Please enable JavaScript.
Coggle requires JavaScript to display documents.
CRYPTOGRAPHY, Serious cryptography a practical introduction to modern…
CRYPTOGRAPHY
Serious cryptography a practical introduction to modern encryption
Encryption
Randomness
Cryptographic security
Block ciphers
Stream ciphers
Hash functions
Keyed hashing
Authenticated encryption
Hard problems
RSA
Diffie-Hellman
Elliptic curves
TSL
Quantum and post-quantum
Implementing SSL/TSL using cryptography and PKI
Understanding internet security
Protecting against eavesdroppers with symmetric cryptography
Secure key exchange over and insecure medium with public key cryptography
Authenticating communications using digital signatures
Creating a network of trust using x.509 certificates
A usable, secure communications protocol: client-side TSL
Adding server-side TSL 1.0 support
Advanced SSl topic
Adding TSL 1.2 support to your TLS library
Other applications of SSL
Appendix A. Binary representation of integers: a primer
Appendix B. Installing TCPDump and openSSL
Appendix C. Understanding the pitfalls of SSLv2
Cryptography and network security, principles and practice
Part one: One symmetric ciphers
Part two: Asymmetric ciphers
Part three: cryptographic data integrity algorithms
Part four: Mutual trust
Part five: Network and internet security
Appendices
Visual cryptography for image processing and security
Introduction
Various problems in visual cryptography
Cheating prevention of visual cryptography
Various visual cryptography schemes
Various colors schemes of visual cryptography
Various applications of visual cryptography
Applied cryptography
Foundations
Part 1. Cryptographic protocols
Part 2. Crytpographic techniques
Part 3. Cryptographic algorithms
Part 4. The real world
Crypto 101
Building blocks
Complete cryptosystems
Appendices
Introduction