[1]https://toc.cryptobook.us/ e-book: [2]https://toc.cryptobook.us/book.pdf A Graduate Course in Applied Cryptography By [3]Dan Boneh and [4]Victor Shoup (latest version, Jan. 2020) Table of contents at a glance Part I: Secret key cryptography * 1: Introduction * 2: Encryption * 3: Stream ciphers * 4: Block ciphers * 5: Chosen plaintext attacks * 6: Message integrity * 7: Message integrity from universal hashing * 8: Message integrity from collision resistant hashing * 9: Authenticated encryption Part II: Public key cryptography * 10: Public key tools * 11: Public key encryption * 12: Chosen ciphertext secure public-key encryption * 13: Digital signatures * 14: Fast signatures from one-way functions * 15: Elliptic curve cryptography and pairings * 16: Post-quantum cryptography: lattices and isogenies * 17: Analysis of number theoretic assumptions Part III: Protocols * 18: Protocols for identification and login * 19: Identification and signatures from sigma protocols * 20: Proving properties in zero-knowledge * 21: Modern proof systems * 22: Authenticated key exchange * 23: Two-party and multi-party secure computation Appendices * A: Basic number theory * B: Basic probability theory * C: Basic complexity theory * D: Probabilistic algorithms References 1. https://toc.cryptobook.us/ 2. https://toc.cryptobook.us/book.pdf 3. https://crypto.stanford.edu/~dabo 4. https://shoup.net/