Search Results - Computers and Intractability

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    The Joy of Cryptography by Rosulek, Mike

    Published 2021
    Table of Contents: “…0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption…”
    Access online version
    Electronic eBook
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20