Book: The Joy of Cryptography (Rosulek)
- Page ID
- 7312
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)
The Joy of Cryptography is a free undergraduate-level textbook that introduces students to the fundamentals of provable security.
Front Matter
- 0: Review of Concepts and Notation
- 1: One-Time Pad and Kerckhoffs' Principle
- 2: The Basics of Provable Security
- 3: Secret Sharing
- 4: Basing Cryptography on Limits of Computation
- 5: Pseudorandom Generators
- 6: Pseudorandom Functions and Block Ciphers
- 7: Security against Chosen Plaintext Attacks
- 8: Block Cipher Modes of Operation
- 9: Chosen Ciphertext Attacks
- 10: Message Authentication Codes
- 11: Hash Functions
- 12: Authenticated Encryption and AEAD ☆
- 13: RSA and Digital Signatures
14: Diffie-Hellman Key Agreement
15: Public-Key Encryption
Back Matter
Thumbnail: Military Enigma machine, model "Enigma I", used during the late 1930s and during the war; displayed at Museo scienza e tecnologia Milano, Italy. (CC BY-SA 4.0 International; Alessandro Nassiri).