IA174 Reading list
Table of Contents
- 1. Symmetric ciphers, perfect security, OTP
- 2. Stream ciphers, Semantic security
- 3. Block ciphers:
- 4. Block cipher modes of operations, CPA security
- 5. Cryptographic Hash Functions
- 6. MACs
- 7. Authenticated encryption
- 8. RSA
- 9. Discrete logarithm
- 10. Elliptic curve cryptography
- 11. Digital signatures
- 12. Zero-knowledge proofs
1. Symmetric ciphers, perfect security, OTP
- Boneh & Shoup: Section 2.1
2. Stream ciphers, Semantic security
- Boneh & Shoup: Sections 3.2, 3.5, and 3.6
3. Block ciphers:
- Boneh & Shoup: Sections 4.1 and 4.2
4. Block cipher modes of operations, CPA security
- Boneh & Shoup: Chapter 5
5. Cryptographic Hash Functions
- Boneh & Shoup: Sections 8.1, 8.3-8.6, 8.8, and 8.9
6. MACs
- Boneh & Shoup: Sections 6.1 (MAC basics), 8.7 (HMAC), 6.3-6.5 (CBC-MAC), 6.7 (CMAC), 6.11, 7.1 (universal hashing), 7.3 (CBC-MAC security proof), 7.4 (CW paradigm)
7. Authenticated encryption
- Boneh & Shoup: Chapter 9
8. RSA
- Handbook of Applied Cryptography: Sections 2.4, 2.5, Chapter 8 (Vanilla RSA)
- Boneh & Shoup: Sections 10.2, 10.3, 11.2-11.4, 12.1-12.3, and 12.8
9. Discrete logarithm
- Handbook of Applied Cryptography: Chapters 8 and 12 (“textbook” ElGamal and Diffie-Hellman)
- Boneh & Shoup: Sections 10.4, 10.5, 10.7, 11.5, 12.4, and 12.6
10. Elliptic curve cryptography
- Boneh & Shoup: Sections 15.1-15.3
11. Digital signatures
- Handbook of Applied Cryptography: Chapter 11, in particular Sections 11.3 and 11.5
- Boneh and Shoup: Sections 13.1-13.5
12. Zero-knowledge proofs
- Handbook of Applied Cryptography: Chapter 10 (authentication protocols), particularly 10.3 and 10.4; Section 11.5.3 (Schnorr signatures); Section 11.8.1 (blind signatures)
- Boneh and Shoup: Chapter 19 (section 19.5 goes beyond the protocols covered in the lecture)