Cryptography: An Introduction — Contents
Chapter 8: Block Ciphers
- Block Cipher
- Feistel Cipher
- DES Updating
- Rijndael Updating
- Modes of Operation Updating
Chapter 12: Primality Testing
Prime Numbers and Primality Testing
Probabilistic and Proving Algorithms
- Fermat Primality Test
- Miller-Rabin Primality Test
- Primality Proving Algorithms
- ECPP Working on it
- Adleman–Huang Algorithm Working on it
Factoring Algorithms
- Factoring Algorithms Updating
- Smooth Numbers and Factoring Complexity Updating
- Pollard’s p - 1 Method Updating
- Difference of Two Squares and Relations Updating
- Number Field Sieve Updating
Chapter 17: Attacks on Public Key Schemes
Lattice-Based Attacks
- Lattice-based attacks on RSA
- Coppersmith’s Theorem
- Howgrave-Graham Lemma
- Håstad’s Attack
- Franklin–Reiter Attack
- Boneh-Durfee Attack
Partial Key Exposure Attacks
- Partial Key Exposure Attacks
- Partial Exposure of the MSBs of the RSA Decryption Exponent
- Partial Exposure of the some bits of the RSA Prime Factors
- Partial Exposure of the LSBs of the RSA Decryption Exponent
Fault Attacks
Chapter 18: Definitions of Security
- Security of Encryption
- Security of RSA
- Security of ElGamal
- Semantically Secure System
- Security of Signatures
Chapter 19: Complexity Theoretic Approaches
- Decision Problems
- Polynomial Complexity Classes
- List of NPC ProblemsUpdating
- P = NP?Updating
- Knapsack-Based Cryptosystems
- Bit Security
- Random Self-Reductions
Randomized Algorithms
Chapter 20: Provable Security: With Random Oracles
Todo