Linked e-resources
Details
Table of Contents
Modular Arithmetic, Groups, Finite Fields and Probability
Elliptic Curves
Historical Ciphers
The Enigma Machine
Information Theoretic Security
Historical Stream Ciphers
Modern Stream Ciphers
Block Ciphers
Symmetric Key Distribution
Hash Functions and Message Authentication Codes
Basic Public Key Encryption Algorithms
Primality Testing and Factoring
Discrete Logarithms
Key Exchange and Signature Schemes
Implementation Issues
Obtaining Authentic Public Keys
Attacks on Public Key Schemes
Definitions of Security
Complexity Theoretic Approaches
Provable Security: With Random Oracles
Hybrid Encryption
Provable Security: Without Random Oracles
Secret Sharing Schemes
Commitments and Oblivious Transfer
Zero-Knowledge Proofs
Secure Multiparty Computation.
Elliptic Curves
Historical Ciphers
The Enigma Machine
Information Theoretic Security
Historical Stream Ciphers
Modern Stream Ciphers
Block Ciphers
Symmetric Key Distribution
Hash Functions and Message Authentication Codes
Basic Public Key Encryption Algorithms
Primality Testing and Factoring
Discrete Logarithms
Key Exchange and Signature Schemes
Implementation Issues
Obtaining Authentic Public Keys
Attacks on Public Key Schemes
Definitions of Security
Complexity Theoretic Approaches
Provable Security: With Random Oracles
Hybrid Encryption
Provable Security: Without Random Oracles
Secret Sharing Schemes
Commitments and Oblivious Transfer
Zero-Knowledge Proofs
Secure Multiparty Computation.