An introduction to Cryptography
by Phil Zimmermann
Number of pages: 80
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.
Download or read it online for free here:
by Neal Koblitz (ed.) - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
by Mihir Bellare, Phillip Rogaway
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
by Jonathan Weir, WeiQi Yan - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.