_real-world-cryptography
Table of Contents
Real-World Cryptography
-World Cryptographyā€¯
Real-World Cryptography
introduction
hash-functions
message-authentication-codes
authenticated-encryption
key-exchanges
asymmetric-encryption-and-hybrid-encryption
signatures-and-zero-knowledge-proofs
randomness-and-secrets
secure-transport
end-to-end-encryption
user-authentication
crypto-as-in-cryptocurrency
hardware-cryptography
post-quantum-cryptography
is-this-it-next-generation-cryptography
where-cryptography-fails-and-final-words