The Joy of Cryptography
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Corvallis, Oregon
Oregon State University
2021.
|
Series: | Open textbook library.
|
Subjects: | |
Online Access: | Access online version |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- 0 Review of Concepts & Notation
- 1 One-Time Pad & Kerckhoffs' Principle
- 2 The Basics of Provable Security
- 3 Secret Sharing
- 4 Basing Cryptography on Intractable Computations
- 5 Pseudorandom Generators
- 6 Pseudorandom Functions & Block Ciphers
- 7 Security Against Chosen Plaintext Attacks
- 8 Block Cipher Modes of Operation
- 9 Chosen Ciphertext Attacks
- 10 Message Authentication Codes
- 11 Hash Functions
- 12 Authenticated Encryption & AEAD
- 13 RSA & Digital Signatures
- 14 Diffie-Hellman Key Agreement
- 15 Public-Key Encryption