A Graduate Course in Applied Cryptography



Download free course A Graduate Course in Applied Cryptography, pdf file on 900 pages by by Dan Boneh, Victor Shoup.
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications.

While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem.

Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through.

This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal that we aim to achieve and then present constructions that achieve the required goal. To analyze the constructions, we develop a unified framework for doing cryptographic proofs. A reader who masters this framework will be capable of applying it to new constructions that may not be covered in the book.

Table of contents

  • Secret key cryptography
  • Introduction
  • Encryption
  • Stream ciphers
  • Block ciphers
  • Chosen plaintext attacks
  • Message integrity
  • Message integrity from universal hashing
  • Message integrity from collision resistant hashing
  • Authenticated encryption
  • Public key cryptography
  • Public key tools
  • Public key encryption
  • Chosen ciphertext secure public-key encryption
  • Digital signatures
  • Fast signatures from one-way functions
  • Elliptic curve cryptography and pairings
  • Post-quantum cryptography: lattices and isogenies
  • Analysis of number theoretic assumptions
  • Protocols
  • Protocols for identification and login
  • Identification and signatures from sigma protocols
  • Proving properties in zero-knowledge
  • Modern proof systems
  • Authenticated key exchange
  • Two-party and multi-party secure computation
  • Basic number theory
  • Basic probability theory
  • Basic complexity theory
  • Probabilistic algorithms
Pages : 900
Size : 9.5 MB
File type : PDF
Downloads: 151
Created: 2022-02-01
License: Out of Copyright
Author(s): by Dan Boneh, Victor Shoup
A Graduate Course in Applied Cryptography

Warning: Trying to access array offset on false in /home/tutovnfz/public_html/article.php on line 233

Others Computer science Tutorials

Don't Panic: Mobile Developer's Guide to The Galaxy

97 Things Every Software Architect Should Know

DevOps: WTF?

Accelerators in Silicon Valley

Digital Video Concepts, Methods, and Metrics

Others related eBooks about A Graduate Course in Applied Cryptography

How To Think Like A Computer Scientist: C Version

The book is intended as a very first introduction into computer science and programming. As such, its content is well-balanced in comprehensiveness and conciseness. A programming book should not distract with verbose text and this book strikes a good middle ground between the mutually contradicting ...

Everything Is Distributed

Download free course Everything Is Distributed, pdf file on 38 pages by Courtney Nash, Mike Loukides....

MATLAB tutorial in PDF

Download free MATLAB tutorial course in PDF, training file in 34 chapters and 227 pages. Free unaffiliated ebook created from Stack OverFlow contributor....

Crypto 101

Download free course Crypto 101, pdf file on 254 pages by Laurens Van Houtven....

Think Data Structures

Download free course Think Data Structures, pdf file on 187 pages by Allen Downey....

Introduction to CNTK Succinctly

Download free course Introduction to CNTK Succinctly, pdf file on 124 pages by James McCaffrey....

Automating Manufacturing Systems with PLCs

This is a manuscript for a PLC based control system book that is currently being used for teaching an undergraduate controls course - Manufacturing Controls. The course and book focus on the Allen Bradley family of controllers, thus allowing a deeper topic coverage than is normal in PLC books....

Software Architecture Patterns

The success of any application or system depends on the architecture pattern you use. By describing the overall characteristics of the architecture, these patterns not only guide designers and developers on how to design components, but also determine the ways in which those components should inte...

MATLAB tutorial for professionals

Download free MATLAB tutorial course in PDF, training file in 33 chapters and 182 pages. Free unaffiliated ebook created from Stack OverFlow contributor....

XSLT: XML Transformation Tutorial in PDF

Download free XSLT and XML Transformation Tutorial in PDF, free training document on 42 pages by Dongwon Lee....