Preview
Open Original
An undergraduate-level textbook introducing students to the fundamentals of provable security
About this book
Unconditional Cryptography
Pseudorandomness
- Modern Computational Cryptography
- Pseudorandom Generators
- Pseudorandom Functions
- Pseudorandom Permutations
Symmetric-Key Encryption
- Chosen-Plaintext Attacks Against Encryption
- Chosen-Ciphertext Attacks Against Encryption
Hashing
- Collision-Resistant Hash Functions
- ☆ Universal Hash Functions
- Rando…
An undergraduate-level textbook introducing students to the fundamentals of provable security
About this book
Unconditional Cryptography
Pseudorandomness
- Modern Computational Cryptography
- Pseudorandom Generators
- Pseudorandom Functions
- Pseudorandom Permutations
Symmetric-Key Encryption
- Chosen-Plaintext Attacks Against Encryption
- Chosen-Ciphertext Attacks Against Encryption
Hashing
- Collision-Resistant Hash Functions
- ☆ Universal Hash Functions
- Random Oracles and Other Idealized Models
Asymmetric-Key Cryptography
- Key Exchange
- Public-Key Encryption
- RSA
- Digital Signatures
Advanced Topics
- Encrypted Messaging & Ratcheting
- Authenticated Key Exchange
- Zero-Knowledge Proofs
- Post-Quantum Cryptography
Appendix
- Math Review
- Binary Finite Fields
- Bibliography