https://toc.cryptobook.us/
e-book: https://toc.cryptobook.us/book.pdf

A Graduate Course in
Applied Cryptography

By   [Dan Boneh](https://crypto.stanford.edu/~dabo)   and   [Victor 
Shoup](https://shoup.net)

(latest version, Jan. 2020)

Table of contents at a glance

Part I: Secret key cryptography

- 1: Introduction
- 2: Encryption
- 3: Stream ciphers
- 4: Block ciphers
- 5: Chosen plaintext attacks
- 6: Message integrity
- 7: Message integrity from universal hashing
- 8: Message integrity from collision resistant hashing
- 9: Authenticated encryption

Part II: Public key cryptography

- 10: Public key tools
- 11: Public key encryption
- 12: Chosen ciphertext secure public-key encryption
- 13: Digital signatures
- 14: Fast signatures from one-way functions
- 15: Elliptic curve cryptography and pairings
- 16: Post-quantum cryptography: lattices and isogenies
- 17: Analysis of number theoretic assumptions

Part III: Protocols

- 18: Protocols for identification and login
- 19: Identification and signatures from sigma protocols
- 20: Proving properties in zero-knowledge
- 21: Modern proof systems
- 22: Authenticated key exchange
- 23: Two-party and multi-party secure computation

Appendices

- A: Basic number theory
- B: Basic probability theory
- C: Basic complexity theory
- D: Probabilistic algorithms

Reply via email to