Functions as course notes for UCSD courses CSE207 and CSE291 and UCD course ECS 227. Feedback, corrections and comments on these notes is much appreciated.
Chapter | Files | Last Modified |
Table of Contents | postscript ; pdf | Oct 29, 2003 |
1. Introduction | postscript ; pdf | Oct 1, 2003 |
2. Block Ciphers | postscript ; pdf | Oct 8, 2003 |
3. Pseudorandom Functions | postscript ; pdf | Oct 28, 2003 |
4. Symmetric Encryption | postscript ; pdf | Oct 29, 2003 |
5. Hash Functions | postscript ; pdf | Nov 5, 2003 |
6. Message Authentication | postscript ; pdf | Oct 30, 2002 |
7. Authenticated Encryption | postscript ; pdf | |
8. Computational Number Theory | postscript ; pdf | Oct 30, 2002 |
9. Number-Theoretic Primitives | postscript ; pdf | Nov 26, 2002 |
10. Asymmetric Encryption | postscript ; pdf | Nov 14, 2002 |
11. Digital Signatures | postscript ; pdf | Dec 5, 2002 |
12. Authenticated Key Exchange | postscript ; pdf | |
13. The Asymptotic Approach | ||
14. Interactive Proofs and Zero-Knowledge | postscript ; pdf | |
Appendix A: The birthday problem | postscript ; pdf | Oct 4, 2002 |
Appendix B: Tail inequalities | postscript ; pdf | Oct 1, 2001 |
Appendix C: Information-Theoretic security | postscript ; pdf | Oct 22, 2002 |
Bibliography | postscript ; pdf | Oct 4, 2002 |