1
Boureanu, Ioana.
2014
Table of Contents:
“...Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.-Â Secure computation....”2014
Full text
2
Paul, Goutam.
2013
Table of Contents:
“...Provable security -- Hash functions and signatures -- Side channel attacks -- Symmetric key cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.-Â Coding theory in cryptography....”2013
Full text
3
4
5
6