A Graduate Course in Applied Cryptography

Download book: version 0.4 (latest version, Sep. 2017)

Tables of contents at a glance

Part I: Secret key cryptography

    • 1: Introduction
    • 2: Encryption
    • 3: Stream ciphers
    • 4: Block ciphers
    • 5: Chosen plaintext attacks
    • 6: Message integrity
    • 7: Message integrity from universal hashing
    • 8: Message integrity from collision resistant hashing
    • 9: Authenticated encryption


Part II: Public key cryptography

    • 10: Public key tools
    • 11: Public key encryption
    • 12: Chosen ciphertext secure public-key encryption
    • 13: Digital signatures
    • 14: Fast signatures from one-way functions
    • 15: Analysis of number theoretic assumptions
    • 16: Elliptic curve cryptography and pairings
    • 17: Lattice based cryptography


Part III: Protocols

    • 18: Protocols for identification and login
    • 19: Identification and signatures from sigma protocols
    • 20: Proving properties in zero-knowledge
    • 21: Modern proof systems
    • 22: Authenticated key exchange
    • 23: Key establishment with online trusted third parties
    • 24: Two-party and multi-party secure computation


Appendices

    • A: Basic number theory
    • B: Basic probability theory
    • C: Basic complexity theory
    • D: Probabilistic algorithms

Download book

  • Version 0.4: [pdf] (posted Sep. 30, 2017)
  • Version 0.3: [pdf] (posted Dec. 9, 2016)
  • Version 0.2: [pdf] (posted Aug. 17, 2015)
  • Version 0.1: [pdf] (posted Jan. 22, 2008)