Modern Cryptography: Applied Mathematics for Encryption and Informanion Security (2016)
PART I. Foundations
Chapter 1. History of Cryptography to the 1800s
Chapter 2. History of Cryptography from the 1800s
Chapter 3. Basic Information Theory
Chapter 4. Essential Number Theory and Discrete Math
PART II. Symmetric Ciphers and Hashes
Chapter 7. Substitution-Permutation Networks
Chapter 9. Cryptographic Hashes
PART III. Asymmetric Ciphers
Chapter 11. Elliptic Curve Cryptography
PART IV. Applications
Chapter 12. Random Number Generators
Chapter 13. Secure Sockets Layer/Transport Layer Security Protocol
Chapter 14. Virtual Private Networks
Chapter 15. Military Applications
Chapter 18. Cryptographic Backdoors
Chapter 19. The Future of Cryptography
Appendix A. Implementing Cryptography
All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)
If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.
© 2016-2025 All site design rights belong to S.Y.A.