemporary, realworld embodiment of many exciting concepts in applied crypto, etc., that have previously been either very abstract or even just sciencefiction. So a goal of this course is to build some handson experience and familiarity with free open source software (FOSS) tools, and especially ones that will be useful for completing final projects.
You can also get bonus credit by interacting with the cryptocurrency ecosystem, by posting on forums, contributing source code or bug reports, etc., and explaining it to the class.
You’ll be required to complete an original research project by the end of the course. Students are encouraged to work in teams of two working alone is fine, teams should be no larger than three. These projects can be broadly scoped, and could take many possible technical approaches (measurement, systems, cryptography, attacks, distributed protocol design, or even data science, HCI, etc.). Project proposals will need to be approved by the instructor
approximately 1/3 of the way through the course. We’ll have a checkpoint presentation 2/3 of the way through the course. By the end of the course, the goal is to have a conferencequality research paper.