Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Introduction | Download |
2 | Symmetric-key Encryption | Download |
3 | Historical Ciphers and their Cryptanalysis | Download |
4 | Perfect Security | Download |
5 | Limitations of Perfect Security | Download |
6 | Introduction to Computational Security | Download |
7 | Semantic Security | Download |
8 | Pseudo-random Generators (PRGs) | Download |
9 | Operations on Pseudorandom Generators | Download |
10 | Stream Ciphers | Download |
11 | Provably-secure Instantiation of PRG | Download |
12 | Practical Instantiations of PRG | Download |
13 | CPA-security | Download |
14 | Pseudo-random Functions (PRFs) | Download |
15 | CPA-secure Encryption from PRF | Download |
16 | Modes of Operations of Block Ciphers Part I | Download |
17 | Modes of Operations of Block Ciphers Part II | Download |
18 | Theoretical Constructions of Block Ciphers | Download |
19 | Practical Constructions of Block Ciphers: Part I | Download |
20 | Practical Constructions of Block Ciphers: Part II | Download |
21 | From Passive to Active Adversary | Download |
22 | Message Integrity and Authentication | Download |
23 | Message Authentication for Long Messages : Part I | Download |
24 | Message Authentication for Long Messages : Part II | Download |
25 | Information-theoretic MACs : Part I | Download |
26 | Information-theoretic MACs : Part II | Download |
27 | Cryptographic Hash Functions: Part I | Download |
28 | Cryptographic Hash Functions: Part II | Download |
29 | Message Authentication Using Hash Functions | Download |
30 | Generic Attacks on Hash Functions and Additional Applications of Hash Functions | Download |
31 | Random Oracle Model: Part I | Download |
32 | Random Oracle Model: Part II | Download |
33 | Authenticated Encryption | Download |
34 | Composing CPA-secure Cipher with a Secure MAC: Part I | Download |
35 | Composing CPA-secure Cipher with a Secure MAC: Part II | Download |
36 | Key-Exchange Protocols: Part I | Download |
37 | Key-Exchange Protocols: Part II | Download |
38 | Cyclic groups | Download |
39 | Cryptographic Hardness Assumptions in the Cyclic Groups | Download |
40 | Candidate Cyclic Groups for Cryptographic Purposes: Part I | Download |
41 | Candidate Cyclic Groups for Cryptographic Purposes: Part II | Download |
42 | Cryptographic Applications of the Discrete Log Assumption | Download |
43 | Public-key Encryption | Download |
44 | El Gamal Public-key Encryption Scheme | Download |
45 | RSA Assumption | Download |
46 | RSA Public-key Cryptosystem | Download |
47 | Hybrid Public-key Cryptosystem | Download |
48 | CCA-Secure Public-key Ciphers | Download |
49 | CCA-Secure Public-key Ciphers Based on Diffie-Hellman Problems | Download |
50 | CCA-Secure Public-key Ciphers Based on RSA Assumption | Download |
51 | Digital Signatures | Download |
52 | RSA Signatures | Download |
53 | Identification Schemes | Download |
54 | Schnorr Signature Scheme and TLS/SSL | Download |
55 | Number Theory | Download |
56 | Secret Sharing | Download |
57 | Zero-Knowledge Protocols: Part I | Download |
58 | Zero-Knowledge Protocols: Part II | Download |
59 | Good Bye for Now | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Introduction | Download Verified |
2 | Symmetric-key Encryption | Download Verified |
3 | Historical Ciphers and their Cryptanalysis | Download Verified |
4 | Perfect Security | Download Verified |
5 | Limitations of Perfect Security | Download Verified |
6 | Introduction to Computational Security | Download Verified |
7 | Semantic Security | Download Verified |
8 | Pseudo-random Generators (PRGs) | Download Verified |
9 | Operations on Pseudorandom Generators | Download Verified |
10 | Stream Ciphers | Download Verified |
11 | Provably-secure Instantiation of PRG | Download Verified |
12 | Practical Instantiations of PRG | Download Verified |
13 | CPA-security | Download Verified |
14 | Pseudo-random Functions (PRFs) | Download Verified |
15 | CPA-secure Encryption from PRF | Download Verified |
16 | Modes of Operations of Block Ciphers Part I | Download Verified |
17 | Modes of Operations of Block Ciphers Part II | Download Verified |
18 | Theoretical Constructions of Block Ciphers | Download Verified |
19 | Practical Constructions of Block Ciphers: Part I | Download Verified |
20 | Practical Constructions of Block Ciphers: Part II | Download Verified |
21 | From Passive to Active Adversary | Download Verified |
22 | Message Integrity and Authentication | Download Verified |
23 | Message Authentication for Long Messages : Part I | Download Verified |
24 | Message Authentication for Long Messages : Part II | Download Verified |
25 | Information-theoretic MACs : Part I | Download Verified |
26 | Information-theoretic MACs : Part II | Download Verified |
27 | Cryptographic Hash Functions: Part I | Download Verified |
28 | Cryptographic Hash Functions: Part II | Download Verified |
29 | Message Authentication Using Hash Functions | Download Verified |
30 | Generic Attacks on Hash Functions and Additional Applications of Hash Functions | Download Verified |
31 | Random Oracle Model: Part I | Download Verified |
32 | Random Oracle Model: Part II | Download Verified |
33 | Authenticated Encryption | Download Verified |
34 | Composing CPA-secure Cipher with a Secure MAC: Part I | Download Verified |
35 | Composing CPA-secure Cipher with a Secure MAC: Part II | Download Verified |
36 | Key-Exchange Protocols: Part I | Download Verified |
37 | Key-Exchange Protocols: Part II | Download Verified |
38 | Cyclic groups | Download Verified |
39 | Cryptographic Hardness Assumptions in the Cyclic Groups | Download Verified |
40 | Candidate Cyclic Groups for Cryptographic Purposes: Part I | Download Verified |
41 | Candidate Cyclic Groups for Cryptographic Purposes: Part II | Download Verified |
42 | Cryptographic Applications of the Discrete Log Assumption | Download Verified |
43 | Public-key Encryption | Download Verified |
44 | El Gamal Public-key Encryption Scheme | Download Verified |
45 | RSA Assumption | Download Verified |
46 | RSA Public-key Cryptosystem | Download Verified |
47 | Hybrid Public-key Cryptosystem | Download Verified |
48 | CCA-Secure Public-key Ciphers | Download Verified |
49 | CCA-Secure Public-key Ciphers Based on Diffie-Hellman Problems | Download Verified |
50 | CCA-Secure Public-key Ciphers Based on RSA Assumption | Download Verified |
51 | Digital Signatures | Download Verified |
52 | RSA Signatures | Download Verified |
53 | Identification Schemes | Download Verified |
54 | Schnorr Signature Scheme and TLS/SSL | Download Verified |
55 | Number Theory | Download Verified |
56 | Secret Sharing | Download Verified |
57 | Zero-Knowledge Protocols: Part I | Download Verified |
58 | Zero-Knowledge Protocols: Part II | Download Verified |
59 | Good Bye for Now | Download Verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Download |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |