Location via proxy:   
[Report a bug]   [Manage cookies]                

A Graduate Course in
Applied Cryptography

By   Dan Boneh   and   Victor Shoup

Download book:  version 0.6    (latest version, Jan. 2023)

Table of contents at a glance

Part I: Secret key cryptography
  • 1: Introduction
  • 2: Encryption
  • 3: Stream ciphers
  • 4: Block ciphers
  • 5: Chosen plaintext attacks
  • 6: Message integrity
  • 7: Message integrity from universal hashing
  • 8: Message integrity from collision resistant hashing
  • 9: Authenticated encryption
Part II: Public key cryptography
  • 10: Public key tools
  • 11: Public key encryption
  • 12: Chosen ciphertext secure public-key encryption
  • 13: Digital signatures
  • 14: Fast signatures from one-way functions
  • 15: Elliptic curve cryptography and pairings
  • 16: Attacks on number theoretic assumptions
  • 17: Post-quantum cryptography from lattices
Part III: Protocols
  • 18: Protocols for identification and login
  • 19: Identification and signatures from sigma protocols
  • 20: Proving properties in zero-knowledge
  • 21: Authenticated key exchange
  • 22: Threshold cryptography
  • 23: Secure multi-party computation
Appendices
  • A: Basic number theory
  • B: Basic probability theory
  • C: Basic complexity theory
  • D: Probabilistic algorithms

Download book versions

  • Version 0.6: [pdf]    (posted Jan. 14, 2023)
  • Version 0.5: [pdf]    (posted Jan. 4, 2020)
  • Version 0.4: [pdf]    (posted Sep. 30, 2017)
  • Version 0.3: [pdf]    (posted Dec. 9, 2016)
  • Version 0.2: [pdf]    (posted Aug. 17, 2015)
  • Version 0.1: [pdf]    (posted Jan. 22, 2008)