4

A Graduate Course in Applied Cryptography

 2 years ago
source link: https://toc.cryptobook.us/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Table of contents at a glance

Part I: Secret key cryptography
  • 1: Introduction
  • 2: Encryption
  • 3: Stream ciphers
  • 4: Block ciphers
  • 5: Chosen plaintext attacks
  • 6: Message integrity
  • 7: Message integrity from universal hashing
  • 8: Message integrity from collision resistant hashing
  • 9: Authenticated encryption
Part II: Public key cryptography
  • 10: Public key tools
  • 11: Public key encryption
  • 12: Chosen ciphertext secure public-key encryption
  • 13: Digital signatures
  • 14: Fast signatures from one-way functions
  • 15: Elliptic curve cryptography and pairings
  • 16: Post-quantum cryptography: lattices and isogenies
  • 17: Analysis of number theoretic assumptions
Part III: Protocols
  • 18: Protocols for identification and login
  • 19: Identification and signatures from sigma protocols
  • 20: Proving properties in zero-knowledge
  • 21: Modern proof systems
  • 22: Authenticated key exchange
  • 23: Two-party and multi-party secure computation
Appendices
  • A: Basic number theory
  • B: Basic probability theory
  • C: Basic complexity theory
  • D: Probabilistic algorithms

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK