Linked e-resources
Details
Table of Contents
Provable security for symmetric cryptography
Asymmetric cryptography and cryptanalysis
Cryptography in theory and practice
Compromised systems
Symmetric cryptanalysis
Algorithmic number theory
Symmetric primitives
Asymmetric cryptography
Symmetric cryptography
Cryptanalytic tools
Hardware-oriented cryptography
Secure computation and protocols
Obfuscation
Quantum techniques
Spooky encryption
IBE, ABE, and functional encryption
Automated tools and synthesis
Zero knowledge
Theory.
Asymmetric cryptography and cryptanalysis
Cryptography in theory and practice
Compromised systems
Symmetric cryptanalysis
Algorithmic number theory
Symmetric primitives
Asymmetric cryptography
Symmetric cryptography
Cryptanalytic tools
Hardware-oriented cryptography
Secure computation and protocols
Obfuscation
Quantum techniques
Spooky encryption
IBE, ABE, and functional encryption
Automated tools and synthesis
Zero knowledge
Theory.