Download free course A Graduate Course in Applied Cryptography, pdf file on 900 pages by by Dan Boneh, Victor Shoup.
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications.
While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem.
Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through.
This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal that we aim to achieve and then present constructions that achieve the required goal. To analyze the constructions, we develop a unified framework for doing cryptographic proofs. A reader who masters this framework will be capable of applying it to new constructions that may not be covered in the book.
Table of contentsSecret key cryptography
Introduction
Encryption
Stream ciphers
Block ciphers
Chosen plaintext attacks
Message integrity
Message integrity from universal hashing
Message integrity from collision resistant hashing
Authenticated encryption
Public key cryptography
Public key tools
Public key encryption
Chosen ciphertext secure public-key encryption
Digital signatures
Fast signatures from one-way functions
Elliptic curve cryptography and pairings
Post-quantum cryptography: lattices and isogenies
Analysis of number theoretic assumptions
Protocols
Protocols for identification and login
Identification and signatures from sigma protocols
Proving properties in zero-knowledge
Modern proof systems
Authenticated key exchange
Two-party and multi-party secure computation
Basic number theory
Basic probability theory
Basic complexity theory
Probabilistic algorithms
Others related eBooks about A Graduate Course in Applied Cryptography
Tutorial Cryptography for Beginners
This tutorial is intended to novice who wants to be familiar with lattice based cryptography and cryptosystem....
HackSpace Magazine: Issue 48
Download free course HackSpace Magazine: Issue 48, pdf file on 116 pages by HackSpace Team....
Projection-Based Clustering through Self-Organization and Swarm Intelligence
Download free course Projection-Based Clustering through Self-Organization and Swarm Intelligence, pdf file on 210 pages by Michael Christoph Thrun....
Semantic Systems. The Power of AI and Knowledge Graphs
Download free course Semantic Systems. The Power of AI and Knowledge Graphs, pdf file on 400 pages by Maribel Acosta, Philippe Cudré-Mauroux, Maria Maleshkova, Tassilo Pellegrini, Harald Sack, York Sure-Vetter....
A First Course on Time Series Analysis with SAS
This book has been developed for a one-semester course usually attended by students in statistics, economics, business, engineering, and quantitative social sciences. A unique feature of this edition is its integration with the statistical software package SAS (Statistical Analysis System) computi...
Blockchain and Crypt Currency
Download free course Blockchain and Crypt Currency, pdf file on 150 pages by by Makoto Yano, Chris Dai, Kenichi Masuda, Yoshio Kishimoto....
Rethinking Productivity in Software Engineering
Get the most out of this foundational reference and improve the productivity of your softw..., download free Software Engineering tutorial in PDF (310 pages) created by Caitlin Sadowski ....
StatLect - Lectures on Probability Theory and Mathematical Statistics
This is a collection of lectures on probability theory and mathematical statistics written by Marco Taboga, a professional financial economist with a passion for mathematics. It is offered as a free service to the mathematical community and provides an accessible introduction to topics that are no...
Software Innovation
Download free course Software Innovation, pdf file on 129 pages by Jeremy Rose....
Information technology project managers' competencies
Download free course Information technology project managers' competencies, pdf file on 269 pages by Carl Marnewick, Wikus Erasmus, Nazeer Joseph....