Skip to content

    Read more about The Joy of Cryptography

    The Joy of Cryptography

    (0 reviews)

    No ratings

    Mike Rosulek, Oregon State University

    Copyright Year:

    Last Update: 2021

    Publisher: Oregon State University

    Language: English

    Formats Available

    Conditions of Use

    Attribution-NonCommercial-ShareAlike Attribution-NonCommercial-ShareAlike
    CC BY-NC-SA

    Table of Contents

    • 0 Review of Concepts & Notation
    • 1 One-Time Pad & Kerckhoffs' Principle
    • 2 The Basics of Provable Security
    • 3 Secret Sharing
    • 4 Basing Cryptography on Intractable Computations
    • 5 Pseudorandom Generators
    • 6 Pseudorandom Functions & Block Ciphers
    • 7 Security Against Chosen Plaintext Attacks
    • 8 Block Cipher Modes of Operation
    • 9 Chosen Ciphertext Attacks
    • 10 Message Authentication Codes
    • 11 Hash Functions
    • 12 Authenticated Encryption & AEAD
    • 13 RSA & Digital Signatures
    • 14 Diffie-Hellman Key Agreement
    • 15 Public-Key Encryption

    Ancillary Material

    • Oregon State University
    • About the Book

      The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4).

      About the Contributors

      Author

      Mike Rosulek, Oregon State University

      Contribute to this Page

      Suggest an edit to this book record