1 | Introduction | PDF unavailable |
2 | Overview on Modern Cryptography | PDF unavailable |
3 | Introduction to Number Theory | PDF unavailable |
4 | Probability and Information Theory | PDF unavailable |
5 | Classical Cryptosystems | PDF unavailable |
6 | Cryptanalysis of Classical Ciphers | PDF unavailable |
7 | Shannons Theory | PDF unavailable |
8 | Shannons Theory (Contd...1) | PDF unavailable |
9 | Shannons Theory (Contd...2) | PDF unavailable |
10 | Symmetric Key Ciphers | PDF unavailable |
11 | Block Cipher Standards (DES) | PDF unavailable |
12 | Block Cipher Standards (AES) | PDF unavailable |
13 | Block Cipher Standards (AES) (Contd.) | PDF unavailable |
14 | Linear Cryptanalysis | PDF unavailable |
15 | Differential Cryptanalysis | PDF unavailable |
16 | Few other Cryptanalytic Techniques | PDF unavailable |
17 | Overview on S-Box Design Principles | PDF unavailable |
18 | Modes of Operation of Block Ciphers | PDF unavailable |
19 | Stream Ciphers | PDF unavailable |
20 | Stream Ciphers (Contd...1) | PDF unavailable |
21 | Stream Ciphers (Contd...2) | PDF unavailable |
22 | Pseudorandomness | PDF unavailable |
23 | Cryptographic Hash Functions | PDF unavailable |
24 | Cryptographic Hash Functions (Contd...1) | PDF unavailable |
25 | Cryptographic Hash Functions (Contd...2) | PDF unavailable |
26 | Message Authentication Codes | PDF unavailable |
27 | More Number Theoretic Results | PDF unavailable |
28 | The RSA Cryptosystem | PDF unavailable |
29 | Primality Testing | PDF unavailable |
30 | Factoring Algorithms | PDF unavailable |
31 | Some Comments on the Security of RSA | PDF unavailable |
32 | Discrete Logarithm Problem (DLP) | PDF unavailable |
33 | The Diffie-Hellman Problem and Security of ElGamal Systems | PDF unavailable |
34 | An Introduction to Elliptic Curve Cryptography | PDF unavailable |
35 | Application of Elliptic Curves to Cryptography | PDF unavailable |
36 | Implementation of Elliptic Curve Cryptography | PDF unavailable |
37 | Secret Sharing Schemes | PDF unavailable |
38 | A Tutorial on Network Protocols | PDF unavailable |
39 | System Security | PDF unavailable |
40 | Firewalls and Intrusion Detection Systems | PDF unavailable |
41 | Side Channel Analysis of Cryptographic Implementations | PDF unavailable |