Download book
Table of contents
A Graduate Course in
Applied Cryptography
By
Dan Boneh
and
Victor Shoup
Download book:
version 0.6
(latest version, Jan. 2023)
Table of contents at a glance
Part I: Secret key cryptography
1: Introduction
2: Encryption
3: Stream ciphers
4: Block ciphers
5: Chosen plaintext attacks
6: Message integrity
7: Message integrity from universal hashing
8: Message integrity from collision resistant hashing
9: Authenticated encryption
Part II: Public key cryptography
10: Public key tools
11: Public key encryption
12: Chosen ciphertext secure public-key encryption
13: Digital signatures
14: Fast signatures from one-way functions
15: Elliptic curve cryptography and pairings
16: Attacks on number theoretic assumptions
17: Post-quantum cryptography from lattices
Part III: Protocols
18: Protocols for identification and login
19: Identification and signatures from sigma protocols
20: Proving properties in zero-knowledge
21: Authenticated key exchange
22: Threshold cryptography
23: Secure multi-party computation
Appendices
A: Basic number theory
B: Basic probability theory
C: Basic complexity theory
D: Probabilistic algorithms
Download book versions
Version 0.6: [
pdf
] (posted Jan. 14, 2023)
Version 0.5: [
pdf
] (posted Jan. 4, 2020)
Version 0.4: [
pdf
] (posted Sep. 30, 2017)
Version 0.3: [
pdf
] (posted Dec. 9, 2016)
Version 0.2: [
pdf
] (posted Aug. 17, 2015)
Version 0.1: [
pdf
] (posted Jan. 22, 2008)