An Intensive Introduction to Cryptography
Boaz Barak
Work in progress
These are lecture notes for lecture notes for an introductory but fast-paced undergraduate/beginning graduate course on cryptography. I am using these notes for Harvard CS 127.
You can also download all lecture notes in a single PDF file.
If you have any comments, suggestions, typo fixes, etc.. I would be very grateful if you post them as an issue or pull request in the GitHub repository where I am maintaining the source files for these notes.
Book chapters
- Chapter p: Foreword and Syllabus (PDF: best formatting , Word: buggy)
- Chapter 0: Mathematical Background (PDF: best formatting , Word: buggy)
- Chapter 1: Introduction (PDF: best formatting , Word: buggy)
- Chapter 2: Computational Security (PDF: best formatting , Word: buggy)
- Chapter 3: Pseudorandomness (PDF: best formatting , Word: buggy)
- Chapter 4: Pseudorandom functions (PDF: best formatting , Word: buggy)
- Chapter 5: Pseudorandom functions from pseudorandom generators and CPA security (PDF: best formatting , Word: buggy)
- Chapter 6: Chosen Ciphertext Security (PDF: best formatting , Word: buggy)
- Chapter 7: Hash Functions, Random Oracles, and Bitcoin (PDF: best formatting , Word: buggy)
- Chapter 8: Key derivation, protecting passwords, slow hashes, Merkle trees (PDF: best formatting , Word: buggy)
- Chapter 9: Public key cryptography (PDF: best formatting , Word: buggy)
- Chapter 10: Concrete candidates for public key crypto (PDF: best formatting , Word: buggy)
- Chapter 11: Lattice based cryptography (PDF: best formatting , Word: buggy)
- Chapter 12: Establishing secure connections over insecure channels (PDF: best formatting , Word: buggy)
- Chapter 13: Zero knowledge proofs (PDF: best formatting , Word: buggy)
- Chapter 14: Fully homomorphic encryption: Introduction and bootstrapping (PDF: best formatting , Word: buggy)
- Chapter 15: Fully homomorphic encryption: Construction (PDF: best formatting , Word: buggy)
- Chapter 16: Multiparty secure computation I: Definition and Honest-But-Curious to Malicious complier (PDF: best formatting , Word: buggy)
- Chapter 17: Multiparty secure computation II: Construction using Fully Homomorphic Encryption (PDF: best formatting , Word: buggy)
- Chapter 18: Quantum computing and cryptography I (PDF: best formatting , Word: buggy)
- Chapter 19: Quantum computing and cryptography II (PDF: best formatting , Word: buggy)
- Chapter 20: Software Obfuscation (PDF: best formatting , Word: buggy)
- Chapter 21: More obfuscation, exotic encryptions (PDF: best formatting , Word: buggy)
- Chapter 22: Anonymous communication (PDF: best formatting , Word: buggy)
- Chapter 23: Ethical, moral, and policy dimensions to cryptography (PDF: best formatting , Word: buggy)
- Chapter 24: Course recap (PDF: best formatting , Word: buggy)
Compiled on 11/17/2021 22:36:41
Copyright 2021, Boaz Barak.
This work is
licensed under a Creative Commons
Attribution-NonCommercial-NoDerivatives 4.0 International License.
Produced using pandoc and panflute with templates derived from gitbook and bookdown.