The Joy of Cryptography
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Corvallis, Oregon
Oregon State University
2021.
|
Series: | Open textbook library.
|
Subjects: | |
Online Access: | Access online version |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | OTLid0000897 | ||
003 | MnU | ||
005 | 20240122145209.0 | ||
006 | m o d s | ||
007 | cr | ||
008 | 200722s2017 mnu o 0 0 eng d | ||
040 | |a MnU |b eng |c MnU | ||
050 | 4 | |a QA37.3 | |
245 | 0 | 4 | |a The Joy of Cryptography |c Mike Rosulek |
264 | 2 | |a Minneapolis, MN |b Open Textbook Library | |
264 | 1 | |a Corvallis, Oregon |b Oregon State University |c 2021. | |
264 | 4 | |c ©2017. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 0 | |a Open textbook library. | |
505 | 0 | |a 0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption | |
520 | 0 | |a The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4). | |
542 | 1 | |f Attribution-NonCommercial-ShareAlike | |
546 | |a In English. | ||
588 | 0 | |a Description based on online resource | |
650 | 0 | |a Mathematics |v Textbooks | |
650 | 0 | |a Cryptography |v Textbooks | |
700 | 1 | |a Rosulek, Mike |e author | |
710 | 2 | |a Open Textbook Library |e distributor | |
856 | 4 | 0 | |u https://open.umn.edu/opentextbooks/textbooks/897 |z Access online version |