-
From Serge Vaudenay
Chapter 6: Proving SecurityThe Random Oracle ModelHybrid ElGamalThe Fujisaki Okamoto Transform -
From Serge Vaudenay
Chapter 5: Cryptanalysis (Conventional)DecorrelationChapter 6: Proving SecurityThe Random Oracle Model -
From Serge Vaudenay
Chapter 5: Cryptanalysis (Conventional)Differential CryptanalysisLinear CryptanalysisHypothesis Testing in Cryptography -
From Serge Vaudenay
Chapter 4: The Power of InteractionSetup ModelsA Building Block for Making Cryptographic PrimitivesChapter 5: Cryptanalysis (Conventional)Block CiphersDifferential… -
From Serge Vaudenay
Chapter 4: The Power of InteractionZero-Knowledge Construction from Sigma ProtocolSetup Models -
From Serge Vaudenay
Chapter 4: The Power of InteractionInteractive ProofsZero-KnowledgeZero-Knowledge Construction from Sigma Protocol -
From Serge Vaudenay
Chapter 3: Cryptanalysis (Public-Key)ElGamalChapter 4: The Power of InteractionInteractive Proofs -
-
From Serge Vaudenay
Chapter 2: Cryptographic Security ModelsDiffie-Hellman SecurityElGamal SecurityChapter 3: Cryptanalysis (Public-Key)RSA -
From Serge Vaudenay
Chapter 2: Cryptographic Security ModelsThe Game Proof MethodologyRSA SecurityRabin CryptosystemDiffie-Hellman Security -
-
From Serge Vaudenay
Chapter 1: The Cryptographic ZooThe Math ToolboxThe Algorithmic ToolboxThe Complexity Theory ToolboxChapter 2: Cryptographic Security ModelsSecurity Definitions -
-