Functions as course notes for UCSD courses CSE207 and CSE291 and UCD course ECS 227. Feedback, corrections and comments on these notes is much appreciated.

Chapter |
Files |
Last Modified |

Table of Contents | postscript ; pdf | Oct 29, 2003 |

1. Introduction | postscript ; pdf | Oct 1, 2003 |

2. Block Ciphers | postscript ; pdf | Oct 8, 2003 |

3. Pseudorandom Functions | postscript ; pdf | Oct 28, 2003 |

4. Symmetric Encryption | postscript ; pdf | Oct 29, 2003 |

5. Hash Functions | postscript ; pdf | Nov 5, 2003 |

6. Message Authentication | postscript ; pdf | Oct 30, 2002 |

7. Authenticated Encryption | postscript ; pdf | |

8. Computational Number Theory | postscript ; pdf | Oct 30, 2002 |

9. Number-Theoretic Primitives | postscript ; pdf | Nov 26, 2002 |

10. Asymmetric Encryption | postscript ; pdf | Nov 14, 2002 |

11. Digital Signatures | postscript ; pdf | Dec 5, 2002 |

12. Authenticated Key Exchange | postscript ; pdf | |

13. The Asymptotic Approach | ||

14. Interactive Proofs and Zero-Knowledge | postscript ; pdf | |

Appendix A: The birthday problem | postscript ; pdf | Oct 4, 2002 |

Appendix B: Tail inequalities | postscript ; pdf | Oct 1, 2001 |

Appendix C: Information-Theoretic security | postscript ; pdf | Oct 22, 2002 |

Bibliography | postscript ; pdf | Oct 4, 2002 |