Intro to Crypto

Below is a list of topics and material to aid someone who wants to learn more about cryptography. I am updating it as I find new material and have gone through most of the material but not all.


  1. Introductory MaterialCourse notes from Mihir Bellare’s course at UCSD, “Handbook of Applied Cryptography” by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone
  2. Implementation Attacks – “Implementation Pitfalls” by Yoshi Kohno, “Practical Padding Oracle Attacks” by Thai Doung and Juliano Rizzo, “The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)” by Hugo Krawczyk
  3. Random Number Generation – “A Model and Architecture for Pseudo-Random Generation and Applications to /dev/random” by Boaz Barak and Shai Halevi
  4. Cryptanalysis – “A Self-Study Course in Block-Cipher Cryptanalysis” by Bruce Schneier, “Cryptanalytic on Pseudorandom Number Generators” by John Kelsey, Bruce Schneier, David Wagner, and Chris Hall, “How to Operationally Detect and Break Misuse of Weak Stream Ciphers (and even block Ciphers Sometimes) – Application to the Office Encryption Cryptanalysis” by Eric Filiol


  1. Homomorphic Cryptography – “The Theory and Applications of Homomorphic Cryptography” by Kevin Henry, “Computing Arbitrary Functions of Encrypted Data” by Craig Gentry (a really good intro for a real fully homomorphic cryptosystem)
  2. Secure Multiparty Computation – “Multiparty Computation, an Introduction” by Ronald Cramer, Ivan Damgård and Jesper Buus Nielsen
  3. Private Information Retrieval – “Private Information Retrieval: An Overview and Current Trends” by Dmitri Asonov, “Improving the Robustness of Private Information Retrieval” by Ian Goldberg, “Symmetrically Private Information Retrieval” by Sanjeev Kumar Mishra and Palash Sarkar

Protocols and Applications

  1. Off-the-Record – “Off-the-Record Communication, or, Why Not To Use PGP” by Nikita Borisov, Ian Goldberg and Eric Brewer
  2. GT-SCOT – “Strong Conditional Oblivious Transfer and Computing on Intervals” by Ian F. Blake and Vladimir Kolesnikov
  3. Vanish – “Vanish: Increasing Data Privacy with Self-Destructing Data” by Roxana Geambasu, Tadayoshi Kohno, Amit Levy and Henry M. Levy
  4. Time-Lapse Cryptography – “Time-Lapse Cryptography” by Michael O. Rabin and Christopher Thorpe
  5. Location Privacy – “A Distributed k-Anonymity Protocol for Location Privacy” by Ge Zhong and Urs Hengartner
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: