https://toc.cryptobook.us/ e-book: https://toc.cryptobook.us/book.pdf A Graduate Course in Applied Cryptography By [Dan Boneh](https://crypto.stanford.edu/~dabo) and [Victor Shoup](https://shoup.net) (latest version, Jan. 2020) Table of contents at a glance Part I: Secret key cryptography - 1: Introduction - 2: Encryption - 3: Stream ciphers - 4: Block ciphers - 5: Chosen plaintext attacks - 6: Message integrity - 7: Message integrity from universal hashing - 8: Message integrity from collision resistant hashing - 9: Authenticated encryption Part II: Public key cryptography - 10: Public key tools - 11: Public key encryption - 12: Chosen ciphertext secure public-key encryption - 13: Digital signatures - 14: Fast signatures from one-way functions - 15: Elliptic curve cryptography and pairings - 16: Post-quantum cryptography: lattices and isogenies - 17: Analysis of number theoretic assumptions Part III: Protocols - 18: Protocols for identification and login - 19: Identification and signatures from sigma protocols - 20: Proving properties in zero-knowledge - 21: Modern proof systems - 22: Authenticated key exchange - 23: Two-party and multi-party secure computation Appendices - A: Basic number theory - B: Basic probability theory - C: Basic complexity theory - D: Probabilistic algorithms