IA174 Reading list

Table of Contents


Back to course main page


1. Symmetric ciphers, perfect security, OTP

  • Boneh & Shoup: Section 2.1

2. Stream ciphers, Semantic security

  • Boneh & Shoup: Sections 3.2, 3.5, and 3.6

3. Block ciphers:

  • Boneh & Shoup: Sections 4.1 and 4.2

4. Block cipher modes of operations, CPA security

  • Boneh & Shoup: Chapter 5

5. Cryptographic Hash Functions

  • Boneh & Shoup: Sections 8.1, 8.3-8.6, 8.8, and 8.9

6. MACs

  • Boneh & Shoup: Sections 6.1 (MAC basics), 8.7 (HMAC), 6.3-6.5 (CBC-MAC), 6.7 (CMAC), 6.11, 7.1 (universal hashing), 7.3 (CBC-MAC security proof), 7.4 (CW paradigm)

7. Authenticated encryption

  • Boneh & Shoup: Chapter 9

8. RSA

  • Handbook of Applied Cryptography: Sections 2.4, 2.5, Chapter 8 (Vanilla RSA)
  • Boneh & Shoup: Sections 10.2, 10.3, 11.2-11.4, 12.1-12.3, and 12.8

9. Discrete logarithm

  • Handbook of Applied Cryptography: Chapters 8 and 12 (“textbook” ElGamal and Diffie-Hellman)
  • Boneh & Shoup: Sections 10.4, 10.5, 10.7, 11.5, 12.4, and 12.6

10. Elliptic curve cryptography

  • Boneh & Shoup: Sections 15.1-15.3

11. Digital signatures

  • Handbook of Applied Cryptography: Chapter 11, in particular Sections 11.3 and 11.5
  • Boneh and Shoup: Sections 13.1-13.5

12. Zero-knowledge proofs

  • Handbook of Applied Cryptography: Chapter 10 (authentication protocols), particularly 10.3 and 10.4; Section 11.5.3 (Schnorr signatures); Section 11.8.1 (blind signatures)
  • Boneh and Shoup: Chapter 19 (section 19.5 goes beyond the protocols covered in the lecture)

Back to course main page


Author: Petr Novotný

Created: 2022-10-04 Tue 17:38