Cryptography Theory and Practice Table of Contents

  1. Classical Cryptography
  2. Shannon's Theory
  3. The Data Encryption Standard
  4. The RSA System and Factoring
  5. Other Public-key Cryptosystems
  6. Signature Schemes
  7. Hash Functions
  8. Key Distribution and Key Agreement
  9. Identification Schemes
  10. Authentication Codes
  11. Secret Sharing Schemes
  12. Pseudo-random Number Generation
  13. Zero-knowledge Proofs

Return to the home page of Cryptography Theory and Practice.