_real-world-cryptography

Table of Contents

-World Cryptographyā€¯

Real-World Cryptography

  1. introduction
  2. hash-functions
  3. message-authentication-codes
  4. authenticated-encryption
  5. key-exchanges
  6. asymmetric-encryption-and-hybrid-encryption
  7. signatures-and-zero-knowledge-proofs
  8. randomness-and-secrets
  9. secure-transport
  10. end-to-end-encryption
  11. user-authentication
  12. crypto-as-in-cryptocurrency
  13. hardware-cryptography
  14. post-quantum-cryptography
  15. is-this-it-next-generation-cryptography
  16. where-cryptography-fails-and-final-words