# A Graduate Course in Applied Cryptography

Download free course A Graduate Course in Applied Cryptography, pdf file on 900 pages by by Dan Boneh, Victor Shoup.
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications.

While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem.

Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through.

This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal that we aim to achieve and then present constructions that achieve the required goal. To analyze the constructions, we develop a unified framework for doing cryptographic proofs. A reader who masters this framework will be capable of applying it to new constructions that may not be covered in the book.

• Secret key cryptography
• Introduction
• Encryption
• Stream ciphers
• Block ciphers
• Chosen plaintext attacks
• Message integrity
• Message integrity from universal hashing
• Message integrity from collision resistant hashing
• Authenticated encryption
• Public key cryptography
• Public key tools
• Public key encryption
• Chosen ciphertext secure public-key encryption
• Digital signatures
• Fast signatures from one-way functions
• Elliptic curve cryptography and pairings
• Post-quantum cryptography: lattices and isogenies
• Analysis of number theoretic assumptions
• Protocols
• Protocols for identification and login
• Identification and signatures from sigma protocols
• Proving properties in zero-knowledge
• Modern proof systems
• Authenticated key exchange
• Two-party and multi-party secure computation
• Basic number theory
• Basic probability theory
• Basic complexity theory
• Probabilistic algorithms
 Pages : 900 Size : 9.5 MB File type : PDF Downloads: 128 Created: 2022-02-01 License: Out of Copyright Author(s): by Dan Boneh, Victor Shoup

## Others Computer science Tutorials

Statistics with Julia

Azure Durable Functions Succinctly

Learning Vim

Migrating to Cloud-Native Application Architectures

A Rust Sampler

Cloud Native Applications

Download free course Cloud Native Applications, pdf file on 120 pages by Michael Wittig, Andreas Wittig....

Flutter Succinctly

Download free course Flutter Succinctly, pdf file on 129 pages by Ed Freitas....

OpenIntro Statistics, 4th Edition

OpenIntro Statistics offers a traditional introduction to statistics at the college level...., download free OpenIntro Statistics tutorial in PDF (422 pages) created by David Diez ....

Cyber-Physical Systems of Systems

Download free course Cyber-Physical Systems of Systems, pdf file on 270 pages by Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz....

Think Complexity

Download free course Think Complexity, pdf file on 228 pages by Allen Downey....

Category Theory for Programmers

Category Theory is one of the most abstract branches of mathematics. It is usually taught ..., download free Category Theory tutorial in PDF (498 pages) created by Bartosz Milewski ....

Getting Started with InnerSource

Download free course Getting Started with InnerSource, pdf file on 22 pages by Andy Oram....

A First Course on Time Series Analysis with SAS

This book has been developed for a one-semester course usually attended by students in statistics, economics, business, engineering, and quantitative social sciences. A unique feature of this edition is its integration with the statistical software package SAS (Statistical Analysis System) computi...

HackSpace Magazine: Issue 47

Download free course HackSpace Magazine: Issue 47, pdf file on 116 pages by HackSpace Team....

Handbook on Craniofacial Superimposition

Download free course Handbook on Craniofacial Superimposition, pdf file on 239 pages by Sergio Damas, Oscar Cordón, Oscar Ibáñez....

Categories