Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography

Part I: Secret key cryptography
Stream ciphers
Block ciphers
Chosen plaintext attacks
Message integrity
Message integrity from universal hashing
Message integrity from collision resistant hashing
Authenticated encryption

Part II: Public key cryptography
Public key tools
Public key encryption
Chosen ciphertext secure public-key encryption
Digital signatures
Fast signatures from one-way functions
Analysis of number theoretic assumptions
Elliptic curve cryptography and pairings
Lattice based cryptography

Part III: Protocols
Identification protocols
Signatures from identification protocols
Authenticated key exchange
Key establishment with online trusted third parties
Two-party and multi-party secure computation

Basic number theory
Basic probability theory
Basic complexity theory
Probabilistic algorithms


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.