An Intensive Introduction to Cryptography
Boaz Barak
Work in progress
These are lecture notes for lecture notes for an introductory but fast-paced undergraduate/beginning graduate course on cryptography. I am using these notes for Harvard CS 127.
You can also download all lecture notes in a single PDF file.
If you have any comments, suggestions, typo fixes, etc.. I would be very grateful if you post them as an issue or pull request in the GitHub repository where I am maintaining the source files for these notes.
Book chapters
- Chapter p: Foreword and Syllabus (PDF: best formatting , Word: buggy)
- Chapter 0: Mathematical Background (PDF: best formatting , Word: buggy)
- Chapter 1: Introduction (PDF: best formatting , Word: buggy)
- Chapter 2: Computational Security (PDF: best formatting , Word: buggy)
- Chapter 3: Pseudorandomness (PDF: best formatting , Word: buggy)
- Chapter 4: Pseudorandom functions (PDF: best formatting , Word: buggy)
- Chapter 5: Pseudorandom functions from pseudorandom generators (PDF: best formatting , Word: buggy)
- Chapter 6: Chosen Ciphertext Security (PDF: best formatting , Word: buggy)
- Chapter 7: Hash Functions and Random Oracles (PDF: best formatting , Word: buggy)
- Chapter 8: Key derivation, protecting passwords, slow hashes, Merkle trees (PDF: best formatting , Word: buggy)
- Chapter 9: Private key crypto recap (PDF: best formatting , Word: buggy)
- Chapter 10: Public key cryptography (PDF: best formatting , Word: buggy)
- Chapter 11: Concrete candidates for public key crypto (PDF: best formatting , Word: buggy)
- Chapter 12: Lattice based cryptography (PDF: best formatting , Word: buggy)
- Chapter 13: Chosen ciphertext security for public key encryption (PDF: best formatting , Word: buggy)
- Chapter 14: Establishing secure connections over insecure channels (PDF: best formatting , Word: buggy)
- Chapter 15: Zero knowledge proofs (PDF: best formatting , Word: buggy)
- Chapter 16: Fully homomorphic encryption: Introduction and bootstrapping (PDF: best formatting , Word: buggy)
- Chapter 17: Fully homomorphic encryption: Construction {chapfhetwo } (PDF: best formatting , Word: buggy)
- Chapter 18: Multiparty secure computation I: Definition and Honest-But-Curious to Malicious complier (PDF: best formatting , Word: buggy)
- Chapter 19: Multiparty secure computation II: Construction using Fully Homomorphic Encryption (PDF: best formatting , Word: buggy)
- Chapter 20: Quantum computing and cryptography I (PDF: best formatting , Word: buggy)
- Chapter 21: Quantum computing and cryptography II (PDF: best formatting , Word: buggy)
- Chapter 22: Software Obfuscation (PDF: best formatting , Word: buggy)
- Chapter 23: More obfuscation, exotic encryptions (PDF: best formatting , Word: buggy)
- Chapter 24: Anonymous communication (PDF: best formatting , Word: buggy)
- Chapter 25: Ethical, moral, and policy dimensions to cryptography (PDF: best formatting , Word: buggy)
- Chapter 26: Course recap (PDF: best formatting , Word: buggy)
Compiled on 04/01/2020 19:10:44
Copyright 2019, Boaz Barak.
This work is
licensed under a Creative Commons
Attribution-NonCommercial-NoDerivatives 4.0 International License.
Produced using pandoc and panflute with templates derived from gitbook and bookdown.