The text books for the course are:
The Handbook is not a textbook, but rather an encyclopedic reference. All concepts discussed in the course can be found here, but it is not always easy reading.
Bellare and Rogaway focus on a variant of provable security as developed by the authors. Excellent discussion, careful definitions and detailed proofs. Very rewarding for a mathematically mature reader, but not completely congruent with course contents.
|2||Cryptography Berkley - Notes|
|2||Paragraphs: 2.1.1 (probability theory) 2.1.6 (Random mappings)|
|2||Shannon's Theory of Cryptography|
|4||Paragraph 1.8.1, 1.8.2, 1.8.4|
|5||History of RSA with a mathematical taste|
|5||RSA and modular arithmetics for computer scientists|
|5||Overview of RSA, proofs, attacks, and more|
|5||Fermat primality test|
|5||Primality tests (sections 1 to 4)|
|8||Turing Award to Diffie-Hellmann movie|
|8||Non-Interactive Key Exchange|
|9||I.e. "Handbook of Applied Cryptography" ,Menezes, Oorschot, Vanstone (Chapters 10.3, 10.3.1, 10.3.2, 10.4, 10.4.1, 10.4.3, 10.4.4)|
|9||Secure Multiparty Computation and Secret Sharing: An Information Theoretic Approach, R. Cramer, I. Damgard, J. Buus Nilsen (Chapters 1, 3.1, 3.2, 3.3.4)|