4
A Graduate Course in Applied Cryptography
source link: https://toc.cryptobook.us/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Table of contents at a glance
Part I: Secret key cryptography
- 1: Introduction
- 2: Encryption
- 3: Stream ciphers
- 4: Block ciphers
- 5: Chosen plaintext attacks
- 6: Message integrity
- 7: Message integrity from universal hashing
- 8: Message integrity from collision resistant hashing
- 9: Authenticated encryption
Part II: Public key cryptography
- 10: Public key tools
- 11: Public key encryption
- 12: Chosen ciphertext secure public-key encryption
- 13: Digital signatures
- 14: Fast signatures from one-way functions
- 15: Elliptic curve cryptography and pairings
- 16: Post-quantum cryptography: lattices and isogenies
- 17: Analysis of number theoretic assumptions
Part III: Protocols
- 18: Protocols for identification and login
- 19: Identification and signatures from sigma protocols
- 20: Proving properties in zero-knowledge
- 21: Modern proof systems
- 22: Authenticated key exchange
- 23: Two-party and multi-party secure computation
Appendices
- A: Basic number theory
- B: Basic probability theory
- C: Basic complexity theory
- D: Probabilistic algorithms
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK