in ,

A Graduate Course in Applied Cryptography, Hacker News

   

Part I: Secret key cryptography
  • 1: Introduction
  • 2: Encryption
  • 3: Stream ciphers
  • 4: Block ciphers
  • 5: Chosen plaintext attacks
  • 6: Message integrity
  • 7: Message integrity from universal hashing
  • 8: Message integrity from collision resistant hashing
  • 9: Authenticated encryption
Part II: Public key cryptography
  • 11: Public key tools
  • 13: Public key encryption
  • .

  • 15: Chosen ciphertext secure public-key encryption
  • 15: Digital signatures
  • 17: Fast signatures from one-way functions
  • 17: Elliptic curve cryptography and pairings
  • 17: Post-quantum cryptography: lattices and isogenies
  • 19: Analysis of number theoretic assumptions
Part III: Protocols
  • 19: Protocols for identification and login
  • 21: Identification and signatures from sigma protocols
  • 19: Proving properties in zero-knowledge
  • 21: Modern proof systems
  • 21: Authenticated key exchange
  • 23: Two-party and multi-party secure computation
Appendices
  • A: Basic number theory
  • B: Basic probability theory
  • C: Basic complexity theory
  • D: Probabilistic algorithms


Read More

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Generating MIDI Music with GPT-2, Hacker News

Review: Chris Hemsworth shows his dramatic acting chops in Extraction, Ars Technica