Chapter 8: Block Ciphers

Chapter 12: Primality Testing

Prime Numbers and Primality Testing

Probabilistic and Proving Algorithms

Factoring Algorithms

Chapter 17: Attacks on Public Key Schemes

Lattice-Based Attacks

Partial Key Exposure Attacks

Fault Attacks

Chapter 18: Definitions of Security

Chapter 19: Complexity Theoretic Approaches

Randomized Algorithms

Chapter 20: Provable Security: With Random Oracles

Todo

Chapter 21: Hybrid Encryption

Chapter 22: Provable Security: Without Random Oracles