Preface |
|
ix | |
|
Chapter 1 Symmetric Cryptography |
|
|
1 | (24) |
|
|
2 | (1) |
|
1.2 Confidentiality Against Eavesdroppers |
|
|
2 | (17) |
|
|
19 | (3) |
|
1.4 Confidentiality and Integrity |
|
|
22 | (1) |
|
1.5 The Key Distribution Problem |
|
|
23 | (2) |
|
Chapter 2 Key Exchange and Diffie-Hellman |
|
|
25 | (48) |
|
2.1 The Diffie-Hellman Protocol |
|
|
26 | (3) |
|
|
29 | (15) |
|
|
44 | (5) |
|
|
49 | (9) |
|
|
58 | (13) |
|
|
71 | (2) |
|
Chapter 3 Public Key Encryption |
|
|
73 | (44) |
|
|
74 | (1) |
|
3.2 Schemes Based on Diffie-Hellman |
|
|
75 | (4) |
|
|
79 | (8) |
|
|
87 | (9) |
|
|
96 | (8) |
|
3.6 Lattice-Based Cryptosystems |
|
|
104 | (5) |
|
|
109 | (6) |
|
3.8 The Public Key Infrastructure Problem |
|
|
115 | (2) |
|
Chapter 4 Digital Signatures |
|
|
117 | (20) |
|
|
118 | (1) |
|
|
118 | (5) |
|
|
123 | (3) |
|
|
126 | (4) |
|
4.5 Hash-Based Signatures |
|
|
130 | (4) |
|
4.6 Securing Diffie-Hellman |
|
|
134 | (1) |
|
4.7 The Public Key Infrastructure Problem |
|
|
135 | (2) |
|
Chapter 5 Factoring Using Quantum Computers |
|
|
137 | (10) |
|
|
137 | (5) |
|
|
142 | (3) |
|
5.3 Factoring Using a Quantum Computer |
|
|
145 | (2) |
|
Chapter 6 Computational Problems |
|
|
147 | (12) |
|
|
147 | (4) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (4) |
|
Chapter 7 Symmetric Cryptography |
|
|
159 | (54) |
|
|
160 | (27) |
|
7.2 Confidentiality and Underlying Primitives |
|
|
187 | (7) |
|
7.3 Message Authentication Codes |
|
|
194 | (7) |
|
|
201 | (5) |
|
|
206 | (3) |
|
|
209 | (4) |
|
Chapter 8 Public Key Encryption |
|
|
213 | (64) |
|
|
213 | (22) |
|
8.2 Key Encapsulation Mechanisms |
|
|
235 | (16) |
|
8.3 Homomorphic Encryption |
|
|
251 | (8) |
|
|
259 | (6) |
|
|
265 | (12) |
|
Chapter 9 Digital Signatures |
|
|
277 | (54) |
|
|
277 | (15) |
|
9.2 Hash and Sign Paradigm |
|
|
292 | (18) |
|
9.3 Identification Schemes |
|
|
310 | (18) |
|
|
328 | (3) |
|
|
331 | (48) |
|
10.1 Key Exchange Protocols |
|
|
331 | (6) |
|
|
337 | (30) |
|
10.3 Key Exchange from Key Encapsulation |
|
|
367 | (5) |
|
10.4 Single-Message Key Exchange |
|
|
372 | (1) |
|
10.5 Single-Sided Authentication |
|
|
373 | (2) |
|
10.6 Continuous Key Exchange |
|
|
375 | (4) |
|
|
379 | (50) |
|
|
380 | (18) |
|
11.2 Non-Interactive Arguments |
|
|
398 | (4) |
|
|
402 | (7) |
|
11.4 Further Useful Arguments |
|
|
409 | (20) |
|
Chapter 12 Multi-party Computation |
|
|
429 | (30) |
|
|
430 | (14) |
|
12.2 Multi-Party Computation |
|
|
444 | (9) |
|
12.3 Distributed Decryption |
|
|
453 | (6) |
|
Chapter 13 Messaging Protocols |
|
|
459 | (30) |
|
|
460 | (7) |
|
|
467 | (15) |
|
13.3 Invasive Adversaries |
|
|
482 | (4) |
|
13.4 Somewhat Anonymous Messaging |
|
|
486 | (3) |
|
Chapter 14 Cryptographic Voting |
|
|
489 | (36) |
|
|
490 | (12) |
|
14.2 How to Use a Voting Scheme |
|
|
502 | (7) |
|
|
509 | (5) |
|
|
514 | (11) |
Index |
|
525 | |