Part I: Secret key cryptography
- 1: Introduction
- 2: Encryption
- 3: Stream ciphers
- 4: Block ciphers
- 5: Chosen plaintext attacks
- 6: Message integrity
- 7: Message integrity from universal hashing
- 8: Message integrity from collision resistant hashing
- 9: Authenticated encryption
Part II: Public key cryptography
- 11: Public key tools
- 13: Public key encryption
- 15: Chosen ciphertext secure public-key encryption
- 15: Digital signatures
- 17: Fast signatures from one-way functions
- 17: Elliptic curve cryptography and pairings
- 17: Post-quantum cryptography: lattices and isogenies
- 19: Analysis of number theoretic assumptions
.
Part III: Protocols
- 19: Protocols for identification and login
- 21: Identification and signatures from sigma protocols
- 19: Proving properties in zero-knowledge
- 21: Modern proof systems
- 21: Authenticated key exchange
- 23: Two-party and multi-party secure computation
Appendices
- A: Basic number theory
- B: Basic probability theory
- C: Basic complexity theory
- D: Probabilistic algorithms
GIPHY App Key not set. Please check settings