A Graduate Course in Applied Cryptography

Dan Boneh and Victor Shoup

Table of contents at a glance

Part I: Secret key cryptography
  1. Introduction
  2. Encryption
  3. Stream ciphers
  4. Block ciphers
  5. Chosen plaintext attacks
  6. Message integrity
  7. Message integrity from universal hashing
  8. Message integrity from collision resistant hashing
  9. Authenticated encryption
Part II: Public key cryptography
  1. Public key tools
  2. Public key encryption
  3. Chosen ciphertext public-key encryption
  4. Digital signatures
  5. Fast signatures from one-way functions
  6. Public key management using certificates
  7. Analysis of number theoretic assumptions
Part III: Protocols
  1. Identification protocols
  2. Signatures from identification protocols
  3. Authenticated key exchange
  4. Key establishment with online trusted third parties
Part IV: Further Topics
  1. Cryptography with minimal complexity assumptions
  2. Elliptic curve cryptography
  3. Identity based encryption
  4. Pairing based cryptography
  5. Universal hash proofs
  6. Multicast security
  7. Homomorphic encryption and applications
  8. Commitments
  9. Zero-knowledge
  10. Secret sharing
  11. Multi-party computation
  12. Digital cash
  13. Privacy mechanisms
  1. Basic probability theory
  2. Basic complexity theory
  3. Basic number theory


Early drafts are password protected. Please check frequently for updates.

Version 0.1: pdf    (posted Jan. 22, 2008)

maintained by Dan Boneh and Victor Shoup