| CARVIEW |
Select Language
HTTP/2 301
age: 165086
date: Sun, 28 Dec 2025 07:40:32 GMT
location: https://toc.cryptobook.us
server: Squarespace
set-cookie: crumb=BaGwU306zbHYZWEwMDBkNzdmMTIwZWQzNzdiNjY0YjhlMWI5Y2Jj;Secure;Path=/
x-contextid: KZstpjDw/EJE7cF7y
content-length: 0
HTTP/2 200
server: GitHub.com
content-type: text/html; charset=utf-8
last-modified: Thu, 19 Jan 2023 02:24:20 GMT
access-control-allow-origin: *
etag: W/"63c8a9d4-1368"
expires: Tue, 30 Dec 2025 06:14:13 GMT
cache-control: max-age=600
content-encoding: gzip
x-proxy-cache: MISS
x-github-request-id: 39EF:36A0B4:9B200B:AE3ED4:69536B5D
accept-ranges: bytes
age: 0
date: Tue, 30 Dec 2025 06:04:13 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210074-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1767074653.259174,VS0,VE199
vary: Accept-Encoding
x-fastly-request-id: bc7eb95332e89dff2b2e0128ab7d0c1bce1991b8
content-length: 1721
A Graduate Course in Applied Cryptography
A Graduate Course in
A Graduate Course in
Applied Cryptography
By Dan Boneh and Victor Shoup
Download book: version 0.6 (latest version, Jan. 2023)
Table of contents at a glance
Part I: Secret key cryptography
- 1: Introduction
- 2: Encryption
- 3: Stream ciphers
- 4: Block ciphers
- 5: Chosen plaintext attacks
- 6: Message integrity
- 7: Message integrity from universal hashing
- 8: Message integrity from collision resistant hashing
- 9: Authenticated encryption
Part II: Public key cryptography
- 10: Public key tools
- 11: Public key encryption
- 12: Chosen ciphertext secure public-key encryption
- 13: Digital signatures
- 14: Fast signatures from one-way functions
- 15: Elliptic curve cryptography and pairings
- 16: Attacks on number theoretic assumptions
- 17: Post-quantum cryptography from lattices
Part III: Protocols
- 18: Protocols for identification and login
- 19: Identification and signatures from sigma protocols
- 20: Proving properties in zero-knowledge
- 21: Authenticated key exchange
- 22: Threshold cryptography
- 23: Secure multi-party computation
Appendices
- A: Basic number theory
- B: Basic probability theory
- C: Basic complexity theory
- D: Probabilistic algorithms