Foundations of Cryptography
by Oded Goldreich
Publisher: Cambridge University Press 2007
ISBN/ASIN: 0521035368
Number of pages: 396
Description:
The book presents complexity research which gives the mathematical underpinnings for cryptography; this includes one-way functions, pseudorandom generators, and zero-knowledge proofs. Throughout, definitions are complete and detailed; proofs are rigorous and given in full.
Download or read it online for free here:
Download link
(multiple PS files)
Similar books
Basic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(11106 views)
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(11106 views)
Invent with Python
by Al Sweigart - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(8452 views)
by Al Sweigart - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(8452 views)
Advances in Cryptology - CRYPTO'96
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
(5378 views)
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
(5378 views)
Introduction to Modern Cryptography
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(12372 views)
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(12372 views)