Modules / Lectures


Sl.No Chapter Name MP4 Download
1IntroductionDownload
2Symmetric-key EncryptionDownload
3Historical Ciphers and their CryptanalysisDownload
4Perfect SecurityDownload
5Limitations of Perfect SecurityDownload
6Introduction to Computational SecurityDownload
7Semantic SecurityDownload
8Pseudo-random Generators (PRGs)Download
9Operations on Pseudorandom GeneratorsDownload
10Stream CiphersDownload
11Provably-secure Instantiation of PRGDownload
12Practical Instantiations of PRGDownload
13CPA-securityDownload
14Pseudo-random Functions (PRFs)Download
15CPA-secure Encryption from PRFDownload
16Modes of Operations of Block Ciphers Part IDownload
17Modes of Operations of Block Ciphers Part IIDownload
18Theoretical Constructions of Block CiphersDownload
19Practical Constructions of Block Ciphers: Part IDownload
20Practical Constructions of Block Ciphers: Part IIDownload
21From Passive to Active AdversaryDownload
22Message Integrity and AuthenticationDownload
23Message Authentication for Long Messages : Part IDownload
24Message Authentication for Long Messages : Part IIDownload
25Information-theoretic MACs : Part IDownload
26Information-theoretic MACs : Part IIDownload
27Cryptographic Hash Functions: Part IDownload
28Cryptographic Hash Functions: Part IIDownload
29Message Authentication Using Hash FunctionsDownload
30Generic Attacks on Hash Functions and Additional Applications of Hash FunctionsDownload
31Random Oracle Model: Part IDownload
32Random Oracle Model: Part IIDownload
33Authenticated EncryptionDownload
34Composing CPA-secure Cipher with a Secure MAC: Part IDownload
35Composing CPA-secure Cipher with a Secure MAC: Part IIDownload
36Key-Exchange Protocols: Part IDownload
37Key-Exchange Protocols: Part IIDownload
38Cyclic groupsDownload
39Cryptographic Hardness Assumptions in the Cyclic GroupsDownload
40Candidate Cyclic Groups for Cryptographic Purposes: Part IDownload
41Candidate Cyclic Groups for Cryptographic Purposes: Part IIDownload
42Cryptographic Applications of the Discrete Log AssumptionDownload
43Public-key EncryptionDownload
44El Gamal Public-key Encryption SchemeDownload
45RSA AssumptionDownload
46RSA Public-key CryptosystemDownload
47Hybrid Public-key CryptosystemDownload
48CCA-Secure Public-key CiphersDownload
49CCA-Secure Public-key Ciphers Based on Diffie-Hellman ProblemsDownload
50CCA-Secure Public-key Ciphers Based on RSA AssumptionDownload
51Digital SignaturesDownload
52RSA SignaturesDownload
53Identification SchemesDownload
54Schnorr Signature Scheme and TLS/SSLDownload
55Number TheoryDownload
56Secret SharingDownload
57Zero-Knowledge Protocols: Part IDownload
58Zero-Knowledge Protocols: Part IIDownload
59Good Bye for NowDownload

Sl.No Chapter Name English
1IntroductionDownload
Verified
2Symmetric-key EncryptionDownload
Verified
3Historical Ciphers and their CryptanalysisDownload
Verified
4Perfect SecurityDownload
Verified
5Limitations of Perfect SecurityDownload
Verified
6Introduction to Computational SecurityDownload
Verified
7Semantic SecurityDownload
Verified
8Pseudo-random Generators (PRGs)Download
Verified
9Operations on Pseudorandom GeneratorsDownload
Verified
10Stream CiphersDownload
Verified
11Provably-secure Instantiation of PRGDownload
Verified
12Practical Instantiations of PRGDownload
Verified
13CPA-securityDownload
Verified
14Pseudo-random Functions (PRFs)Download
Verified
15CPA-secure Encryption from PRFDownload
Verified
16Modes of Operations of Block Ciphers Part IDownload
Verified
17Modes of Operations of Block Ciphers Part IIDownload
Verified
18Theoretical Constructions of Block CiphersDownload
Verified
19Practical Constructions of Block Ciphers: Part IDownload
Verified
20Practical Constructions of Block Ciphers: Part IIDownload
Verified
21From Passive to Active AdversaryDownload
Verified
22Message Integrity and AuthenticationDownload
Verified
23Message Authentication for Long Messages : Part IDownload
Verified
24Message Authentication for Long Messages : Part IIDownload
Verified
25Information-theoretic MACs : Part IDownload
Verified
26Information-theoretic MACs : Part IIDownload
Verified
27Cryptographic Hash Functions: Part IDownload
Verified
28Cryptographic Hash Functions: Part IIDownload
Verified
29Message Authentication Using Hash FunctionsDownload
Verified
30Generic Attacks on Hash Functions and Additional Applications of Hash FunctionsDownload
Verified
31Random Oracle Model: Part IDownload
Verified
32Random Oracle Model: Part IIDownload
Verified
33Authenticated EncryptionDownload
Verified
34Composing CPA-secure Cipher with a Secure MAC: Part IDownload
Verified
35Composing CPA-secure Cipher with a Secure MAC: Part IIDownload
Verified
36Key-Exchange Protocols: Part IDownload
Verified
37Key-Exchange Protocols: Part IIDownload
Verified
38Cyclic groupsDownload
Verified
39Cryptographic Hardness Assumptions in the Cyclic GroupsDownload
Verified
40Candidate Cyclic Groups for Cryptographic Purposes: Part IDownload
Verified
41Candidate Cyclic Groups for Cryptographic Purposes: Part IIDownload
Verified
42Cryptographic Applications of the Discrete Log AssumptionDownload
Verified
43Public-key EncryptionDownload
Verified
44El Gamal Public-key Encryption SchemeDownload
Verified
45RSA AssumptionDownload
Verified
46RSA Public-key CryptosystemDownload
Verified
47Hybrid Public-key CryptosystemDownload
Verified
48CCA-Secure Public-key CiphersDownload
Verified
49CCA-Secure Public-key Ciphers Based on Diffie-Hellman ProblemsDownload
Verified
50CCA-Secure Public-key Ciphers Based on RSA AssumptionDownload
Verified
51Digital SignaturesDownload
Verified
52RSA SignaturesDownload
Verified
53Identification SchemesDownload
Verified
54Schnorr Signature Scheme and TLS/SSLDownload
Verified
55Number TheoryDownload
Verified
56Secret SharingDownload
Verified
57Zero-Knowledge Protocols: Part IDownload
Verified
58Zero-Knowledge Protocols: Part IIDownload
Verified
59Good Bye for NowDownload
Verified


Sl.No Language Book link
1EnglishDownload
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available